Cryptocurrency Editor's Picks

CZ Alerts About Infiltration of 60 Fake Profiles in Crypto Companies

Analyst in a control room facing a red alert; screens show 60 fake IT profiles linked to Lazarus in crypto

CZ warned about an infiltration in crypto companies after detecting 60 fake profiles posing as IT workers. The threat affects exchanges, custodians, and institutional treasuries, with possible links to North Korean state-sponsored groups, particularly the Lazarus Group. The information is especially relevant for hiring managers, security teams, and liquidity management personnel.

Modus Operandi and Access Vectors

The network created fraudulent resumes and professional profiles that allowed remote access to roles in development, security, and finance. The attackers used social engineering, malware hidden in code updates during technical interviews, and support tickets with malicious links, as well as bribes to outsourced vendors for data access. This provided access to keys, internal procedures, and user data, opening the door to unauthorized actions and the exfiltration of strategic information.

Some operatives even created legitimate-looking U.S. shell companies such as Blocknovas LLC and Softglide LLC to establish credible corporate fronts and facilitate attacks, including malware called PylangGhost targeting wallet developers and browser extensions. They also used stolen U.S. identities, VPNs, and falsified expense documentation to maintain fraudulent employment for months, ensuring prolonged infiltration of critical infrastructure.

Financial Impact, Response, and Operational Risks

The financial impact is significant, with thefts potentially exceeding billions of dollars. North Korean attacks reportedly stole over $1.3B in 2024 and $2.2B in the first half of 2025, directly affecting liquidity and trust in centralized infrastructures.

The regulatory and judicial response included arrests and indictments, while companies adjusted internal protocols, including mandatory training, citizenship requirements for sensitive access, and biometric verification.

Hackers

The operational implications span multiple areas:

  • For traders and treasuries, there is a risk of direct losses and leakage of trading strategies.


  • For security teams, the main vector is remote hiring without forensic verification of identities and code.


  • For exchanges, reputation and operational continuity are at stake.


The case highlights the convergence of identity fraud, sophisticated cyberattacks, and state-sponsored motives. With 60 fake candidates detected, multiple shell companies, stolen identities, and losses totaling billions of dollars, the practical takeaway is to strengthen hiring procedures, access controls, code verification, and monitoring against advanced malware, along with prudent liquidity management and continuous oversight of internal systems.

Related posts

Sui Network’s TVL Hits Record High as SUI Token Surges 30%

fernando

The SEC Has Filed an Objection to Binance’s Voyager Acquisition

Jai Hamid

Binance Lists Eurite (EURI) with Zero Trading Fees: A New MiCA-Regulated Euro Stablecoin

fernando