Fireblocks has disclosed details of a highly coordinated cyber campaign in which North Korean threat actors impersonated the company’s recruiters to target cryptoFireblocks has disclosed details of a highly coordinated cyber campaign in which North Korean threat actors impersonated the company’s recruiters to target crypto

Fireblocks Exposes Sophisticated Lazarus-Linked Hiring Scam

2026/01/23 15:04
4 min di lettura
Per feedback o dubbi su questo contenuto, contattateci all'indirizzo [email protected].

Fireblocks has disclosed details of a highly coordinated cyber campaign in which North Korean threat actors impersonated the company’s recruiters to target crypto developers with malware. The investigation, published on January 22, 2026, revealed that attackers linked to the Lazarus Group leveraged fake recruitment processes to compromise victims’ systems and steal sensitive digital asset credentials.

The operation, internally labeled Operation Contagious Interview by Fireblocks’ security team, demonstrated a high level of sophistication. Attackers posed as legitimate Fireblocks recruiters on LinkedIn and used realistic hiring workflows to establish credibility before delivering malicious payloads disguised as routine coding tasks.

Impersonation Tactics and Social Engineering

According to the findings, the attackers created multiple convincing LinkedIn profiles that appeared to belong to Fireblocks executives, recruiters, and hiring managers. These profiles included professional photographs, detailed employment histories, and network connections aligned with blockchain and technical roles. Unlike many phishing attempts, the campaign avoided obvious warning signs such as spelling mistakes or poor formatting.

Once developers engaged with these profiles, they were sent professionally designed PDF documents outlining a fictitious initiative referred to as the Fireblocks Poker Platform. To further reinforce authenticity, the attackers built detailed design mockups using tools such as Figma. The materials closely mirrored Fireblocks’ real branding and referenced the company’s recent acquisition of Dynamic, which had been announced only weeks earlier. This level of accuracy indicated that the attackers were actively monitoring Fireblocks’ public announcements.

Fake Interviews and Malware Delivery

The scam extended beyond written communication into live interaction. Victims were invited to video interviews conducted over Google Meet, where the impostors followed standard hiring practices by asking about work experience and compensation expectations. After establishing rapport, the interviewers assigned what was presented as a code review or technical assessment and abruptly ended the call, citing scheduling constraints.

The malicious stage of the attack occurred when candidates followed standard developer workflows. Victims were instructed to clone a GitHub repository and run npm install, a common setup step. Executing this command triggered hidden malicious code, granting attackers access to the victim’s system. The malware infrastructure also employed a technique known as EtherHiding, which uses blockchain smart contracts to host command-and-control instructions, making the operation more resilient to takedowns.

Attribution to the Lazarus Group

Fireblocks’ security research team attributed the campaign to APT 38, a subgroup of the Lazarus Group known for financially motivated cyber operations. The investigation identified similarities with earlier attacks, including a previous recruitment scam that impersonated Multibank Group and used a comparable fake poker platform as bait.

The primary objective of the operation was financial theft. By compromising developers’ machines, the attackers sought to steal credentials, private keys, seed phrases, and access to development environments. Because developers often have elevated access to production systems and sensitive repositories, successful infections could provide attackers with entry points into entire organizations.

Indicators and Campaign Disruption

Fireblocks identified at least twelve fake personas used during the campaign. Indicators of compromise included the use of personal email addresses instead of corporate domains, Calendly links hosted on non-corporate sites, AI-generated profile descriptions, and LinkedIn accounts with little historical activity that suddenly became active.

The campaign began to unravel when several job seekers contacted Fireblocks employees directly to ask about the supposed poker platform project. These inquiries were escalated internally, allowing the security team to confirm the impersonation. Fireblocks then worked with LinkedIn to report and remove fraudulent profiles and coordinated the takedown of malicious repositories.

Guidance for the Crypto Community

Fireblocks has stated that it coordinated with intelligence partners and law enforcement to reduce the risk of follow-on attacks. The company, which reports securing more than $10 trillion in digital asset transfers across hundreds of millions of wallets, emphasized the importance of vigilance during recruitment processes.

