News

Counter-Hack Exposes North Korean IT Workers Behind $680K Crypto Theft

Counter-Hack Exposes North Korean IT Workers Behind $680K Crypto Theft

A rare leak from inside a North Korean hacking operation has shed light on how a small team of operatives infiltrates crypto projects, using fake identities, freelance platforms, and everyday tech tools to carry out multimillion-dollar heists.

The six-member team, linked to the $680,000 June 2025 hack of fan-token marketplace Favrr, was exposed after an unnamed source compromised one of their devices. Screenshots shared by blockchain investigator ZachXBT revealed their methods, spending habits, and infiltration strategies.

Fake Identities and Job Infiltration

The team operated under at least 31 fake identities, complete with forged government IDs, phone numbers, and purchased LinkedIn and Upwork accounts. These personas were used to secure roles such as “blockchain developer” and “smart contract engineer” on freelance platforms.

Evidence showed that one operative even interviewed for a full-stack engineer position at Polygon Labs, while others claimed fake experience at OpenSea and Chainlink. To execute their work, they relied on AnyDesk for remote access, VPNs to mask their location, and Payoneer to convert fiat into crypto.

Google Tools and Operational Costs

The hackers extensively used Google Drive, Chrome profiles, and Google Translate to manage schedules, budgets, and communications — primarily in English. A leaked spreadsheet revealed the group spent $1,489.80 in May on operational expenses.

Link to the Favrr Exploit

ZachXBT identified a wallet address (“0x78e1a”) closely tied to the Favrr hack, which saw $680,000 in crypto stolen. At the time, he alleged that Favrr’s CTO “Alex Hong” and several developers were actually North Korean operatives working under false identities.

The same group has been connected to other major exploits, including the $1.4 billion Bitbit exchange hack in February 2025, as well as numerous thefts from DeFi protocols.

Broader Threat and Industry Response

Leaked searches from their devices showed curiosity about blockchain interoperability (“Can ERC-20 tokens be deployed on Solana?”) and global AI companies — suggesting a broad scope of interest beyond crypto theft.

ZachXBT urged crypto and tech companies to strengthen due diligence when hiring remote workers, noting that many DPRK-linked operations are not highly advanced but succeed due to high application volumes and weak screening.

Last month, the U.S. Treasury sanctioned two individuals and four entities for running a North Korea-based IT worker ring targeting cryptocurrency firms.


This rewrite keeps the investigative tone while making the flow sharper and easier to follow for an English-speaking crypto audience.

Do you also want me to prepare a satirical-style thumbnail image (1792×1024) showing “North Korean hackers getting hacked back”? That would fit perfectly with this story.

Recommended News

  1. Matador Technologies Targets 6,000 …

  2. Robert Kiyosaki Warns of Potential …

  3. Bitcoin Dips Below $102K Amid U.S. …

  4. Guggenheim Partners With Ripple to …

  5. Kentucky Governor Signs ‘Bitc…

  6. Microsoft Warns of New Remote Acces…

Top Crypto Exchanges
PAGE TOP