North Korean Hackers Use Fake U.S. Companies to Spread Malware in Crypto Industry: Report

North Korean hackers reportedly established seemingly legitimate companies on U.S. soil to infiltrate the crypto sector, targeting unsuspecting developers through fake job offers. With legal registrations, corporate fronts, and social engineering, the attackers concealed their true identities behind American business facades to deliver malware until the FBI stepped in, according to security firm Silent Push, as quoted by the Japanese Times.Corporate Fronts, Empty Lots, Real ThreatsAccording to security firm Silent Push, two companies, Blocknovas and Softglide, were registered in New Mexico and New York using fabricated addresses and identities. These shell firms served as lures for crypto developers seeking job opportunities. Blocknovas, the more active of the two, listed a South Carolina address that turned out to be an empty lot. Softglide’s paperwork linked back to a Buffalo-based tax office.The fake firms formed part of an advanced campaign by a subgroup of the Lazarus Group, a state-sponsored cyber unit linked to North Korea’s Reconnaissance General Bureau. The hackers used fake job postings and LinkedIn-style profiles to engage developers in interviews. During these interactions, the victims were prompted to download files disguised as application materials or onboarding documents. The malware could steal data, provide backdoor access to systems, and lay the groundwork for follow-up attacks using spyware or ransomware. Silent Push confirmed that at least three known North Korean malware types were used in the campaign.FBI Moves InFederal agents seized the Blocknovas domain, citing its use in distributing malware. A notice now posted on the site confirms that the action was part of broader law enforcement efforts against North Korean cyber actors.The FBI did not comment directly on the companies involved but emphasized its ongoing focus on exposing and punishing DPRK-backed cybercrime. The scheme violates both U.S. and United Nations sanctions. North Korea is barred from engaging in commercial activities designed to aid its government or military. OFAC, the Treasury’s enforcement body, prohibits North Korean-linked entities from operating within the United States.This campaign is part of a broader strategy by North Korea to exploit the crypto ecosystem. The country’s cyber units have stolen billions in digital assets and dispatched thousands of IT professionals overseas to generate funds, efforts widely believed to support Pyongyang’s nuclear weapons program. This article was written by Jared Kirui at www.financemagnates.com.

Apr 25, 2025 - 21:51
 0
North Korean Hackers Use Fake U.S. Companies to Spread Malware in Crypto Industry: Report

North Korean hackers reportedly established seemingly legitimate companies on U.S. soil to infiltrate the crypto sector, targeting unsuspecting developers through fake job offers.

With legal registrations, corporate fronts, and social engineering, the attackers concealed their true identities behind American business facades to deliver malware until the FBI stepped in, according to security firm Silent Push, as quoted by the Japanese Times.

Corporate Fronts, Empty Lots, Real Threats

According to security firm Silent Push, two companies, Blocknovas and Softglide, were registered in New Mexico and New York using fabricated addresses and identities. These shell firms served as lures for crypto developers seeking job opportunities.

Blocknovas, the more active of the two, listed a South Carolina address that turned out to be an empty lot. Softglide’s paperwork linked back to a Buffalo-based tax office.

The fake firms formed part of an advanced campaign by a subgroup of the Lazarus Group, a state-sponsored cyber unit linked to North Korea’s Reconnaissance General Bureau.

The hackers used fake job postings and LinkedIn-style profiles to engage developers in interviews. During these interactions, the victims were prompted to download files disguised as application materials or onboarding documents.

The malware could steal data, provide backdoor access to systems, and lay the groundwork for follow-up attacks using spyware or ransomware. Silent Push confirmed that at least three known North Korean malware types were used in the campaign.

FBI Moves In

Federal agents seized the Blocknovas domain, citing its use in distributing malware. A notice now posted on the site confirms that the action was part of broader law enforcement efforts against North Korean cyber actors.

The FBI did not comment directly on the companies involved but emphasized its ongoing focus on exposing and punishing DPRK-backed cybercrime.

The scheme violates both U.S. and United Nations sanctions. North Korea is barred from engaging in commercial activities designed to aid its government or military. OFAC, the Treasury’s enforcement body, prohibits North Korean-linked entities from operating within the United States.

This campaign is part of a broader strategy by North Korea to exploit the crypto ecosystem. The country’s cyber units have stolen billions in digital assets and dispatched thousands of IT professionals overseas to generate funds, efforts widely believed to support Pyongyang’s nuclear weapons program. This article was written by Jared Kirui at www.financemagnates.com.