Security

Cyber-crime

North Korean scammers plan wave of stealth attacks on crypto companies, FBI warns

Feds warn of 'highly tailored, difficult-to-detect social engineering campaigns'


The FBI has warned that North Korean operatives are plotting "complex and elaborate" social engineering attacks against employees of decentralized finance (DeFi) organizations, as part of ongoing efforts to steal cryptocurrency.

State-sponsored crews have researched targets connected to cryptocurrency exchange-traded funds, and conducted other reconnaissance work, we're told. This suggests that North Korea is likely to attempt "highly tailored, difficult-to-detect social engineering campaigns" against cryptocurrency-related businesses in the near future, the US investigative agency wrote on Tuesday.

The scammers display such "sophisticated technical acumen" that victims may not even realize they’ve been attacked until it's too late.

North Korea has for years tried to steal assets from cryptocurrency outfits because international sanctions designed to stop it developing weapons of mass destruction mean the murderous autocracy is all but excluded from the global financial system. The nation has found cryptocurrency helps it get around those restrictions, so has launched many campaigns to acquire digi-dollars.

The FBI is concerned that those efforts have become more refined.

"Given the scale and persistence of this malicious activity, even those well-versed in cyber security practices can be vulnerable to North Korea's determination to compromise networks connected to cryptocurrency assets," the FBI warned.

Here's how the social engineering attacks typically go down.

North Korean cyber criminals scout out their targets by stalking would-be victims' social media accounts, "particularly on professional networking or employment-related platforms."

These services and job boards are familiar territory for Pyongyang's hackers. Previously, they've used fake LinkedIn job ads and posed as both jobseekers and/or employers to trick victims into downloading infostealers and other malware from malicious GitHub repos.

Kim Jong Un's cyber-scourges next initiate conversations with targets they've identified. Correspondence is sent in English and displays strong knowledge of crypto-related industries. Sometimes the crims pose as a mutual professional connection, an employee of a well-known company, or a recruiter. Whatever ruse they use, the goal is delivering malware in a way that "may appear natural and non-alerting."

The scammers aren't afraid to play a long game. "If successful in establishing bidirectional contact, the initial actor, or another member of the actor's team, may spend considerable time engaging with the victim to increase the sense of legitimacy and engender familiarity and trust," according to the FBI.

The Bureau has also compiled a list of potential indicators that a North Korean social engineer is attempting to scam you:

If you experience, or have experienced, any of these things, isolate potentially compromised devices ASAP and contact the FBI's Internet Crime Complaint Center along with local law enforcement agencies.

And as a general rule, don't download documents, GitHub packages, or other files from someone you meet on LinkedIn. Sadly, unsolicited job offers from well-known tech firms that offer compensation packages that seem too good to be true probably always are. ®

Send us news
6 Comments

Alleged Karakut ransomware scumbag charged in US

Plus: Microsoft issues workaround for dual-boot crashes; ARRL cops to ransom payment, and more

Volt Typhoon suspected of exploiting Versa SD-WAN bug since June

The same Beijing-backed cyber spy crew the feds say burrowed into US critical infrastructure

Iran's Pioneer Kitten hits US networks via buggy Check Point, Palo Alto gear

The government-backed crew also enjoys ransomware as a side hustle

Uncle Sam charges Russian GRU cyber-spies behind 'WhisperGate intrusions'

Feds post $10M bounty for each of the six's whereabouts

Transport for London confirms cyberattack, assures us all is well

Government body claims there is no evidence of customer data being compromised

Planned Parenthood confirms cyber-attack as RansomHub threatens to leak data

93GB of info feared pilfered in Montana by heartless crooks

Cicada ransomware may be a BlackCat/ALPHV rebrand and upgrade

Researchers find many similarities, and nasty new customizations such as embedded compromised user credentials

White House seizes 32 domains, issues criminal charges in massive election-meddling crackdown

Russia has seemingly decided who it wants Putin the Oval Office

Novel attack on Windows spotted in phishing campaign run from and targeting China

Resources hosted at Tencent Cloud involved in Cobalt Strike campaign

Iran hunts down double agents with fake recruiting sites, Mandiant reckons

Farsi-language posts target possibly-pro-Israel individuals

Feds claim sinister sysadmin locked up thousands of Windows workstations, demanded ransom

Sordid search history 'evidence' in case that could see him spend 35 years for extortion and wire fraud

Seattle airport 'possible cyberattack' snarls travel yet again

No word yet on if ransomware is to blame