A compromised device from a North Korean IT worker has exposed the inner workings of the team behind the $680,000 Favrr hack and their use of Google tools to target crypto projects. According to on-chain sleuth ZachXBT, the trail began…A compromised device from a North Korean IT worker has exposed the inner workings of the team behind the $680,000 Favrr hack and their use of Google tools to target crypto projects. According to on-chain sleuth ZachXBT, the trail began…

North Korean IT workers used 30+ fake IDs to target crypto companies: report

2025/08/14 16:09
3 min read
For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

A compromised device from a North Korean IT worker has exposed the inner workings of the team behind the $680,000 Favrr hack and their use of Google tools to target crypto projects.

Summary
  • A compromised device belonging to a North Korean IT worker exposed the inner workings of threat actors.
  • Evidence shows operatives used Google powered tools, AnyDesk, and VPNs to infiltrate crypto firms.

According to on-chain sleuth ZachXBT, the trail began with an unnamed source who gained access to one of the workers’ computers, uncovering screenshots, Google Drive exports, and Chrome profiles that pulled back the curtain on how the operatives planned and carried out their schemes.

Drawing on wallet activity and matching digital fingerprints, ZachXBT verified the source material and tied the group’s cryptocurrency dealings to the June 2025 exploit of the fan-token marketplace Favrr. One wallet address, “0x78e1a,” showed direct links to stolen funds from the incident.

Inside the operation

The compromised device showed that the small team — six members in total — shared at least 31 fake identities. To land blockchain development jobs, they amassed government-issued IDs and phone numbers, even buying LinkedIn and Upwork accounts to complete their cover.

An interview script found on the device showed them boasting of experience at well-known blockchain firms, including Polygon Labs, OpenSea, and Chainlink.

Google tools were central to their organized workflow. The threat actors were found to be using drive spreadsheets to track budgets and schedules, while Google Translate bridged the language gap between Korean and English. 

Among the information pulled from the device was a spreadsheet that showed IT workers were renting computers and paying for VPN access to buy fresh accounts for their operations.

The team also relied on remote access tools such as AnyDesk, allowing them to control client systems without revealing their true locations. VPN logs tied their activity to multiple regions, masking North Korean IP addresses.

Additional findings revealed the group looking up ways to deploy tokens across different blockchains, scouting AI firms in Europe, and mapping out fresh targets in the crypto space.

North Korean threat actors use remote jobs

ZachXBT found the same pattern flagged in multiple cybersecurity reports — North Korean IT workers landing legitimate remote jobs to slip into the crypto sector. By posing as freelance developers, they gain access to code repositories, backend systems, and wallet infrastructure.

One document uncovered on the device was interview notes and preparation materials likely meant to be kept on-screen or nearby during calls with potential employers.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

OurCryptoMiner Introduces USDC Dual Mining Model

OurCryptoMiner Introduces USDC Dual Mining Model

The post OurCryptoMiner Introduces USDC Dual Mining Model appeared on BitcoinEthereumNews.com. In 2025, amidst heightened cryptocurrency market volatility, OurCryptoMiner pioneered the USDC dual mining model, deeply integrating the stability of stablecoins with BTC mining. Through hashrate contracts, users can simultaneously earn dual output of USDC (pegged 1:1 to the US dollar) and major cryptocurrencies. This model aims to reduce exposure to a single asset while using a dynamic allocation algorithm. This model is particularly suitable for investors seeking stable returns, providing an alternative to traditional single-asset mining. OurCryptoMiner’s Core Advantages: Triple Industry Breakthroughs 1. Green Dual Mining, – Mining BTC with USDC, Powering the Future with Clean Energy USDC guarantees stable base returns while unlocking asset appreciation potential, resulting in an overall return rate 100%+ higher than traditional single mining. 2. Zero-Entry, Smart Participation No need to purchase mining equipment or possess technical knowledge; users can enable the USDC AI algorithm to automatically optimize dual-mining strategies. 3. Compliance, Transparency, and Secure Operations All platform revenue is based on real on-chain activity, with clear and traceable sources. Users can view revenue details in real time, with fully transparent and public data, ensuring comprehensive fund security. OurCryptoMiner’s Four-Step Profit Path 1. Registration and Verification Newcomers can experience risk-free mining. Register now to receive $12 and start profiting. 2. Choose a Hashrate Plan Flexible contract hashrate based on funding needs, supporting payments in multiple currencies such as USDC, BTC, and ETH. 3. Enable Dual Mining The system automatically allocates hashrate to USDC and the target cryptocurrency, enabling dual mining. 4. Manage Settlements Profits are settled daily and can be withdrawn to USDC or crypto assets at any time, or reinvested with one click for continuous growth. OurCryptoMiner users can choose a contract based on their needs and quickly start dual-mining mode: Contract Example: Beginner Trial Plan Investment: $100 | Duration: 2 days | Daily…
Share
BitcoinEthereumNews2025/09/20 01:45
Wormhole token soars following tokenomics overhaul, W reserve launch

Wormhole token soars following tokenomics overhaul, W reserve launch

                                                                               Wormhole’s native token has had a tough time since launch, debuting at $1.66 before dropping significantly despite the general crypto market’s bull cycle.                     Wormhole, an interoperability protocol facilitating asset transfers between blockchains, announced updated tokenomics to its native Wormhole (W) token, including a token reserve and more yield for stakers. The changes could affect the protocol’s governance, as staked Wormhole tokens allocate voting power to delegates.According to a Wednesday announcement, three main changes are coming to the Wormhole token: a W reserve funded with protocol fees and revenue, a 4% base yield for staking with higher rewards for active ecosystem participants, and a change from bulk unlocks to biweekly unlocks.“The goal of Wormhole Contributors is to significantly expand the asset transfer and messaging volume that Wormhole facilitates over the next 1-2 years,” the protocol said. According to Wormhole, more tokens will be locked as adoption takes place and revenue filters back to the company.Read more
Share
Coinstats2025/09/18 02:41
Xiaomi Stock: Flagship Phones Launch as Memory Prices Surge 80–90%

Xiaomi Stock: Flagship Phones Launch as Memory Prices Surge 80–90%

TLDR Xiaomi launched the Xiaomi 17 and 17 Ultra globally at Mobile World Congress, priced at 999 euros and 1,499 euros respectively Memory chip prices have surged
Share
Coincentral2026/03/02 18:30