{
    "id": 49432,
    "date": "2025-09-26T18:12:41",
    "date_gmt": "2025-09-26T11:12:41",
    "guid": {
        "rendered": "https:\/\/hbbgroup.net\/crypto-needs-dual-wallet-management-ai-monitoring-of-north-korean-hackers\/"
    },
    "modified": "2025-09-26T18:12:41",
    "modified_gmt": "2025-09-26T11:12:41",
    "slug": "crypto-needs-dual-wallet-management-ai-monitoring-of-north-korean-hackers",
    "status": "publish",
    "type": "post",
    "link": "https:\/\/hbbgroup.net\/en_us\/crypto-needs-dual-wallet-management-ai-monitoring-of-north-korean-hackers\/",
    "title": {
        "rendered": "Crypto needs dual wallet management, AI monitoring of North Korean hackers"
    },
    "content": {
        "rendered": "<div data-v-43e640e6>\n<p>Cryptocurrency companies need to strengthen defenses against North Korean hackers who are seeking jobs at major Web3 businesses to stage large-scale exploits, security experts told Cointelegraph.<\/p>\n<p>Hiring North Korean developers may open a crypto project\u2019s infrastructure to the threat of hacks and data breaches similar to the <a data-ct-non-breakable=\"null\" href=\"https:\/\/cointelegraph.com\/news\/coinbase-breach-physical-crime-techcrunch-founder\" title=\"null\">Coinbase data breach<\/a> in May, which exposed the wallet balances and physical locations of about 1% of the exchange\u2019s monthly users, potentially costing the exchange up to $400 million in reimbursement expenses.<\/p>\n<p>To fight this growing threat, the industry needs to adopt enhanced wallet management standards, real-time AI monitoring for the early prevention of exploits and more secure employee vetting practices, crypto security experts told Cointelegraph.<\/p>\n<p>\u201cOrganizations need to treat the DPRK [Democratic People\u2019s Republic of Korea] IT worker risk seriously,\u201d with \u201cthorough background checks and strict role-based access,\u201d said Yehor Rudytsia, head of forensics and incident response at blockchain cybersecurity company Hacken.<\/p>\n<p>Crypto companies must also follow \u201cCCSS practices for wallet operations (dual control, audit trails, identity verification),\u201d Rudytsia told Cointelegraph. \u201cOn top of that, keep enhanced logging, monitor for unusual activity, and review cloud setups often. The key is simple: keep verifying, keep monitoring, and don\u2019t rely on trust alone.\u201d<\/p>\n<p>Dual wallet control is a type of <a data-ct-non-breakable=\"null\" href=\"https:\/\/cointelegraph.com\/learn\/articles\/what-is-multisignature-wallet\" rel=\"https:\/\/cointelegraph.com\/learn\/articles\/what-is-multisignature-wallet\" target=\"https:\/\/cointelegraph.com\/learn\/articles\/what-is-multisignature-wallet\" title=\"https:\/\/cointelegraph.com\/learn\/articles\/what-is-multisignature-wallet\">multisignature wallet<\/a>, which requires multiple key holders to sign a transaction for confirmation.<\/p>\n<p>While most North Korean developers are not hackers, their wages help fund the state, which has become a leading cybercrime threat to the crypto industry.<\/p>\n<p><em><strong>Related: <\/strong><\/em><a data-ct-non-breakable=\"null\" href=\"https:\/\/cointelegraph.com\/news\/circle-examines-reversible-stablecoin-transactions\" title=\"null\"><em><strong>Circle explores \u2018reversible\u2019 USDC transactions in break from crypto ethos<\/strong><\/em><\/a><\/p>\n<p>A week ago, Binance co-founder Changpeng <a data-ct-non-breakable=\"null\" href=\"https:\/\/cointelegraph.com\/news\/cz-crypto-seal-60-north-korean-hackers\" title=\"null\">Zhao sounded the alarm<\/a> on the growing threat of North Korean hackers seeking to infiltrate crypto companies through employment opportunities and bribes.<\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/s3.cointelegraph.com\/uploads\/2025-09\/01998590-a475-7ed3-a45c-ade589224943\" title><figcaption><em>Source: Changpeng <\/em><a data-ct-non-breakable=\"null\" href=\"https:\/\/x.com\/cz_binance\/status\/1968533125929058454\" rel=\"https:\/\/x.com\/cz_binance\/status\/1968533125929058454\" target=\"https:\/\/x.com\/cz_binance\/status\/1968533125929058454\" title=\"https:\/\/x.com\/cz_binance\/status\/1968533125929058454\"><em>Zhao<\/em><\/a><\/figcaption><\/figure>\n<p>His warning came after an ethical hacker group called Security Alliance (SEAL) published the profiles of at least 60 North Korean agents posing as IT workers under fake names, seeking US employment.<\/p>\n<p>The repository contained key information on North Korean impersonators, including aliases, fake names and email used, along with websites, both real and fake citizenships, addresses, locations and the numbers of firms that hired them.