Fulfary technology employees with connections with North Korea are expanding their infiltration operations to Blockchain outside the US after increasing the control of the authorities, and some went to British cryptographic projects, says Google.
Google Threat Intelligence Group (GTIG) Advisor Jamie Collier he said In the report of April 2, that although the United States is still a key goal, increased awareness and challenges of right verification at work forced IT employees from North Korea to find roles in companies outside the USA.
“In response to the increased awareness of the threat in the United States, they established a global ecosystem of false personalities to increase operational agility,” said Collier.
“In combination with the discovery of facilitators in Great Britain, this suggests a quick creation of a global infrastructure and support network that allows their further activities,” he added.
The Google Threats Intelligence Group claims that North Korea technology workers have expanded their reach among American repression. Source: Google
According to Collier, employees associated with North Korea infiltrate projects covering time-honored development of websites and advanced blockchain applications, such as projects covering Solan and Anchor Sharp Contract.
Another project building the blockchain labor market and it was also found that the online application of artificial intelligence using blockchain technologies also have employees from North Korea.
“These persons are justified remote employees to infiltrate companies and generate revenues for the regime,” said Collier.
“This is placed by organizations that employ the DPRK [Democratic People’s Republic of Korea] Employees of espionage, data theft and interference. “
North Korea is looking for Europe in search of technical work
Together with Great Britain, Collier claims that GTIG has identified significant emphasis on Europe, and one employee uses at least 12 personalities throughout Europe and others, using the high school with Belgrade University in Serbia and the residence in Slovakia.
Separate investigations of GTIG found that people looking for employment in Germany and Portugal log in to certificates regarding the accounts of European website users, instructions on navigation of European jobs and a broker specializing in false passports.
At the same time, from the end of October, North Korea employees increased the number of attempts at extortion and went after larger organizations that speculates GTIG that employees are feeling pressure to maintain revenue streams among repression in the USA.
“In these incidents, recently dismissed IT employees threatened to issue confidential data of their former employers or provide them with a competitor. These data included reserved data and source code for internal projects,” said Collier.
Related: North Korea cryptographic attacks growing in sophistication, actors – paradigm
In January, the US Department of Justice accused Two North Korean citizens for their commitment to a fraudulent IT work program with the participation of at least 64 American companies from April 2018 to August 2024.
The Foreign Asset Office of the Department of the US Treasury sanctioned Companies accused of North Korea fronts that generated revenues via a pilot of work programs.
The founders of Crypto also reported an raise in the activity of hackers from North Korea, with at least three founders reported on March 13 that they thwarted the attempts to Ukrainian confidential data using false magnifying connections.
Sound problems in combination with enlargement? This is not a VC, they are hackers from North Korea.
Fortunately, this founder realized what was going on.
The connection begins with a few “VC” on the connection. They send chat messages with information that they do not hear your sound or suggesting that it is … pic.twitter.com/znw8Mtof4f
– nick bax.eth (@bax1337) March 11, 2025
In August, Blockchain Investigators Zachxbt claimed that he had discovered a sophisticated network of developers from North Korea earning $ 500,000 per month working for “established” cryptographic projects.
Warehouse: Lazarus’ favorite exploit was revealed – analysis of cryptographic hacks