The post North Korean crypto hackers got caught live — by fake laptops appeared on BitcoinEthereumNews.com. North Korean operatives were caught on camera, live, after security researchers lured them into a booby-trapped “developer laptop,” capturing how the Lazarus-linked crew tried to blend into a US crypto job pipeline using legitimate AI hiring tools and cloud services. The evolution in state-sponsored cybercrime was reportedly captured in real time by researchers at BCA LTD, NorthScan, and the malware-analysis platform ANY.RUN. Catching the North Korean attacker Hacker News shared how, in a coordinated sting operation, the team deployed a “honeypot,” which is a surveillance environment disguised as a legitimate developer’s laptop, to bait the Lazarus Group. The resulting footage offers the industry its clearest look yet at how North Korean units, specifically the Famous Chollima division, are bypassing traditional firewalls by simply getting hired by the target’s human resources department. The operation began when researchers created a developer persona and accepted an interview request from a recruiter alias known as “Aaron.” Instead of deploying a standard malware payload, the recruiter steered the target toward a remote employment arrangement common in the Web3 sector. When the researchers granted access to the “laptop,” which was actually a heavily monitored virtual machine designed to mimic a US-based workstation, the operatives did not attempt to exploit code vulnerabilities. Instead, they focused on establishing their presence as seemingly model employees. Building trust Once inside the controlled environment, the operatives demonstrated a workflow optimized for blending in rather than breaking in. They utilized legitimate job-automation software, including Simplify Copilot and AiApply, to generate polished interview responses and populate application forms at scale. This use of Western productivity tools highlights a disturbing escalation, showing that state actors are leveraging the very AI technologies designed to streamline corporate hiring to defeat them. The investigation revealed that the attackers routed their traffic through Astrill VPN to mask their… The post North Korean crypto hackers got caught live — by fake laptops appeared on BitcoinEthereumNews.com. North Korean operatives were caught on camera, live, after security researchers lured them into a booby-trapped “developer laptop,” capturing how the Lazarus-linked crew tried to blend into a US crypto job pipeline using legitimate AI hiring tools and cloud services. The evolution in state-sponsored cybercrime was reportedly captured in real time by researchers at BCA LTD, NorthScan, and the malware-analysis platform ANY.RUN. Catching the North Korean attacker Hacker News shared how, in a coordinated sting operation, the team deployed a “honeypot,” which is a surveillance environment disguised as a legitimate developer’s laptop, to bait the Lazarus Group. The resulting footage offers the industry its clearest look yet at how North Korean units, specifically the Famous Chollima division, are bypassing traditional firewalls by simply getting hired by the target’s human resources department. The operation began when researchers created a developer persona and accepted an interview request from a recruiter alias known as “Aaron.” Instead of deploying a standard malware payload, the recruiter steered the target toward a remote employment arrangement common in the Web3 sector. When the researchers granted access to the “laptop,” which was actually a heavily monitored virtual machine designed to mimic a US-based workstation, the operatives did not attempt to exploit code vulnerabilities. Instead, they focused on establishing their presence as seemingly model employees. Building trust Once inside the controlled environment, the operatives demonstrated a workflow optimized for blending in rather than breaking in. They utilized legitimate job-automation software, including Simplify Copilot and AiApply, to generate polished interview responses and populate application forms at scale. This use of Western productivity tools highlights a disturbing escalation, showing that state actors are leveraging the very AI technologies designed to streamline corporate hiring to defeat them. The investigation revealed that the attackers routed their traffic through Astrill VPN to mask their…

North Korean crypto hackers got caught live — by fake laptops

North Korean operatives were caught on camera, live, after security researchers lured them into a booby-trapped “developer laptop,” capturing how the Lazarus-linked crew tried to blend into a US crypto job pipeline using legitimate AI hiring tools and cloud services.

The evolution in state-sponsored cybercrime was reportedly captured in real time by researchers at BCA LTD, NorthScan, and the malware-analysis platform ANY.RUN.

Catching the North Korean attacker

Hacker News shared how, in a coordinated sting operation, the team deployed a “honeypot,” which is a surveillance environment disguised as a legitimate developer’s laptop, to bait the Lazarus Group.