<\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/s3.cointelegraph.com\/uploads\/2025-09\/01998590-a9ef-785f-b59d-e16a10c09177\" title><figcaption><em>SEAL team repository of 60 North Korean IT worker impersonators. Source: lazarus.group\/team<\/em><\/figcaption><\/figure>\n<p><em><strong>Related: <\/strong><\/em><a data-ct-non-breakable=\"null\" href=\"https:\/\/cointelegraph.com\/news\/wlfi-advisor-longs-2-2m-avax-10x-leverage-550m-avalanche-treasury-announcement\" title=\"null\"><em><strong>World Liberty adviser bets millions as corporate treasuries fuel AVAX rally<\/strong><\/em><\/a><\/p>\n<h2>Real-time AI threat monitoring can save crypto companies from data breaches<\/h2>\n<p>Experts also recommend adopting artificial intelligence for real-time threat detection.<\/p>\n<p>\u201cNorth Korean IT workers are infiltrating crypto firms to gain insider access and move stolen funds or to steal data,\u201d Deddy Lavid, co-founder and CEO of blockchain cybersecurity company Cyvers, told Cointelegraph, adding:<\/p>\n<blockquote data-ct-non-breakable=\"undefined\"><p>\u201cThe Coinbase breach was a warning. Proactive, AI-driven monitoring is how to stop the next one.\u201d<\/p><\/blockquote>\n<p>Lavid said AI-based anomaly detection in hiring and linking onchain and offchain data could further protect firms.<\/p>\n<p>In June, four North Korean operatives infiltrated multiple crypto companies as freelance developers, stealing a cumulative <a data-ct-non-breakable=\"null\" href=\"https:\/\/cointelegraph.com\/learn\/articles\/how-4-north-korean-agents-stole-900k-from-a-us-crypto-startup\" title=\"null\">$900,000 from these<\/a> startups, illustrating the threat.\u00a0<\/p>\n<p><iframe width=\"100%\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/NDv0RfehETQ?start=\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen loading=\"lazy\"><\/iframe><\/p>\n<p><em><strong>Magazine: <\/strong><\/em><a data-ct-non-breakable=\"null\" href=\"https:\/\/cointelegraph.com\/magazine\/rwa-hail-mary-china-thai-big-secret-crypto-hack-asia-express\/\" title=\"null\"><em><strong>Thailand\u2019s \u2018Big Secret\u2019 crypto hack, Chinese developer\u2019s RWA tokens: Asia Express<\/strong><\/em><\/a><\/p>\n<p><template data-name=\"subscription_form\" data-type=\"defi_newsletter\" label=\"Subscription Form: DeFi Newsletter\"><\/template><\/div>",
        "protected": false
    },
    "excerpt": {
        "rendered": "<p>Cryptocurrency companies need to strengthen defenses against North Korean hackers who are seeking jobs at major Web3 businesses to stage [&hellip;]<\/p>",
        "protected": false
    },
    "author": 5,
    "featured_media": 49433,
    "comment_status": "open",
    "ping_status": "open",
    "sticky": false,
    "template": "",
    "format": "standard",
    "meta": {
        "_acf_changed": false,
        "footnotes": ""
    },
    "categories": [
        220
    ],
    "tags": [],
    "class_list": [
        "post-49432",
        "post",
        "type-post",
        "status-publish",
        "format-standard",
        "has-post-thumbnail",
        "hentry",
        "category-tien-dien-tu"
    ],
    "acf": [],
    "_links": {
        "self": [
            {
                "href": "https:\/\/hbbgroup.net\/en_us\/wp-json\/wp\/v2\/posts\/49432",
                "targetHints": {
                    "allow": [
                        "GET"
                    ]
                }
            }
        ],
        "collection": [
            {
                "href": "https:\/\/hbbgroup.net\/en_us\/wp-json\/wp\/v2\/posts"
            }
        ],
        "about": [
            {
                "href": "https:\/\/hbbgroup.net\/en_us\/wp-json\/wp\/v2\/types\/post"
            }
        ],
        "author": [
            {
                "embeddable": true,
                "href": "https:\/\/hbbgroup.net\/en_us\/wp-json\/wp\/v2\/users\/5"
            }
        ],
        "replies": [
            {
                "embeddable": true,
                "href": "https:\/\/hbbgroup.net\/en_us\/wp-json\/wp\/v2\/comments?post=49432"
            }
        ],
        "version-history": [
            {
                "count": 0,
                "href": "https:\/\/hbbgroup.net\/en_us\/wp-json\/wp\/v2\/posts\/49432\/revisions"
            }
        ],
        "wp:featuredmedia": [
            {
                "embeddable": true,
                "href": "https:\/\/hbbgroup.net\/en_us\/wp-json\/wp\/v2\/media\/49433"
            }
        ],
        "wp:attachment": [
            {
                "href": "https:\/\/hbbgroup.net\/en_us\/wp-json\/wp\/v2\/media?parent=49432"
            }
        ],
        "wp:term": [
            {
                "taxonomy": "category",
                "embeddable": true,
                "href": "https:\/\/hbbgroup.net\/en_us\/wp-json\/wp\/v2\/categories?post=49432"
            },
            {
                "taxonomy": "post_tag",
                "embeddable": true,
                "href": "https:\/\/hbbgroup.net\/en_us\/wp-json\/wp\/v2\/tags?post=49432"
            }
        ],
        "curies": [
            {
                "name": "wp",
                "href": "https:\/\/api.w.org\/{rel}",
                "templated": true
            }
        ]
    }
}