Logo Logo
  • All News
  • Bitcoin
  • Ethereum
  • Altcoin
  • Market
  • Blockchain
  • AI
  • More
    • About Us
    • Contact
Reading: Report: North Korean IT Workers Posing as Freelancers to Target Crypto
Share
The Crypto BluntThe Crypto Blunt
Font ResizerAa
  • Home
  • Read History
  • Technology
  • Login
  • Blog
  • Contact
Search
  • Pages
    • Blog Index
    • Contact Us
    • Search Page
    • 404 Page
  • Pages
    • Home
    • Blog Index
    • Contact Us
    • Search Page
    • 404 Page
  • Pages
    • Home
    • Blog Index
    • Contact Us
    • Search Page
    • 404 Page
  • Personalized
    • Read History
  • Personalized
    • Read History
  • Personalized
    • Read History
  • Categories
    • Technology
  • Categories
    • Technology
  • Categories
    • Technology
Have an existing account? Sign In
Follow US
  • Pages
  • Pages
  • Pages
  • Personalized
  • Personalized
  • Personalized
  • Categories
  • Categories
  • Categories

Home - News - Report: North Korean IT Workers Posing as Freelancers to Target Crypto

News

Report: North Korean IT Workers Posing as Freelancers to Target Crypto

Hardy Zad
Last updated: August 14, 2025 6:46 am
Hardy Zad
Published: August 5, 2025
Share
North Korean

Cybersecurity researchers from Google Cloud and Wiz have warned that millions in digital assets are being siphoned by North Korean tech specialists. These individuals are reportedly leveraging deceptive aliases to infiltrate cryptocurrency firms through fraudulent remote employment schemes.

Contents
  • The UNC4899 Playbook: How Hackers Breached Cloud Environments
  • A Large-Scale Operation Uncovered
  • Crypto Losses Reach Millions

Distinct reports released by the firms have monitored UNC4899, also known as TraderTraitor, an adversarial North Korean collective believed to be affiliated with the country’s military intelligence.

A report by Google Cloud’s H2 2025 Cloud Threat Horizons indicates that UNC4899 is controlled by the Reconnaissance General Bureau, which is North Korea’s main foreign intelligence agency.

The collective is believed to have been operational since at least 2020, concentrating on the digital ledger and virtual currency sectors while employing sophisticated social engineering and cloud-specific attack methods.

The UNC4899 Playbook: How Hackers Breached Cloud Environments

Two distinct incidents were detailed by Google, in which UNC4899 compromised personnel at different organizations—one leveraging Google Cloud, the other AWS. On both occasions, the perpetrators masqueraded as freelance talent scouts and initiated contact with employees via LinkedIn or Telegram.

Following the initiation of communication, victims were persuaded to execute malevolent Docker containers on their workstations, which deployed downloaders and backdoors to establish links with attacker-controlled infrastructure.

In a matter of days, the collective laterally navigated internal networks, harvesting credentials and pinpointing infrastructure that was utilized for cryptocurrency transfers.

In a specific incident, UNC4899 was able to deactivate multi-factor authentication on a privileged Google Cloud account, which allowed access to wallet-related services. After millions of dollars’ worth of crypto was siphoned, the group reactivated MFA to circumvent detection.

During a separate AWS-related incident, attackers leveraged pilfered long-term access keys but were impeded by the victim’s mandatory use of temporary credentials and MFA protocols. They circumvented these safeguards by siphoning session cookies, which enabled them to alter JavaScript files housed in AWS S3 buckets.

The files were manipulated by the attackers to reroute cryptocurrency wallet interactions to addresses under their control, which resulted in another multimillion-dollar theft.

A Large-Scale Operation Uncovered

UNC4899 has also been examined by the cloud security firm Wiz, which released distinct findings that are consistent with Google’s.

It was noted by experts at Wiz that the collective has been known by multiple aliases, including Jade Sleet, Slow Pisces, and TraderTraitor. Each of these monikers corresponds to a broader set of tactics utilized by various North Korean state-backed entities, such as the Lazarus Group, BlueNoroff, and APT38.

