The Crypto Blunt
  • All News
  • Bitcoin
  • Ethereum
  • Altcoin
  • Market
  • Blockchain
  • AI
  • More
    • About Us
    • Contact
Reading: Report: North Korean IT Workers Posing as Freelancers to Target Crypto
Share
The Crypto BluntThe Crypto Blunt
Font ResizerAa
  • All News
  • Bitcoin
  • Ethereum
  • Altcoin
  • Market
  • Blockchain
  • AI
  • More
Search
  • Pages
    • Blog Index
    • Contact Us
    • Search Page
    • 404 Page
  • Pages
    • Home
    • Blog Index
    • Contact Us
    • Search Page
    • 404 Page
  • Pages
    • Home
    • Blog Index
    • Contact Us
    • Search Page
    • 404 Page
  • Personalized
    • Read History
  • Personalized
    • Read History
  • Personalized
    • Read History
  • Categories
    • Technology
  • Categories
    • Technology
  • Categories
    • Technology
Have an existing account? Sign In
Follow US
  • Pages
  • Pages
  • Pages
  • Personalized
  • Personalized
  • Personalized
  • Categories
  • Categories
  • Categories

Home - Latest Crypto News Today - Report: North Korean IT Workers Posing as Freelancers to Target Crypto

Latest Crypto News Today

Report: North Korean IT Workers Posing as Freelancers to Target Crypto

Hardik Z.
Last updated: August 14, 2025 6:46 am
Hardik Z. - Chief in Editor & Writer
Published: August 5, 2025
Share
North Korean

Cybersecurity researchers from Google Cloud and Wiz have warned that millions in digital assets are being siphoned by North Korean tech specialists. These individuals are reportedly leveraging deceptive aliases to infiltrate cryptocurrency firms through fraudulent remote employment schemes.

Contents
  • The UNC4899 Playbook: How Hackers Breached Cloud Environments
  • A Large-Scale Operation Uncovered
  • Crypto Losses Reach Millions

Distinct reports released by the firms have monitored UNC4899, also known as TraderTraitor, an adversarial North Korean collective believed to be affiliated with the country’s military intelligence.

A report by Google Cloud’s H2 2025 Cloud Threat Horizons indicates that UNC4899 is controlled by the Reconnaissance General Bureau, which is North Korea’s main foreign intelligence agency.

The collective is believed to have been operational since at least 2020, concentrating on the digital ledger and virtual currency sectors while employing sophisticated social engineering and cloud-specific attack methods.

The UNC4899 Playbook: How Hackers Breached Cloud Environments

Two distinct incidents were detailed by Google, in which UNC4899 compromised personnel at different organizations—one leveraging Google Cloud, the other AWS. On both occasions, the perpetrators masqueraded as freelance talent scouts and initiated contact with employees via LinkedIn or Telegram.

Following the initiation of communication, victims were persuaded to execute malevolent Docker containers on their workstations, which deployed downloaders and backdoors to establish links with attacker-controlled infrastructure.

In a matter of days, the collective laterally navigated internal networks, harvesting credentials and pinpointing infrastructure that was utilized for cryptocurrency transfers.

In a specific incident, UNC4899 was able to deactivate multi-factor authentication on a privileged Google Cloud account, which allowed access to wallet-related services. After millions of dollars’ worth of crypto was siphoned, the group reactivated MFA to circumvent detection.

During a separate AWS-related incident, attackers leveraged pilfered long-term access keys but were impeded by the victim’s mandatory use of temporary credentials and MFA protocols. They circumvented these safeguards by siphoning session cookies, which enabled them to alter JavaScript files housed in AWS S3 buckets.

The files were manipulated by the attackers to reroute cryptocurrency wallet interactions to addresses under their control, which resulted in another multimillion-dollar theft.

A Large-Scale Operation Uncovered

UNC4899 has also been examined by the cloud security firm Wiz, which released distinct findings that are consistent with Google’s.

It was noted by experts at Wiz that the collective has been known by multiple aliases, including Jade Sleet, Slow Pisces, and TraderTraitor. Each of these monikers corresponds to a broader set of tactics utilized by various North Korean state-backed entities, such as the Lazarus Group, BlueNoroff, and APT38.

