This article comes from: ZachXBT
Compiled by Odaily Planet Daily ( @OdailyChina ); Translated by Azuma ( @azuma_eth )
Editor's Note: North Korean hackers have always been a major threat to the cryptocurrency market. In the past, victims and industry security professionals could only infer North Korean hackers' behavior patterns by reverse engineering related security incidents. However, yesterday, renowned on-chain detective ZachXBT, in a recent tweet, cited an investigation and analysis by a white-hat hacker who reverse-hackered North Korean hackers. This proactive analysis reveals the North Korean hackers' working methods for the first time , potentially providing positive insights into preemptive security measures for industry projects.
The following is the full text of ZachXBT, compiled by Odaily Planet Daily.
An anonymous hacker recently compromised the device of a North Korean IT worker, revealing how a five-person technical team operated over 30 fake identities , using fake government-issued IDs and purchased Upwork and LinkedIn accounts to infiltrate various development projects.
Investigators obtained Google Drive data, Chrome browser profiles, and device screenshots, which revealed that the team relied heavily on Google tools to coordinate work schedules, assign tasks, and manage budgets, with all communications conducted in English.
A weekly report from 2025 revealed the hacker team's work patterns and the difficulties they encountered. For example, one member complained that they "couldn't understand the job requirements and didn't know what to do." The corresponding solution was to "dedicate ourselves and work harder."
Detailed expense records show that their expenditure items include purchasing social security numbers (SSNs), Upwork and LinkedIn account transactions, renting phone numbers, subscribing to AI services, renting computers, and purchasing VPN/proxy services.
One spreadsheet detailed the schedule and scripts for meetings attended by the fictitious "Henry Zhang." The operational process revealed that these North Korean IT workers would first purchase Upwork and LinkedIn accounts, rent computer equipment, and then complete outsourced work using the AnyDesk remote control tool.
One of the wallet addresses they used to send and receive funds was: 0x78e1a4781d184e7ce6a124dd96e765e2bea96f2c ;
This address is closely linked to the $680,000 Favrr protocol attack in June 2025. Its CTO and other developers were later confirmed to be North Korean IT workers with forged credentials. This address has also been used to identify North Korean IT personnel involved in other infiltration projects.
The team also found the following key evidence in their search records and browser history.
One might ask, “How can we be sure they are from North Korea?” In addition to all the fraudulent documents detailed above, their search history also shows that they frequently use Google Translate and translate into Korean using a Russian IP.
Currently, the main challenges for enterprises in preventing North Korean IT workers are as follows:
- Lack of systematic collaboration: There is a lack of effective information sharing and cooperation mechanisms between platform service providers and private enterprises;
- Employer oversight: Hiring teams often become defensive after receiving risk warnings, or even refuse to cooperate with investigations;
- Impact of numerical advantage: Although its technical means are not complicated, it continues to penetrate the global job market with its huge base of job seekers;
- Funding conversion channels: Payment platforms such as Payoneer are frequently used to convert fiat currency income from development work into cryptocurrency;
I have introduced the indicators that need attention many times. If you are interested, you can check out my historical tweets. I will not repeat them here.
- 核心观点:朝鲜黑客团队伪造身份渗透加密项目。
- 关键要素:
- 团队操纵30+虚假身份,购买Upwork/LinkedIn账号。
- 使用谷歌工具协调工作,资金转换依赖Payoneer。
- 链上地址关联68万美元Favrr协议攻击事件。
- 市场影响:提升行业对伪造身份攻击的防范意识。
- 时效性标注:中期影响。
