PANews reported on May 2 that the Kraken team recently discovered that a North Korean hacker was trying to infiltrate the team by applying for a position. The name of the suspicious candidate when he joined the company was different from the name on his resume, and it was changed quickly. In addition, the candidate occasionally switched voices, indicating that he received real-time guidance during the interview process. Kraken received a list of email addresses associated with the hacker group, one of which matched the email address the candidate used to apply for Kraken. With this intelligence in hand, the Kraken team launched an investigation using open source intelligence collection (OSINT) methods. In the final round of interviews, the team asked candidates to verify their location, show government-issued ID cards, and even recommend some local restaurants in their city. The interviewer was flustered and caught off guard, and it was eventually proven that he was an imposter trying to hack into the system.