By ZachXBT Compiled by Azuma, Daily Planet Editor's Note: North Korean hackers have always been a major threat to the cryptocurrency market. In the past, victims and industry security professionalsBy ZachXBT Compiled by Azuma, Daily Planet Editor's Note: North Korean hackers have always been a major threat to the cryptocurrency market. In the past, victims and industry security professionals

ZachXBT: After reverse hacking North Korean hackers' equipment, I understand their "working mode"

2025/08/14 19:00

By ZachXBT

Compiled by Azuma, Daily Planet

Editor's Note: North Korean hackers have always been a major threat to the cryptocurrency market. In the past, victims and industry security professionals could only infer North Korean hackers' behavior patterns by reverse engineering related security incidents. However, yesterday, renowned on-chain detective ZachXBT, in a recent tweet, cited an investigation and analysis by a white-hat hacker who reverse-hacked North Korean hackers. This proactive analysis reveals the North Korean hackers' working methods for the first time, potentially providing positive insights into preemptive security measures for industry projects.

The following is the full text of ZachXBT, compiled by Odaily Planet Daily.

An anonymous hacker recently compromised the device of a North Korean IT worker, revealing how a five-person technical team operated over 30 fake identities, using fake government-issued IDs and purchased Upwork and LinkedIn accounts to infiltrate various development projects.

Investigators obtained Google Drive data, Chrome browser profiles, and device screenshots, which revealed that the team relied heavily on Google tools to coordinate work schedules, assign tasks, and manage budgets, with all communications conducted in English.

A weekly report from 2025 revealed the hacker team's work patterns and the difficulties they encountered. For example, one member complained about "not understanding the job requirements and not knowing what to do," but the corresponding solution was to "dedicate yourself and work harder."

Detailed expense records show that their expenditure items include purchasing social security numbers (SSNs), Upwork and LinkedIn account transactions, renting phone numbers, subscribing to AI services, renting computers, and purchasing VPN/proxy services.

One spreadsheet detailed the schedule and scripts for meetings attended by the fictitious "Henry Zhang." The process revealed that these North Korean IT workers would first purchase Upwork and LinkedIn accounts, rent computer equipment, and then complete outsourced work using the AnyDesk remote control tool.

One of the wallet addresses they use to send and receive funds is:

0x78e1a4781d184e7ce6a124dd96e765e2bea96f2c;

This address is closely linked to the $680,000 Favrr protocol attack in June 2025. Its CTO and other developers were later confirmed to be North Korean IT workers with forged credentials. This address has also been used to identify North Korean IT personnel involved in other infiltration projects.

The team also found the following key evidence in their search records and browser history.

One might ask, “How can we be sure they are from North Korea?” In addition to all the fraudulent documents detailed above, their search history also shows that they frequently use Google Translate and translate into Korean using a Russian IP.

Currently, the main challenges for enterprises in preventing North Korean IT workers are as follows:

  • Lack of systematic collaboration: There is a lack of effective information sharing and cooperation mechanisms between platform service providers and private enterprises;
  • Employer oversight: Hiring teams often become defensive after receiving risk warnings, or even refuse to cooperate with investigations;
  • Impact of numerical advantage: Although its technical means are not complicated, it continues to penetrate the global job market with its huge base of job seekers;
  • Funding conversion channels: Payment platforms such as Payoneer are frequently used to convert fiat currency income from development work into cryptocurrency;

I have introduced the indicators that need attention many times. If you are interested, you can check out my historical tweets. I will not repeat them here.

Market Opportunity
Mode Network Logo
Mode Network Price(MODE)
$0,000615
$0,000615$0,000615
-1,96%
USD
Mode Network (MODE) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Exploring the Future of the Internet with ‘web3 with a16z’

Exploring the Future of the Internet with ‘web3 with a16z’

The post Exploring the Future of the Internet with ‘web3 with a16z’ appeared on BitcoinEthereumNews.com. Peter Zhang Sep 18, 2025 22:39 The podcast ‘web3 with a16z’ explores the transformative potential of Web3, offering insights from key industry figures on how this new internet era empowers users to own digital content. The podcast series “web3 with a16z” is shedding light on the transformative potential of the next generation of the internet, commonly referred to as Web3. This series, produced by a16z crypto, delves into how this burgeoning internet era empowers users, from artists to developers, to not just read or write but to own pieces of the digital landscape. Understanding Web3 In contrast to its predecessors, Web1 and Web2, which focused on reading and writing capabilities, Web3 introduces the concept of ownership. This shift is unlocking unprecedented levels of creativity and entrepreneurship, as individuals and organizations can now have a stake in the digital content they create or engage with. According to the a16z crypto, this ownership aspect is crucial in driving the next wave of innovation and economic opportunity in the digital realm. Diverse Content and Expert Insights The podcast doesn’t just stop at explaining the concepts; it offers a variety of formats and topics that cater to different interests within the crypto and Web3 space. From the latest trends to in-depth research and data insights, “web3 with a16z” provides a platform for top scientists and industry leaders to share their knowledge and expertise. This makes it a valuable resource for anyone looking to understand the nuances of crypto and the broader implications of Web3. A Resource for Builders and Users One of the core aims of the podcast is to serve as a definitive guide for both builders and users of the internet. Whether you are a coder, a company, or a community, the insights provided…
Share
BitcoinEthereumNews2025/09/19 19:50
Unstoppable: Why No Public Company Can Ever Catch MicroStrategy’s Massive Bitcoin Holdings

Unstoppable: Why No Public Company Can Ever Catch MicroStrategy’s Massive Bitcoin Holdings

BitcoinWorld Unstoppable: Why No Public Company Can Ever Catch MicroStrategy’s Massive Bitcoin Holdings Imagine trying to build a mountain of gold, only to discover
Share
bitcoinworld2025/12/17 14:30
How Crypto Could Reshape Finance, AI, and Privacy by 2026: A16z Crypto

How Crypto Could Reshape Finance, AI, and Privacy by 2026: A16z Crypto

The post How Crypto Could Reshape Finance, AI, and Privacy by 2026: A16z Crypto appeared on BitcoinEthereumNews.com. From stablecoin payments to AI-driven agents
Share
BitcoinEthereumNews2025/12/17 14:38