Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert & block trade
Convert crypto with one click and zero fees
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
CZ Warns Crypto Exchanges and Wallets May Be Targeted by North Korean Hackers Using Job-Offer and Support-Link Tactics

CZ Warns Crypto Exchanges and Wallets May Be Targeted by North Korean Hackers Using Job-Offer and Support-Link Tactics

CoinotagCoinotag2025/09/17 16:00
By:Marisol Navaro

  • Advanced social engineering: fake candidates and interviews

  • Malicious “sample code” and update links deliver remote-access malware.

  • Insider bribery and compromised vendors have led to >$400 million losses in recent incidents.

North Korean hackers: CZ warning — learn prevention steps, train staff, and secure wallets now. Read expert guidance and act today.

What did CZ warn about North Korean hackers?

North Korean hackers are described by Changpeng Zhao (CZ) as “advanced, creative, and patient,” using employment-related deception to infiltrate teams and deliver malware. CZ’s warning underscores that targeted screening and employee training are essential to protect exchanges and personal wallets.

How do NK hackers gain initial access?

Attackers frequently pose as job applicants applying for developer, finance or cybersecurity roles to get a foothold. They also impersonate recruiters or support users in interviews, asking victims to download a supposed “Zoom update” or opening a “sample code” file that contains malware. These tactics allow attackers to escalate access quietly.

How do these attackers operate inside organizations?

Once inside, attackers may: (1) deploy remote-access trojans from malicious attachments, (2) abuse stolen credentials to access admin consoles, and (3) exploit outsourced vendor relationships or bribed staff to exfiltrate sensitive data. CZ highlighted a recent case where an outsourcing breach led to user data exposure and losses exceeding $400 million.


Why are job-scam tactics effective?

Job-scam tactics exploit normal hiring workflows, which often involve receiving attachments, test code and interview links from unknown candidates. HR and engineering teams routinely open files from applicants, making these channels ideal for delivering malicious payloads.

What practical steps prevent these attacks?

Front-load defenses: implement strict candidate vetting, restrict file downloads, enforce least privilege, and enable multi-factor authentication (MFA). Regular vendor audits and insider-risk monitoring further reduce exposure.


Frequently Asked Questions

How can exchanges detect malicious job applications?

Look for inconsistencies in resumes, unverifiable employment history, unusual interview requests (e.g., external downloads) and insist on sandboxed code reviews. Verify candidate identities before granting system access.

What should support teams do about suspicious customer links?

Never click links from unverified users. Validate support requests through established account verification procedures and use isolated environments to inspect suspicious attachments.


Key Takeaways

  • Recognize the threat: North Korean hackers use recruitment and support channels to deliver malware and gain access.
  • Limit attack surface: Disable unsolicited downloads in interviews and require sandboxed code reviews.
  • Operational steps: Enforce MFA, run staff training, audit vendors, and maintain strict least-privilege access.

Conclusion

Changpeng Zhao’s public warning highlights that North Korean hackers remain a sophisticated threat to exchanges and wallet users. Organizations must combine rigorous candidate screening, employee training, vendor controls and technical safeguards to reduce risk. Stay proactive and prioritize incident readiness to protect user funds and data.

Published by COINOTAG — 2025-09-18. Last updated 2025-09-18.






In Case You Missed It: Bitcoin Could Consolidate After Fed Rate Cut as Charts Indicate Range‑Bound Trading and Prediction Markets Remain Bullish
0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!