PANews reported on May 2 that the Kraken team recently discovered that a North Korean hacker was trying to infiltrate the team by applying for a position. The name of the suspicious candidate when he joined the company was different from the name on his resume, and it was changed quickly. In addition, the candidate occasionally switched voices, indicating that he received real-time guidance during the interview process. Kraken received a list of email addresses associated with the hacker group, one of which matched the email address the candidate used to apply for Kraken. With this intelligence in hand, the Kraken team launched an investigation using open source intelligence collection (OSINT) methods. In the final round of interviews, the team asked candidates to verify their location, show government-issued ID cards, and even recommend some local restaurants in their city. The interviewer was flustered and caught off guard, and it was eventually proven that he was an imposter trying to hack into the system.
Kraken: A North Korean hacker tried to infiltrate the team by applying for a job
- 2025-05-12
Reverse screening: How do crypto project founders choose the right VC?
- 2025-05-11
Ledger has regained control of the Discord server
- 2025-05-11
Defillama founder: Hackers hacked into an address in Lido oracle multi-signature, stole 1.4 ETH and then exposed their whereabouts
- 2025-05-11
1confirmation founder: ETH is a credible and neutral means of value storage, and its scarcity will gradually increase
- 2025-05-11
Opinion: The credible neutrality of BTC and ETH is defined by token distribution and transparency, jurisdiction and developer platform
- 2025-05-11
Today's Fear and Greed Index is 70, and market sentiment is still in a greedy state