While UNC4899 has been operational since 2020, fraudulent employment offers were not made a central tactic until 2023, particularly targeting personnel at cryptocurrency exchanges, a recent report from the firm stated.

The group is implicated in some of the most prominent security breaches, including the $305 million digital heist from Japan’s DMM Bitcoin and the $1.5 billion Bybit compromise in late 2024.

A warning was issued by Wiz that cloud infrastructure remains a persistent point of entry or exploitation in these attacks, given that many cryptocurrency firms operate in cloud-first environments with limited on-premise defenses.

Crypto Losses Reach Millions

Estimates for the financial damage fluctuate but remain consistently high. Google and Wiz report that UNC4899 has independently siphoned multiple millions of dollars in each breach, while broader figures compiled by private analysts and government bodies indicate even greater losses.

A 2024 report from blockchain analytics firm Chainalysis found that North Korean hackers stole $1.34 billion in crypto that year alone. More recently, it was estimated by researchers at Wiz that $1.6 billion in digital assets has been pilfered by North Korea-linked threat actors in 2025 as of mid-year.

In a separate finding, it has been estimated by independent blockchain investigator ZachXBT that between 345 and 920 North Korean operatives may have infiltrated employment positions in the crypto industry, collectively receiving more than $16 million in salaries since the start of 2025.

TAGGED:CryptocryptocurrencyNorth KoreaReport

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Email Copy Link Print
ByHardik Z.
Chief in Editor & Writer
Follow:
Hardik Z. is a cryptocurrency expert, trader and well-researched journalist with extensive experience of covering everything related to the burgeoning industry — from price analysis to Blockchain disruption. Hardik authored more than 1,000+ stories for Thecryptoblunt.com, and other fintech media outlets. He’s particularly interested in web3, crypto trends, regulatory trends around the globe that are shaping the future of digital assets, can be contacted at hardik.z@thecryptoblunt.com
Previous Article What is Flare Network?  What is Flare Network? What It Is, Overview, Works, Guides, Everything You Need to Know
Next Article What is Flow? What is Flow? What It Is, Overview, Works, Guides, Everything You Need to Know
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

FacebookLike
XFollow
InstagramFollow
LinkedInFollow
MediumFollow
RSS FeedFollow
The Crypto BluntLogo
Subscribe to our newsletter to get our newest articles instantly!
Most Read
A Subtle Nasdaq Shift Signals a New Era for Bitcoin on Wall Street

A Subtle Nasdaq Shift Signals a New Era for Bitcoin on Wall Street

What is Bonk?

What is Bonk (BONK)? What It Is, Overview, Works, Guides, Everything You Need to Know

What is BNB?

What is BNB? What It Is, Overview, Works, Guides, Everything You Need to Know

What is Bittensor? 

What is Bittensor (TAO)? What It Is, Overview, Works, Guides, Everything You Need to Know

What is Bitget Token?

What is Bitget Token (BGB)? What It Is, Overview, Works, Guides, Everything You Need to Know

What is Bitcoin Cash? 

What is Bitcoin Cash (BCH)? What It Is, Overview, Works, Guides, Everything You Need to Know

What is Avalanche(AVAX)?

What is Avalanche(AVAX)? What It Is, Overview, Works, Guides, Everything You Need to Know

What is Arbitrum? 

What is Arbitrum(ARB)? What It Is, Overview, Works, Guides, Everything You Need to Know

Aptos

What is Aptos(APT)? What It Is, Overview, Works, Guides, Everything You Need to Know

What is Aave (AAVE)? What It Is, Overview, Works, Guides, Everything You Need to Know

What is Aave (AAVE)? What It Is, Overview, Works, Guides, Everything You Need to Know

thecryptoblunt-telegram
Logo

The most recent real-time news about crypto at Thecryptoblunt. Latest trusted news about bitcoin, ethereum, blockchain, mining, cryptocurrency prices and more.

NEWS
  • Explained
  • Latest Crypto News Today
  • AI
  • Blockchain
COMPANY
  • About Us
  • Career
GET IN TOUCH
  • Contact
  • Terms & conditions
  • Privacy Policy
  • Consent Settings
  • Disclaimer
  • Cookie Policy
  • Editorial policy
  • RSS

© The Crypto Blunt 2025. All Rights Reserved.

© The Crypto Blunt. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?