The resulting footage offers the industry its clearest look yet at how North Korean units, specifically the Famous Chollima division, are bypassing traditional firewalls by simply getting hired by the target’s human resources department.

The operation began when researchers created a developer persona and accepted an interview request from a recruiter alias known as “Aaron.” Instead of deploying a standard malware payload, the recruiter steered the target toward a remote employment arrangement common in the Web3 sector.

When the researchers granted access to the “laptop,” which was actually a heavily monitored virtual machine designed to mimic a US-based workstation, the operatives did not attempt to exploit code vulnerabilities.

Instead, they focused on establishing their presence as seemingly model employees.

Building trust

Once inside the controlled environment, the operatives demonstrated a workflow optimized for blending in rather than breaking in.

They utilized legitimate job-automation software, including Simplify Copilot and AiApply, to generate polished interview responses and populate application forms at scale.

This use of Western productivity tools highlights a disturbing escalation, showing that state actors are leveraging the very AI technologies designed to streamline corporate hiring to defeat them.

The investigation revealed that the attackers routed their traffic through Astrill VPN to mask their location and used browser-based services to handle two-factor authentication codes associated with stolen identities.

The endgame was not immediate destruction but long-term access. The operatives configured Google Remote Desktop via PowerShell with a fixed PIN, ensuring they could maintain control of the machine even if the host attempted to revoke privileges.

So, their commands were administrative, running system diagnostics to validate the hardware.

Essentially, they were not attempting to breach a wallet immediately.

Instead, the North Koreans sought to establish themselves as trusted insiders, positioning themselves to access internal repositories and cloud dashboards.

A billion-dollar revenue stream

This incident is part of a larger industrial complex that has turned employment fraud into a primary revenue driver for the sanctioned regime.

The Multilateral Sanctions Monitoring Team recently estimated that Pyongyang-linked groups stole approximately $2.83 billion in digital assets between 2024 and September 2025.

This figure, which represents roughly one-third of North Korea’s foreign currency income, suggests that cyber-theft has become a sovereign economic strategy.

The efficacy of this “human layer” attack vector was devastatingly proven in February 2025 during the breach of the Bybit exchange.

In that incident, attackers attributed to the TraderTraitor group used compromised internal credentials to disguise external transfers as internal asset movements, ultimately gaining control of a cold-wallet smart contract.

The compliance crisis

The shift toward social engineering creates a severe liability crisis for the digital asset industry.

Earlier this year, security firms such as Huntress and Silent Push documented networks of front companies, including BlockNovas and SoftGlide, that possess valid US corporate registrations and credible LinkedIn profiles.

These entities successfully induce developers to install malicious scripts under the guise of technical assessments.

For compliance officers and Chief Information Security Officers, the challenge has mutated. Traditional Know Your Customer (KYC) protocols focus on the client, but the Lazarus workflow necessitates a rigorous “Know Your Employee” standard.

The Department of Justice has already begun cracking down, seizing $7.74 million linked to these IT schemes, but the detection lag remains high.

As the BCA LTD sting demonstrates, the only way to catch these actors may be to shift from passive defense to active deception, creating controlled environments that force threat actors to reveal their tradecraft before they are handed the keys to the treasury.

Mentioned in this article

Source: https://cryptoslate.com/secret-footage-from-a-rigged-laptop-exposes-how-north-korean-spies-are-slipping-past-your-security-team/

Market Opportunity
SecondLive Logo
SecondLive Price(LIVE)
$0.00005196
$0.00005196$0.00005196
+4.67%
USD
SecondLive (LIVE) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Solana Treasury Stocks: Why Are These Companies Buying Up SOL?

Solana Treasury Stocks: Why Are These Companies Buying Up SOL?

