The post North Korean crypto hackers got caught live — by fake laptops appeared on BitcoinEthereumNews.com. North Korean operatives were caught on camera, live, after security researchers lured them into a booby-trapped “developer laptop,” capturing how the Lazarus-linked crew tried to blend into a US crypto job pipeline using legitimate AI hiring tools and cloud services. The evolution in state-sponsored cybercrime was reportedly captured in real time by researchers at BCA LTD, NorthScan, and the malware-analysis platform ANY.RUN. Catching the North Korean attacker Hacker News shared how, in a coordinated sting operation, the team deployed a “honeypot,” which is a surveillance environment disguised as a legitimate developer’s laptop, to bait the Lazarus Group. The resulting footage offers the industry its clearest look yet at how North Korean units, specifically the Famous Chollima division, are bypassing traditional firewalls by simply getting hired by the target’s human resources department. The operation began when researchers created a developer persona and accepted an interview request from a recruiter alias known as “Aaron.” Instead of deploying a standard malware payload, the recruiter steered the target toward a remote employment arrangement common in the Web3 sector. When the researchers granted access to the “laptop,” which was actually a heavily monitored virtual machine designed to mimic a US-based workstation, the operatives did not attempt to exploit code vulnerabilities. Instead, they focused on establishing their presence as seemingly model employees. Building trust Once inside the controlled environment, the operatives demonstrated a workflow optimized for blending in rather than breaking in. They utilized legitimate job-automation software, including Simplify Copilot and AiApply, to generate polished interview responses and populate application forms at scale. This use of Western productivity tools highlights a disturbing escalation, showing that state actors are leveraging the very AI technologies designed to streamline corporate hiring to defeat them. The investigation revealed that the attackers routed their traffic through Astrill VPN to mask their… The post North Korean crypto hackers got caught live — by fake laptops appeared on BitcoinEthereumNews.com. North Korean operatives were caught on camera, live, after security researchers lured them into a booby-trapped “developer laptop,” capturing how the Lazarus-linked crew tried to blend into a US crypto job pipeline using legitimate AI hiring tools and cloud services. The evolution in state-sponsored cybercrime was reportedly captured in real time by researchers at BCA LTD, NorthScan, and the malware-analysis platform ANY.RUN. Catching the North Korean attacker Hacker News shared how, in a coordinated sting operation, the team deployed a “honeypot,” which is a surveillance environment disguised as a legitimate developer’s laptop, to bait the Lazarus Group. The resulting footage offers the industry its clearest look yet at how North Korean units, specifically the Famous Chollima division, are bypassing traditional firewalls by simply getting hired by the target’s human resources department. The operation began when researchers created a developer persona and accepted an interview request from a recruiter alias known as “Aaron.” Instead of deploying a standard malware payload, the recruiter steered the target toward a remote employment arrangement common in the Web3 sector. When the researchers granted access to the “laptop,” which was actually a heavily monitored virtual machine designed to mimic a US-based workstation, the operatives did not attempt to exploit code vulnerabilities. Instead, they focused on establishing their presence as seemingly model employees. Building trust Once inside the controlled environment, the operatives demonstrated a workflow optimized for blending in rather than breaking in. They utilized legitimate job-automation software, including Simplify Copilot and AiApply, to generate polished interview responses and populate application forms at scale. This use of Western productivity tools highlights a disturbing escalation, showing that state actors are leveraging the very AI technologies designed to streamline corporate hiring to defeat them. The investigation revealed that the attackers routed their traffic through Astrill VPN to mask their…

North Korean crypto hackers got caught live — by fake laptops

2025/12/04 06:12

North Korean operatives were caught on camera, live, after security researchers lured them into a booby-trapped “developer laptop,” capturing how the Lazarus-linked crew tried to blend into a US crypto job pipeline using legitimate AI hiring tools and cloud services.

The evolution in state-sponsored cybercrime was reportedly captured in real time by researchers at BCA LTD, NorthScan, and the malware-analysis platform ANY.RUN.

