Close Menu
maincoin.money
    What's Hot

    Polygon, an Ethereum scaling network, is reportedly on the verge of acquiring the Bitcoin kiosk company Coinme, according to sources.

    January 8, 2026

    Bank of America Raises Coinbase Rating to ‘Buy’ as Exchange Expands Beyond Cryptocurrency

    January 8, 2026

    Severely Underappreciated Bitcoin Endures Ongoing Bear Market Without Clear Signs of Recovery

    January 8, 2026
    Facebook X (Twitter) Instagram
    maincoin.money
    • Home
    • Altcoins
    • Markets
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
      • Regulation
    Facebook X (Twitter) Instagram
    maincoin.money
    Home»Ethereum»CZ and Crypto ‘SEAL’ Team Warn About 60 North Korean Hackers
    Ethereum

    CZ and Crypto ‘SEAL’ Team Warn About 60 North Korean Hackers

    Ethan CarterBy Ethan CarterSeptember 18, 2025No Comments4 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    1758196821
    Share
    Facebook Twitter LinkedIn Pinterest Email

    North Korean hackers are intensifying their efforts to breach cryptocurrency firms by masquerading as IT professionals, raising new security alarms for the sector, according to Binance co-founder Changpeng “CZ” Zhao and a team of ethical hackers.

    CZ issued a warning on Thursday via X regarding the escalating danger posed by North Korean hackers aiming to infiltrate crypto businesses through job applications and even bribing exchange personnel for confidential data.

    “They pose as job seekers to attempt to gain employment within your organization. This grants them a “foot in the door,” particularly related to roles in development, security, and finance,” CZ stated.

    “They impersonate employers and try to interview your employees. During these interviews, they will create Zoom issues and send your employee a link to an “update,” which contains malware that will compromise your employee’s device.”

    Other North Korean agents provide employees with coding questions to later send malicious “sample code,” impersonate users to deliver harmful links to customer support, or even “bribe your employees and outsourced vendors for data access,” Zhao noted.

    “All crypto platforms should educate their employees not to download files and rigorously evaluate their job candidates,” he added.

    01995c46 8966 7227 8af3 a0949ed14bd0
    Source: Changpeng Zhao

    Related: Bitcoin ETFs are the next significant target for North Korean hackers — Cyvers

    This alert follows similar concerns raised by Coinbase, which reported a new surge of threats last month.

    In response, Coinbase CEO Brian Armstrong implemented new security protocols, including mandating all employees undergo in-person training in the US, while those with access to sensitive systems must be US citizens and undergo fingerprinting.

    01995c46 8e8b 7279 a612 97702492a636
    Brian Armstrong, right, on the Cheeky Pint podcast. Source: YouTube

    “We can work with law enforcement […] but it feels like there are 500 new individuals graduating every quarter from some sort of school, and that’s their entire job,” Armstrong told Cheeky Pint podcast host John Collins.

    Related: Bitcoin whale awakens after 12 years, transfers 1,000 BTC before US Fed meeting

    Security Alliance reveals 60 North Korean hackers posing as IT workers

    Zhao’s alert coincided with a report from a group of ethical hackers known as Security Alliance (SEAL), which compiled the profiles of at least 60 North Korean agents impersonating IT professionals under false identities aiming to infiltrate US crypto exchanges and extract sensitive user information.

    01995c46 9159 77e7 b6c1 9670a7083a91
    SEAL team repository of 60 North Korean IT worker impersonators. Source: lazarus.group/team

    “North Korean developers are keen to join your company, but it’s essential to avoid being deceived by impostors during hiring,” Security Alliance stated in a Wednesday X post, sharing its new repository for North Korean impersonators.

    The repository includes crucial details on North Korean impersonators, such as aliases, false names and emails used, as well as real and fake citizenships, addresses, locations, and the firms that have employed them.

    01995c46 9391 7301 9d9c 16071ac3ad20
    SEAL team repository of North Korean IT worker impersonator ‘Kazune Takeda’. Source: lazarus.group/team

    Salary information, GitHub profiles, and all other public affiliations are also included for each impersonator.

    In June, four North Korean operatives penetrated various crypto firms as freelance developers, stealing a total of $900,000 from these startups, highlighting the escalating threat, Cointelegraph reported.

    The white hat SEAL team was established to counter these threats, spearheaded by white hat hacker and Paradigm researcher Samczsun. SEAL conducted over 900 hack-related investigations within a year of its inception, showcasing the increasing necessity for ethical hackers, Cointelegraph reported in August 2024.

    01995c4c fc29 7745 b169 e3249e9e9d04
    SEAL Whitehat Safe Harbor Agreement. Source: Security Alliance

    North Korean hackers, including the notorious Lazarus Group, are the primary suspects behind some of the most catastrophic cryptocurrency thefts, including the $1.4 billion Bybit hack, the largest in the industry to date.

    Throughout 2024, North Korean hackers pilfered over $1.34 billion worth of digital assets across 47 incidents, reflecting a 102% increase from the $660 million stolen in 2023, according to Chainalysis data.

    Magazine: Coinbase hack demonstrates that the law probably won’t shield you — Here’s why