Are North Korean IT Remote Workers Targeting Crypto Firms? Here’s What We Know

According to the US Government, North Korean IT workers are flooding the freelance market. It’s illegal for US businesses to employ them, but, what if they have no idea they’re doing it? In this new remote work world we’re living in, it’s completely possible. The North Korean workers are targeting all kinds of technology-focused businesses, but of course, the CNN report on the matter focused on cryptocurrency firms.

“It’s an elaborate money-making scheme that relies on front companies, contractors and deception to prey on a volatile industry that is always on the hunt for top talent. North Korean tech workers can earn more than $300,000 annually — hundreds of times the average income of a North Korean citizen — and up to 90% of their wages go to the regime, according to the US advisory.”

In contrast, this is what the US Government actually published: 

“The DPRK dispatches thousands of highly skilled IT workers around the world to generate revenue that contributes to its weapons of mass destruction (WMD) and ballistic missile programs, in violation of U.S. and UN sanctions. These IT workers take advantage of existing demands for specific IT skills, such as software and mobile application development, to obtain freelance employment contracts from clients around the world, including in North America, Europe, and East Asia.”

It’s worth noting that the document doesn’t mention “crypto” or “bitcoin,” but let’s read what mainstream media has to say.

How Does CNN Relate North Korean IT Workers To Crypto?  

The plan is simple, to associate this new development with the numerous crypto-related hacks that NewsBTC has timely reported on: 

“North Korean government-backed hackers have stolen the equivalent of billions of dollars in recent years by raiding cryptocurrency exchanges, according to the United Nations. In some cases, they’ve been able to nab hundreds of millions of dollars in a single heist, the FBI and private investigators say.”

To establish authority, CNN also quotes US Government-related individuals, like “Soo Kim, a former North Korea analyst at the CIA.” She said, “(The North Koreans) take this very seriously. It’s not just some rando in his basement trying to mine cryptocurrency it’s a way of life.” Is she talking about the hackers or the job hunters, though? “Even though the tradecraft is not perfect right now, in terms of their ways of approaching foreigners and preying upon their vulnerabilities, it’s still a fresh market for North Korea,” she said later, apparently talking about the job hunters.

Another authority figure CNN features is “Fred Plan, principal analyst at cybersecurity firm Mandiant, which investigated suspected North Korean tech workers”. He says, “Most of these crypto firms and services are still a long way off from the security posture that we see with traditional banks and other financial institutions”. He’s right about that, but, what does that have to do with freelancers looking for jobs in IT?

ETH price chart for 07/12/2022 on FTX | Source: ETH/USD on TradingView.com
What About Those Hacks That Everyone Keeps Talking About?

The only authority figure that relates the IT workers to North Korean hackers is “Nick Carlsen, who until last year was an FBI intelligence analyst focused on North Korea.” What this man says might be the most important part of the article. “These guys know each other. Even if a particular IT worker isn’t a hacker, he absolutely knows one. Any vulnerability they might identify in a client’s systems would be at grave risk.”

The CNN article keeps it as vague as possible regarding the hacks:

“Pyongyang-linked hackers in March stole what was then the equivalent of $600 million in cryptocurrency from a Vietnam-based video gaming company, according to the FBI. And North Korean hackers were likely behind a $100 million heist at a California-based cryptocurrency firm, according to blockchain analysis firm Elliptic.”

Luckily for you, NewsBTC is here to help.

What Does NewsBTC Know About The North Korean Hackers?

The first item seems to refer to the Axie Infinity/ Ronin hack. About that one, we reported:

“The alphabet agency traced the funds to wallets associated with North Korean hacking group Lazarus. Does The Block’s article complete or negate this version of the story? It’s hard to see North Koreans pulling a stunt quite like this.

In any case, at the time the FBI was extremely clear in a statement quoted here: 

“Through our investigation we were able to confirm Lazarus Group and APT38, cyber actors associated with the DPRK, are responsible for the theft of $620 million in Ethereum reported on March 29th.”

If the IT remote workers’ story is true, we were wrong by saying, “It’s hard to see North Koreans pulling a stunt quite like this.” The second item seems to refer to the Harmony hack, and to describe that one we’ll quote our sister site Bitcoinist, who reported:

“The United States government believes that Lazarus was acting on behalf of North Korea’s covert intelligence service. Elliptic, a blockchain analytics company, disclosed in a report that: “The theft was achieved by compromising the cryptographic keys of a multi-signature wallet — most likely through a social engineering attack on members of the Harmony team. The Lazarus Group has routinely employed such methods.”