Catching the North Korean attacker

Hacker News shared how, in a coordinated sting operation, the team deployed a “honeypot,” which is a surveillance environment disguised as a legitimate developer’s laptop, to bait the Lazarus Group.

The resulting footage offers the industry its clearest look yet at how North Korean units, specifically the Famous Chollima division, are bypassing traditional firewalls by simply getting hired by the target’s human resources department.

The operation began when researchers created a developer persona and accepted an interview request from a recruiter alias known as “Aaron.” Instead of deploying a standard malware payload, the recruiter steered the target toward a remote employment arrangement common in the Web3 sector.

When the researchers granted access to the “laptop,” which was actually a heavily monitored virtual machine designed to mimic a US-based workstation, the operatives did not attempt to exploit code vulnerabilities.

Instead, they focused on establishing their presence as seemingly model employees.

Building trust

Once inside the controlled environment, the operatives demonstrated a workflow optimized for blending in rather than breaking in.

They utilized legitimate job-automation software, including Simplify Copilot and AiApply, to generate polished interview responses and populate application forms at scale.

This use of Western productivity tools highlights a disturbing escalation, showing that state actors are leveraging the very AI technologies designed to streamline corporate hiring to defeat them.

The investigation revealed that the attackers routed their traffic through Astrill VPN to mask their location and used browser-based services to handle two-factor authentication codes associated with stolen identities.

The endgame was not immediate destruction but long-term access. The operatives configured Google Remote Desktop via PowerShell with a fixed PIN, ensuring they could maintain control of the machine even if the host attempted to revoke privileges.

So, their commands were administrative, running system diagnostics to validate the hardware.

Essentially, they were not attempting to breach a wallet immediately.

Instead, the North Koreans sought to establish themselves as trusted insiders, positioning themselves to access internal repositories and cloud dashboards.

A billion-dollar revenue stream

This incident is part of a larger industrial complex that has turned employment fraud into a primary revenue driver for the sanctioned regime.

The Multilateral Sanctions Monitoring Team recently estimated that Pyongyang-linked groups stole approximately $2.83 billion in digital assets between 2024 and September 2025.

This figure, which represents roughly one-third of North Korea’s foreign currency income, suggests that cyber-theft has become a sovereign economic strategy.

The efficacy of this “human layer” attack vector was devastatingly proven in February 2025 during the breach of the Bybit exchange.

In that incident, attackers attributed to the TraderTraitor group used compromised internal credentials to disguise external transfers as internal asset movements, ultimately gaining control of a cold-wallet smart contract.

The compliance crisis

The shift toward social engineering creates a severe liability crisis for the digital asset industry.

Earlier this year, security firms such as Huntress and Silent Push documented networks of front companies, including BlockNovas and SoftGlide, that possess valid US corporate registrations and credible LinkedIn profiles.

These entities successfully induce developers to install malicious scripts under the guise of technical assessments.

For compliance officers and Chief Information Security Officers, the challenge has mutated. Traditional Know Your Customer (KYC) protocols focus on the client, but the Lazarus workflow necessitates a rigorous “Know Your Employee” standard.

The Department of Justice has already begun cracking down, seizing $7.74 million linked to these IT schemes, but the detection lag remains high.

As the BCA LTD sting demonstrates, the only way to catch these actors may be to shift from passive defense to active deception, creating controlled environments that force threat actors to reveal their tradecraft before they are handed the keys to the treasury.

Mentioned in this article

Source: https://cryptoslate.com/secret-footage-from-a-rigged-laptop-exposes-how-north-korean-spies-are-slipping-past-your-security-team/

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Strive CEO Urges MSCI to Reconsider Bitcoin-Holding Firms’ Index Exclusion