While UNC4899 has been operational since 2020, fraudulent employment offers were not made a central tactic until 2023, particularly targeting personnel at cryptocurrency exchanges, a recent report from the firm stated.

The group is implicated in some of the most prominent security breaches, including the $305 million digital heist from Japan’s DMM Bitcoin and the $1.5 billion Bybit compromise in late 2024.

A warning was issued by Wiz that cloud infrastructure remains a persistent point of entry or exploitation in these attacks, given that many cryptocurrency firms operate in cloud-first environments with limited on-premise defenses.

Crypto Losses Reach Millions

Estimates for the financial damage fluctuate but remain consistently high. Google and Wiz report that UNC4899 has independently siphoned multiple millions of dollars in each breach, while broader figures compiled by private analysts and government bodies indicate even greater losses.

A 2024 report from blockchain analytics firm Chainalysis found that North Korean hackers stole $1.34 billion in crypto that year alone. More recently, it was estimated by researchers at Wiz that $1.6 billion in digital assets has been pilfered by North Korea-linked threat actors in 2025 as of mid-year.

In a separate finding, it has been estimated by independent blockchain investigator ZachXBT that between 345 and 920 North Korean operatives may have infiltrated employment positions in the crypto industry, collectively receiving more than $16 million in salaries since the start of 2025.

TAGGED:CryptocryptocurrencyNorth KoreaReport

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Email Copy Link Print
ByHardy Zad
Follow:
Hardy Zad is our in house crypto researcher and writer, delving into the stories which matter from crypto and blockchain markets being used in the real world.
Previous Article What is Flare Network?  What is Flare Network? What It Is, Overview, Works, Guides, Everything You Need to Know
Next Article What is Flow? What is Flow? What It Is, Overview, Works, Guides, Everything You Need to Know
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

FacebookLike
XFollow
InstagramFollow
LinkedInFollow
MediumFollow
RSS FeedFollow
The Crypto BluntLogo
Subscribe to our newsletter to get our newest articles instantly!
Most Read
Stablecoin Turmoil Could Disrupt ECB Policy, Dutch Central Bank Chief Warns

Stablecoin Turmoil Could Disrupt ECB Policy, Dutch Central Bank Chief Warns

What is GateToken?

What is GateToken (GT)? What It Is, Overview, Works, Guides, Everything You Need to Know

What is Ethereum? 

What is Ethereum (ETH)? What It Is, Overview, Works, Guides, Everything You Need to Know

What is Ethereum Classic?

What is Ethereum Classic (ETC)? What It Is, Overview, Works, Guides, Everything You Need to Know

What is Ethena?

What is Ethena (ENA)? What It Is, Overview, Works, Guides, Everything You Need to Know

What is Ethena USDe?

What is Ethena USDe? What It Is, Overview, Works, Guides, Everything You Need to Know

What is Dogecoin?

What is Dogecoin(DOGE)? What It Is, Overview, Works, Guides, Everything You Need to Know

what is Dai

What is Dai (DAI)? What It Is, Overview, Works, Guides, Everything You Need to Know

What is Chainlink?

What is Chainlink (LINK)? What It Is, Overview, Works, Guides, Everything You Need to Know

What is Cronos?

What is Cronos(CRO)? What It Is, Overview, Works, Guides, Everything You Need to Know

thecryptoblunt-telegram
Logo

The most recent real-time news about crypto at The Crypto Blunt. Latest trusted news about bitcoin, ethereum, blockchain, mining, cryptocurrency prices and more.

NEWS
  • Explained
  • News
  • AI
  • Blockchain
COMPANY
  • About Us
  • Career
GET IN TOUCH
  • Contact
  • Disclaimer
  • Privacy Policy
  • Cookie Policy

© The Crypto Blunt 2025. All Rights Reserved.

© The Crypto Blunt. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?