Cryptocurrency Industry's Espionage War Escalates: 40% of Job Applicants Allegedly North Korean Agents?
Original Title: North Korean crypto infiltration is much worse than everyone thinks, says SEAL member
Original Author: Pedro Solimano, DL News
Original Translation: Deep Tide TechFlow
North Korean operatives have already infiltrated 15%-20% of crypto companies.
According to a SEAL member, 30%-40% of job applications in the crypto industry may originate from North Korean operatives.
The crypto industry has been criticized for having "the worst operational security (opsec) in the entire computer industry," said Pablo Sabbatella.
The extent of North Korea's infiltration into the crypto industry is far beyond people's awareness.
Pablo Sabbatella, founder of the Web3 audit company Opsek and current Security Alliance member, dropped a bombshell at the Devconnect conference in Buenos Aires: North Korean operatives may have infiltrated up to 20% of crypto companies.
"The situation in North Korea is much worse than everyone imagines," Sabbatella told DL News in an interview. He even shockingly pointed out that 30%-40% of job applications in the crypto industry may come from North Korean operatives trying to infiltrate relevant organizations in this way.
If these estimates are true, their potential for disruption would be incredibly high.
More importantly, North Korea's infiltration is not just about stealing funds through hacking techniques, although they have already stolen billions through sophisticated malware and social engineering tactics. The bigger issue is that these operatives will be hired by legitimate companies, gain system permissions, and manipulate the infrastructure supporting major crypto companies.
According to a report from the U.S. Treasury Department in November of last year, North Korean hackers have stolen over $3 billion in cryptocurrency over the past three years. These funds were subsequently used to support Pyongyang's nuclear weapons program.
How Do North Korean Operatives Infiltrate the Crypto Industry?
North Korean workers typically do not directly apply for positions because international sanctions prevent them from participating in the recruitment process under their true identities.
On the contrary, they will seek uninformed global remote workers to act as "agents." Some of these agents have even transitioned into recruiters, helping North Korean operatives use stolen identities to hire more overseas collaborators.
According to a recent report by Security Alliance, these recruiters reach out to individuals worldwide through freelance platforms (such as Upwork and Freelancer), with a focus mainly on Ukraine, the Philippines, and other developing countries.
Their "transaction" is quite simple: they provide verified account credentials or allow North Korean operatives to remotely use your identity. In return, collaborators can receive 20% of the income, while the North Korean operatives retain 80%.
Sabbatella stated that many North Korean hackers target the United States.
"Their approach is to find Americans to be their 'front end,'" Sabbatella explained, "They will pretend to be from China, unable to speak English, needing someone to help with interviews."
They will then infect the "front end" individual's computer with malware to obtain a US IP address, allowing them to access more internet resources than when in North Korea.
Once hired, these hackers are usually not dismissed because their performance satisfies the company.
"They are highly efficient, work long hours, and never complain," Sabbatella said in an interview with DL News.
Sabbatella provided a simple test method: "Ask them if they think Kim Jong Un is weird or has any flaws." He said, "They are not allowed to say anything negative."
Operational Security Vulnerabilities
However, North Korea's success does not solely rely on sophisticated social engineering.
Cryptocurrency companies—and users—have made it all easier.
"The cryptocurrency industry may be the worst in operational security (opsec) in the entire computer industry," Sabbatella said. He criticized that the founders of cryptocurrency companies are "fully doxxed, perform poorly in protecting private keys, and are easily susceptible to social engineering."
Operational Security (OPSEC) is a systematic process used to identify and protect key information from adversary threats.
The lack of operational security can lead to a high-risk environment. "Almost everyone's computer will be infected with malware at least once in their lifetime," Sabbatella said.
Update Statement
Update: This article has been updated to reflect Sabbatella's clarification that North Korea does not control 30%-40% of crypto applications; this percentage actually refers to the proportion of North Korean operatives in crypto industry job applications.
You may also like

Trump’s World Liberty Financial Token Ends 2025 Significantly Down
Key Takeaways World Liberty Financial, led by the Trump family, witnessed its token value drop by over 40%…

HashKey Secures $250M for New Crypto Fund Amid Strong Institutional Interest
Key Takeaways HashKey Capital successfully secured $250 million for the initial close of its fourth crypto fund, showcasing…

Crypto Market Slump Unveils Disparity Between VC Valuations and Market Caps
Key Takeaways Recent market downturns highlight discrepancies between venture capital (VC) valuations of crypto projects and their current…