Strive CEO Urges MSCI to Reconsider Bitcoin-Holding Firms’ Index Exclusion

The post Strive CEO Urges MSCI to Reconsider Bitcoin-Holding Firms’ Index Exclusion appeared on BitcoinEthereumNews.com. MSCI’s proposed Bitcoin exclusion would bar companies with over 50% digital asset holdings from indexes, potentially costing firms like Strategy $2.8 billion in inflows. Strive CEO Matt Cole urges MSCI to let the market decide, emphasizing Bitcoin holders’ roles in AI infrastructure and structured finance growth. Strive’s letter to MSCI argues exclusion limits passive investors’ access to high-growth sectors like AI and digital finance. Nasdaq-listed Strive, the 14th-largest Bitcoin treasury firm, highlights how miners are diversifying into AI power infrastructure. The 50% threshold is unworkable due to Bitcoin’s volatility, causing index flickering and higher costs; JPMorgan analysts estimate significant losses for affected firms. Discover MSCI Bitcoin exclusion proposal details and Strive’s pushback. Learn impacts on Bitcoin treasury firms and AI diversification. Stay informed on crypto index changes—read now for investment insights. What is the MSCI Bitcoin Exclusion Proposal? The MSCI Bitcoin exclusion proposal seeks to exclude companies from its indexes if digital asset holdings exceed 50% of total assets, aiming to reduce exposure to volatile cryptocurrencies in passive investment vehicles. This move targets major Bitcoin treasury holders like Strategy, potentially disrupting billions in investment flows. Strive Enterprises, a key player in the space, has formally opposed it through a letter to MSCI’s leadership. How Does the MSCI Bitcoin Exclusion Affect Bitcoin Treasury Firms? The proposal could deliver a substantial setback to Bitcoin treasury firms by limiting their inclusion in widely tracked MSCI indexes, which guide trillions in passive investments globally. According to JPMorgan analysts, Strategy alone might see a $2.8 billion drop in assets under management if excluded from the MSCI World Index, as reported in their recent market analysis. This exclusion would hinder these firms’ ability to attract institutional capital, forcing them to compete at a disadvantage against traditional finance entities. Strive CEO Matt Cole, in his letter to…
Share
BitcoinEthereumNews2025/12/06 11:33
Snowflake and Anthropic Forge $200M AI Partnership for Global Enterprises

Snowflake and Anthropic Forge $200M AI Partnership for Global Enterprises

The post Snowflake and Anthropic Forge $200M AI Partnership for Global Enterprises appeared on BitcoinEthereumNews.com. Peter Zhang Dec 04, 2025 16:52 Snowflake and Anthropic unveil a $200 million partnership to integrate AI capabilities into enterprise data environments, enhancing AI-driven insights with Claude models across leading cloud platforms. In a strategic move to enhance AI capabilities for global enterprises, Snowflake and Anthropic have announced a significant partnership valued at $200 million. This multi-year agreement aims to integrate Anthropic’s Claude models into Snowflake’s platform, offering advanced AI-driven insights to over 12,600 global customers through leading cloud services such as Amazon Bedrock, Google Cloud Vertex AI, and Microsoft Azure, according to Anthropic. Expanding AI Capabilities This collaboration marks a pivotal step in deploying AI agents across the world’s largest enterprises. By leveraging Claude’s advanced reasoning capabilities, Snowflake aims to enhance its internal operations and customer offerings. The partnership facilitates a joint go-to-market initiative, enabling enterprises to extract insights from both structured and unstructured data while adhering to stringent security standards. Internally, Snowflake has already been utilizing Claude models to boost developer productivity and innovation. The Claude-powered GTM AI Assistant, built on Snowflake Intelligence, empowers sales teams to centralize data and query it using natural language, thereby streamlining deal cycles. Innovative AI Solutions for Enterprises Thousands of Snowflake customers are processing trillions of Claude tokens monthly via Snowflake Cortex AI. The partnership’s next phase will focus on deploying AI agents capable of complex, multi-step analysis. These agents, powered by Claude’s reasoning and Snowflake’s governed data environment, allow business users to ask questions in plain English and receive accurate answers, achieving over 90% accuracy on complex text-to-SQL tasks based on internal benchmarks. This collaboration is especially beneficial for regulated industries like financial services, healthcare, and life sciences, enabling them to transition from pilot projects to full-scale production confidently. Industry Impact and Customer…
Share
BitcoinEthereumNews2025/12/06 11:17