Job seekers in the crypto sector are advised to verify recruiter outreach against official company career pages and ensure that communications originate from verified corporate email addresses. Fireblocks also noted that being asked to clone repositories and run installation commands as part of an interview process should be treated with caution, even when the overall interaction appears legitimate.

The post Fireblocks Exposes Sophisticated Lazarus-Linked Hiring Scam appeared first on CoinTrust.

Disclaimer: gli articoli ripubblicati su questo sito provengono da piattaforme pubbliche e sono forniti esclusivamente a scopo informativo. Non riflettono necessariamente le opinioni di MEXC. Tutti i diritti rimangono agli autori originali. Se ritieni che un contenuto violi i diritti di terze parti, contatta [email protected] per la rimozione. MEXC non fornisce alcuna garanzia in merito all'accuratezza, completezza o tempestività del contenuto e non è responsabile per eventuali azioni intraprese sulla base delle informazioni fornite. Il contenuto non costituisce consulenza finanziaria, legale o professionale di altro tipo, né deve essere considerato una raccomandazione o un'approvazione da parte di MEXC.

Potrebbe anche piacerti

The $40 Million ‘Free Money’ Glitch in Crypto Prediction Markets

The $40 Million ‘Free Money’ Glitch in Crypto Prediction Markets

The post The $40 Million ‘Free Money’ Glitch in Crypto Prediction Markets appeared on BitcoinEthereumNews.com. In brief Researchers found $40 million in “risk-free” profits from mispriced markets on Polymarket in one year. Prices on some markets didn’t add up to 100%, letting traders lock in guaranteed gains. The same inefficiencies likely exist on other platforms like Myriad and Kalshi, though arbitrageurs help correct them. A new academic paper suggests there’s been a steady stream of “free money” lying around on Polymarket—and smart traders have been scooping it up. The paper, Unravelling the Probabilistic Forest: Arbitrage in Prediction Markets, is the most detailed look yet at how mispricing creeps into crypto’s most popular prediction platform. The researchers combed through a year of data, from April 2024 to April 2025, and found thousands of instances where market prices simply didn’t add up. In some cases, the prices of “Yes” and “No” shares in a single market didn’t sum to one dollar as they theoretically should, creating a risk-free profit for anyone quick enough to pounce.  In other cases, the mispricing was more subtle, involving logically related markets. For example, a market on “Trump wins the presidency” might trade at very different odds than “Republican wins the presidency,” even though those outcomes are tightly linked. By buying and selling combinations of these contracts, a savvy trader could lock in a profit no matter what happens. The researchers estimate more than $40 million in profits have already been pulled from the system by arbitrageurs, traders who specialize in sniffing out and exploiting these kinds of inconsistencies. Far from being a theoretical curiosity, this is a live and lucrative business model. Is this pattern true across all prediction markets? What’s striking is how common these opportunities are. The study found more than 7,000 markets with measurable mispricing, many in highly liquid, closely watched contracts. “Prediction markets are often treated…
Condividi
BitcoinEthereumNews2025/09/18 14:34
Trump Iran War Resolution: President Claims He Can End Conflict Anytime, Expects Swift Conclusion

Trump Iran War Resolution: President Claims He Can End Conflict Anytime, Expects Swift Conclusion

BitcoinWorld Trump Iran War Resolution: President Claims He Can End Conflict Anytime, Expects Swift Conclusion WASHINGTON, D.C. — President Donald Trump asserted
Condividi
bitcoinworld2026/03/11 22:50
Will the crypto market rally after February U.S. CPI holds at 2.4% as forecasted?

Will the crypto market rally after February U.S. CPI holds at 2.4% as forecasted?

The crypto market showed a muted reaction after US CPI data held at 2.4%, leaving investors watching Federal Reserve policy and Bitcoin price levels. The latest
Condividi
Crypto.news2026/03/11 22:37