Philippines Cracks Down on Unlicensed Crypto Exchanges: Coinbase and Gemini Blocked
Key Takeaways The Philippine government is increasing regulatory oversight on cryptocurrency exchanges, requiring local licenses for operations. Internet…

Amplify ETFs for Stablecoins and Tokenization Begin Trading
Key Takeaways Amplify’s newly launched ETFs focus on tracking companies contributing to the development of stablecoins and tokenization…

JPMorgan Explores Cryptocurrency Trading for Institutional Clients
Key Takeaways JPMorgan Chase is considering introducing cryptocurrency trading services to its institutional clientele, marking a notable shift…

Palmer Luckey’s Erebor Reaches $4.3B Valuation as Bank Charter Progresses
Key Takeaways: Erebor, a digital bank co-founded by Palmer Luckey, has raised $350 million, bringing its valuation to…

Trump Family-Linked USD1 Stablecoin Gains $150M as Binance Unveils Yield Program
Key Takeaways The USD1 stablecoin, associated with the Trump family, increased its market capitalization by $150 million following…

Hong Kong Moves Forward with Licensing Regimes for Virtual Asset Dealers and Custodians
Key Takeaways Hong Kong’s FSTB and SFC are implementing new licensing requirements for virtual asset dealers and custodians…

Kalshi First Research Report: When Predicting CPI, Crowd Wisdom Beats Wall Street Analysts

Venture Capital Post-Mortem 2025: Hashrate is King, Narrative is Dead

Are Those High-Raised 2021 Projects Still Alive?

High Fees, Can't Beat the Market Even After Paying 10x More, What Exactly Are Top Hedge Funds Selling?

Key Market Information Discrepancy on December 24th - A Must-See! | Alpha Morning Report
AI Trading Risks in Crypto Markets: Who Takes Responsibility When It Fails?
AI trading is already core market infrastructure, but regulators still treat it as a tool — responsibility always stays with the humans and platforms behind it. The biggest risk in 2025 is not rogue algorithms, but mass-adopted AI strategies that move markets in sync and blur the line between tools and unlicensed advice. The next phase of AI trading is defined by accountability and transparency, not performance — compliance is now a survival requirement, not a constraint.

Why Did Market Sentiment Completely Collapse in 2025? Decoding Messari's Ten-Thousand-Word Annual Report

Twitter 上的「虚假流量」是指通过操纵关注者数量、喜欢和转发等指标来人为增加一条推文的影响力和可信度。下面是一些常见的制造虚假流量的方法: 1. <b>购买关注者:</b> 一些用户会通过购买关注者来迅速增加他们的关注者数量,从而让他们的账号看起来更受欢迎。 2. <b>使用机器人账号:</b> 制造虚假流量的另一种常见方法是使用机器人账号自动执行喜欢、转发和评论等互动操作,从而提高一条推文的互动量。 3. <b>推文交换:</b> 一些用户之间会进行推文交换,即互相喜欢、转发对方的推文...

In Vietnam, USDT’s Use and the Reality of Web3 Adoption
Key Takeaways Vietnam has emerged as a leading nation in the adoption of cryptocurrencies, despite cultural and regulatory…
Trump’s World Liberty Financial Token Ends 2025 Significantly Down
Key Takeaways World Liberty Financial, led by the Trump family, witnessed its token value drop by over 40%…
HashKey Secures $250M for New Crypto Fund Amid Strong Institutional Interest
Key Takeaways HashKey Capital successfully secured $250 million for the initial close of its fourth crypto fund, showcasing…
Crypto Market Slump Unveils Disparity Between VC Valuations and Market Caps
Key Takeaways Recent market downturns highlight discrepancies between venture capital (VC) valuations of crypto projects and their current…
Philippines Cracks Down on Unlicensed Crypto Exchanges: Coinbase and Gemini Blocked
Key Takeaways The Philippine government is increasing regulatory oversight on cryptocurrency exchanges, requiring local licenses for operations. Internet…
Amplify ETFs for Stablecoins and Tokenization Begin Trading
Key Takeaways Amplify’s newly launched ETFs focus on tracking companies contributing to the development of stablecoins and tokenization…
JPMorgan Explores Cryptocurrency Trading for Institutional Clients
Key Takeaways JPMorgan Chase is considering introducing cryptocurrency trading services to its institutional clientele, marking a notable shift…
Popular coins
Latest Crypto News
Customer Support:@weikecs
Business Cooperation:@weikecs
Quant Trading & MM:bd@weex.com
VIP Services:support@weex.com