- So the Lazarus Group thinks setting up fake U.S. companies to scam crypto geeks is a brilliant idea. Spoiler: It kind of is.
- They send fake job offers packed with malware. Because who wouldn’t want a “job” with a side of stolen wallet keys?
Alright, get this — North Korean hackers, specifically the Lazarus Group, decided the crypto world was ripe for the picking. Instead of the usual cloak and dagger stuff, they went full-on “We own a company in New Mexico, trust us!” They whipped up fake U.S. firms, like BlockNovas LLC and SoftGlide LLC—fancy sounding, right? They even threw in Angeloper Agency for good measure. Two of them are officially registered using identities that probably don’t exist. Classic.
So, these guys played recruiter. “Hey, wanna apply for a crypto developer job?” they said. And here’s the genius move: they made applicants download some “error-fixing” software for recording an intro video. You try that in a real interview and the HR department laughs you out the door. But nope, these suckers downloaded malware instead, handing over their wallet keys like it was Halloween candy.
Malware Scam: The Job Offer from Your Worst Nightmare
The whole thing was a masterclass in deception. The job posts looked so legit you’d think they came from middle management at Google. Then bam! You’re downloading malware like it’s the latest Zoom update. Once inside, this nasty software steals your login creds and crypto wallet keys faster than you can say “blockchain.” One reported victim even lost their MetaMask wallet—because nothing says “job hunting” like getting scammed by the FBI’s most wanted.
The FBI swooped in and snatched the BlockNovas domain. Good for them, right? But SoftGlide and the rest are still chilling out there, lurking, waiting for the next poor sucker. And yeah, this nightmare started in 2024, so totally fresh and primed for chaos.
Oh, and in case you’re wondering — it’s kinda wild that North Korean hackers blatantly break U.S. laws and UN sanctions by registering actual companies here. Like, “Hello, we’re criminals but we love paperwork!”
Lazarus Group: The OG Crypto Heist Crew
The Lazarus Group isn’t new to this crypto stealing business. Since 2017, they’ve snatched over $3 billion in digital loot. One of their showstoppers? The $600 million Ronin Network hack in 2022. Talk about showing up at the blockchain party like they own the place. Their toolkit? Social engineering, phishing, fake job offers—the usual hacker fashion statements.
Remember WannaCry in 2017? That global ransomware blitz that locked up 200,000 systems across 150 countries? Yeah, the Lazarus Group had a hand in that party too. These guys don’t do subtle.
This latest caper is just another reminder that state-backed cyber crooks have zero chill. North Korea’s cyber ops are apparently some of the world’s most advanced—and they’re all about funding their regime, which, uh, is a little tricky given international sanctions.
And here’s the kicker: using fake U.S. companies? That’s like adding extra sprinkles of confusion to the fraud cake, making it even harder to spot the con. So, crypto devs and companies, put on your detective hats next time some “company” sends you a job offer. Verify everything, and maybe don’t download that “fix.”
Read More
- SPEC PREDICTION. SPEC cryptocurrency
- SOLV PREDICTION. SOLV cryptocurrency
- Scandal! POPCAT Rockets 15% as Smart Money Chases the Elusive $0.70—Fortune Awaits?
- AI Decentralized Apps: The New Web3 Royalty, DeFi and Gaming Beware!
- USD PHP PREDICTION
- TURBO PREDICTION. TURBO cryptocurrency
- Silver Rate Forecast
- US Govt Seriously Considering XRP? Crypto World Is Buzzing! 🤑
- DOT PREDICTION. DOT cryptocurrency
- Steve Eisman’s Market Musings: Volatility, Politics, and AI Shenanigans! 🤹♂️
2025-04-26 09:44