The post Solana Treasury Stocks: Why Are These Companies Buying Up SOL? appeared on BitcoinEthereumNews.com. In 2020, everyone watched Strategy (called Microstrategy back then) scoop up Bitcoin and turn corporate crypto treasuries into a mainstream story. Now, a new wave is forming. And it’s centered on Solana. Dozens of companies are holding SOL as a bet on price. Except they’re not just holding. They’re building what’s being called Solana treasuries or Digital Asset Treasuries (DATs). These aren’t passive vaults. They’re active strategies that stake, earn yield, and tie into the fast-growing Solana ecosystem. Forward Industries, a Nasdaq-listed firm, recently bought more than 6.8 million SOL, making it the world’s largest Solana treasury company. Others like Helius Medical, Upexi, and DeFi Development are following a similar playbook, turning SOL into a centerpiece of their balance sheets. The trend is clear: Solana treasury stocks are emerging as a new class of crypto-exposed equities. And for investors, the question isn’t just who’s buying but why this strategy is spreading so fast. Key highlights: Solana treasuries (DATs) are corporate reserves of SOL designed to earn yield through staking and DeFi. Companies like Forward Industries, Helius Medical, Upexi, and DeFi Development Corp now hold millions of SOL. Public firms collectively own 17.1M SOL (≈$4B), which makes Solana one of the most adopted treasuries. Unlike Bitcoin treasuries, Solana holdings generate 6–8% annual rewards. It makes reserves into productive assets Solana treasury stocks are emerging as a new way for investors to gain indirect exposure to SOL. Risks remain: volatility, regulation, and concentrated holdings. But corporate adoption is growing fast. What is a Solana treasury (DAT)? A Solana treasury, sometimes called a Digital Asset Treasury (DAT), is when a company holds SOL as part of its balance sheet. But unlike Bitcoin treasuries, these usually aren’t just static reserves sitting in cold storage.  The key difference is productivity. SOL can be staked directly…
Share
BitcoinEthereumNews2025/09/21 06:09
Unstoppable: Why No Public Company Can Ever Catch MicroStrategy’s Massive Bitcoin Holdings

Unstoppable: Why No Public Company Can Ever Catch MicroStrategy’s Massive Bitcoin Holdings

BitcoinWorld Unstoppable: Why No Public Company Can Ever Catch MicroStrategy’s Massive Bitcoin Holdings Imagine trying to build a mountain of gold, only to discover
Share
bitcoinworld2025/12/17 14:30
Little Pepe soars from presale to market spotlight

Little Pepe soars from presale to market spotlight

The post Little Pepe soars from presale to market spotlight appeared on BitcoinEthereumNews.com. Disclosure: This article does not represent investment advice. The content and materials featured on this page are for educational purposes only. Early investors often capture the biggest rewards in crypto, and Little Pepe, priced under $0.005, is emerging as a memecoin that could rival big players. Summary LILPEPE has sold over 15 billion tokens in its presale, raising $25.4 million. The project’s community has grown to more than 41,000 holders and 30,000 Telegram members. Analysts suggest the token could see gains of up to 55x in two years and 100x by 2030. Crypto enthusiasts are aware that early investors tend to benefit the most from the market. Ripple (XRP) and Solana (SOL) are popular tokens that have profited traders. Little Pepe (LILPEPE), valued at less than $0.005, might produce more profit. LILPEPE is swiftly gaining popularity despite its recent introduction. Little Pepe: The market-changing memecoin Little Pepe has surprised everyone with its quick surge in cryptocurrencies. LILPEPE is becoming a popular meme currency. Its presale price is below $0.003. Strong foundations, a distinct market presence, and a developing and enthusiastic community distinguish it from other meme tokens. Many meme currencies use hype to attract investors, but LILPEPE’s rarity, community support, and distinctive roadmap have effectively drawn them in. Currently in its 13th presale stage, more than 15 billion tokens have been sold, generating over $25.4 million and sparking considerable interest. As the token approaches official listing, enthusiasm is growing, and many people believe it could be one of the following major memecoin success stories. LILPEPE’s growing community drives growth The strong community surrounding LILPEPE is a primary reason for its success. LILPEPE has built a loyal following of over 41,000 holders and about 30,000 active members on Telegram. Its rise is being fueled by this. The support of its community…
Share
BitcoinEthereumNews2025/09/19 15:12