Back to home
Technology

Report says North Korea is also posting fake jobs to steal crypto — because using AI to get fake employees real jobs at US tech firms wasn't enough

Source

Tom's Hardware

Published

TL;DR

AI Generated

North Korea has escalated its efforts to steal cryptocurrency by posting fake job offers in the sector, targeting job seekers to compromise their crypto assets. The country's operatives engage in social engineering schemes, instructing applicants to take skills tests on obscure websites that contain malicious code. This tactic is part of North Korea's broader campaign to steal digital cash, with reports revealing attempts to scam a wide range of professionals. Economic trends, including layoffs and job scarcity in tech, make job-seekers vulnerable to such recruitment scams. North Korea's cryptocurrency theft efforts have been extensive, with a reported $1.5 billion worth of Ethereum stolen from a crypto exchange.

Read Full Article

Similar Articles

Tennessee bans crypto ATMs that have become 'payment portal of choice for scammers' — second state to restrict machines after Indiana

Tennessee bans crypto ATMs that have become 'payment portal of choice for scammers' — second state to restrict machines after Indiana

Tennessee has joined Indiana in banning cryptocurrency ATMs due to their association with scams and fraud, with Minnesota considering similar legislation. The FBI has warned of significant losses due to fraud involving these machines. Despite not being inherently fraudulent, cybercriminals exploit crypto ATMs to steal funds from victims who mistakenly believe they offer the same protections as banks. Law enforcement actions against operators like Bitcoin Depot and Athena Bitcoin highlight the growing concerns around crypto ATM scams, leading to increased regulatory measures across states to protect consumers.

Tom's Hardware
Mobile SMS blasters in vehicles prowled Canadian streets, causing 13 million network disruptions and infiltrating tens of thousands of devices — blaster blocked 911 calls, stole cellphone data

Mobile SMS blasters in vehicles prowled Canadian streets, causing 13 million network disruptions and infiltrating tens of thousands of devices — blaster blocked 911 calls, stole cellphone data

Toronto police arrested three individuals running a mobile SMS blaster scheme in downtown Toronto, which caused 13 million network disruptions and infiltrated tens of thousands of devices. The SMS blasters blocked 911 calls and stole cellphone data by impersonating cell towers and sending fraudulent texts. The operation was the first of its kind in Canada and has since been dismantled, but authorities warn of continued vigilance against fraudulent texts. The devices used in the scheme were uniquely built and not publicly shared for safety reasons, and similar operations have been reported in other countries like the Philippines.

Tom's Hardware
Ransomware negotiator pleads guilty after leaking victims' insurance details to 'BlackCat' hackers — perp gave attackers a precise picture of exactly how much each target could afford to pay

Ransomware negotiator pleads guilty after leaking victims' insurance details to 'BlackCat' hackers — perp gave attackers a precise picture of exactly how much each target could afford to pay

Former ransomware negotiator Angelo Martino has pleaded guilty to collaborating with the ALPHV/BlackCat ransomware gang to extort five U.S. companies, providing confidential details about the victims' insurance policies and negotiation perceptions. Martino's actions led to over $75 million in ransom payments, with individual payments exceeding $25 million. He also participated in deploying BlackCat ransomware against additional U.S. victims, demanding over $16 million in ransom. Law enforcement has seized more than $10 million from Martino, including cryptocurrency and various assets purchased with illicit proceeds. Martino, along with his co-conspirators, faces a maximum of 20 years in prison, with sentencing scheduled for July 9th.

Tom's Hardware
Techie buys fake Ledger Nano S+ hardware crypto wallet and almost falls for phishing — a convincing clone would have caught newbies unaware

Techie buys fake Ledger Nano S+ hardware crypto wallet and almost falls for phishing — a convincing clone would have caught newbies unaware

Brazilian cybersecurity professional Joje Mendes nearly fell victim to a sophisticated hardware-and-software phishing attack involving a fake Ledger Nano S+ cryptocurrency wallet purchased from a Chinese marketplace. Despite the device being priced similarly to a legitimate one, Mendes discovered it was a counterfeit upon arrival, thanks to Ledger's software verification. Upon dissecting the device, Mendes found it contained an ESP32-S3 SoC and was designed to harvest data through a fake Ledger app, leading unsuspecting users to a malicious website for downloading harmful apps. Mendes reported the incident to Ledger and plans to investigate further, emphasizing the importance of purchasing security devices directly from manufacturers or authorized sellers.

Tom's Hardware

We use cookies

We use cookies to ensure you get the best experience on our website. For more information on how we use cookies, please see our cookie policy.