And that’s what we know so far. Are the North Korean IT workers related to the hackers? Probably so, but, the US Government didn’t even mention cryptocurrencies or bitcoin in their “Guidance on the Democratic People’s Republic of Korea information technology workers.”

Featured Image taken from this post | Charts by TradingView

Are A Fake Job Offer And A .Pdf Responsible For The Axie Infinity/ Ronin Hack?

The latest report on the Axie Infinity/ Ronin bridge hack is too good to be true. Especially considering the FBI claims a North Korea-sponsored hacking group is responsible for it. “A senior engineer at Axie Infinity was duped into applying for a job at a company that, in reality, did not exist,” The Block reports. That’s not all, apparently, the hackers’ spyware got into the system through a simple .pdf file. Unbelievable that a $622M hack started that way. 

The Ronin Network is an Ethereum sidechain that exclusively serves Axie Infinity. Both a billion-dollar business and a fun app with a thriving internal economy and an international audience, the play-to-earn game was one of the bull market’s biggest success stories. Sky Mavis is the studio behind Axie Infinity. And one of its programmers apparently fell victim to the simplest social engineering trick in the book.

Is North Korea To Blame?

According to surveillance firm Chainalysis, North Korea-sponsored hackers stole over $400M in 2021 alone. And according to the FBI, they’re responsible for the  Axie Infinity/ Ronin hack. The alphabet agency traced the funds to wallets associated with North Korean hacking group Lazarus. Does The Block’s article complete or negate this version of the story? It’s hard to see North Koreans pulling a stunt quite like this.

In any case, at the time the FBI was extremely clear in a statement quoted here: 

“Through our investigation we were able to confirm Lazarus Group and APT38, cyber actors associated with the DPRK, are responsible for the theft of $620 million in Ethereum reported on March 29th.”

If true, they broke their 2021 record with just one operation.  

How Did The Axie Infinity/ Ronin Hack Happen?

The hack’s supposed story is hilarious, to say the least. According to The Block: 

“Earlier this year, staff at Axie Infinity developer Sky Mavis were approached by people purporting to represent the fake company and encouraged to apply for jobs, according to the people familiar with the matter.”

After several rounds of interviews, one of Sky Mavis’ developers got an extremely generous offer. He opened up Pandora’s box and all hell broke loose.

“The fake “offer” was delivered in the form of a PDF document, which the engineer downloaded — allowing spyware to infiltrate Ronin’s systems. From there, hackers were able to attack and take over four out of nine validators on the Ronin network — leaving them just one validator short of total control.”

To complete the attack, they took control of another entity. Once upon a time, “the Axie DAO allowlisted Sky Mavis to sign various transactions on its behalf.” The permissions were still valid and the hackers took advantage of them. The Ronin bridge’s operators’ post-mortem on the attack describes the fallout.

“The attacker managed to get control over five of the nine validator private keys — 4 Sky Mavis validators and 1 Axie DAO — in order to forge fake withdrawals. This resulted in 173,600 Ethereum and 25.5M USDC drained from the Ronin bridge in two transaction”

Did Lazarus’ operators orchestrate such a Hollywoodesque attack? Or does the comedic modus operandi implicate other perpetrators?

AXS price chart on FTX | Source: AXS/USD on TradingView.com
Previous Coverage Of The Axie Infinity/ Ronin Hack

Let’s turn to archival material to complete the story and add extra detail. After the breach happened, NewsBTC reported on Axie Infinity and Sky Mavis’ first solution to the problem:

“The latest move announced is a $1 million bug bounty program that invites white hat hackers to stress test the blockchain.

Co-Founder and COO of Sky Mavis and Axie announced: “Calling all whitehats in the blockchain space. The Sky Mavis Bug Bounty program is here. Help us keep the Ronin Network secure while earning a bounty up to $1,000,000 in bounty for fatal bugs.”

And then, when operators reopened the new and improved Ronin bridge, our sister site Bitcoinist reviewed its characteristics:

“In addition to the two independent audits on its smart contracts, the Ronin Bridge’s new design has implemented a new “circuit-breaker” feature. This was directly added to prevent a bad actor from replicating the previous attack or exploiting any potential new attack vector.”

So, the Ronin bridge seems to be safe to use at the moment. It also seemed to be safe to use before the hack, though. Do your own research and be safe out there.

Featured Image by Niek Verlaan from Pixabay | Charts by TradingView