ZachXBT: After reverse hacking North Korean hackers' equipment, I understand their "working mode"

  • Renowned on-chain detective ZachXBT shared findings from a white-hat hacker who reverse-hacked North Korean hackers, revealing their operational methods for the first time.
  • A five-person North Korean IT team used over 30 fake identities, forged government IDs, and purchased Upwork/LinkedIn accounts to infiltrate development projects.
  • The team heavily relied on Google tools (Drive, Chrome) for coordination, task assignments, and budget management, with all communications in English.
  • Internal reports showed challenges like unclear job requirements, met with directives to "work harder."
  • Expenses included buying SSNs, renting phone numbers, AI services, computers, and VPN/proxy services.
  • They used fake profiles (e.g., "Henry Zhang") to complete outsourced work via AnyDesk, with funds funneled through a crypto wallet linked to a $680K attack in June 2025.
  • Evidence included search history showing Korean translations via Russian IPs, confirming North Korean origins.
  • Key challenges in prevention: lack of collaboration between platforms/employers, hiring teams resisting warnings, and abuse of payment platforms like Payoneer to convert fiat to crypto.
  • ZachXBT emphasized prior warnings about these indicators but declined to repeat them here.
Summary

By ZachXBT

Compiled by Azuma, Daily Planet

Editor's Note: North Korean hackers have always been a major threat to the cryptocurrency market. In the past, victims and industry security professionals could only infer North Korean hackers' behavior patterns by reverse engineering related security incidents. However, yesterday, renowned on-chain detective ZachXBT, in a recent tweet, cited an investigation and analysis by a white-hat hacker who reverse-hacked North Korean hackers. This proactive analysis reveals the North Korean hackers' working methods for the first time, potentially providing positive insights into preemptive security measures for industry projects.

The following is the full text of ZachXBT, compiled by Odaily Planet Daily.

An anonymous hacker recently compromised the device of a North Korean IT worker, revealing how a five-person technical team operated over 30 fake identities, using fake government-issued IDs and purchased Upwork and LinkedIn accounts to infiltrate various development projects.

Investigators obtained Google Drive data, Chrome browser profiles, and device screenshots, which revealed that the team relied heavily on Google tools to coordinate work schedules, assign tasks, and manage budgets, with all communications conducted in English.

A weekly report from 2025 revealed the hacker team's work patterns and the difficulties they encountered. For example, one member complained about "not understanding the job requirements and not knowing what to do," but the corresponding solution was to "dedicate yourself and work harder."

Detailed expense records show that their expenditure items include purchasing social security numbers (SSNs), Upwork and LinkedIn account transactions, renting phone numbers, subscribing to AI services, renting computers, and purchasing VPN/proxy services.

One spreadsheet detailed the schedule and scripts for meetings attended by the fictitious "Henry Zhang." The process revealed that these North Korean IT workers would first purchase Upwork and LinkedIn accounts, rent computer equipment, and then complete outsourced work using the AnyDesk remote control tool.

One of the wallet addresses they use to send and receive funds is:

0x78e1a4781d184e7ce6a124dd96e765e2bea96f2c;

This address is closely linked to the $680,000 Favrr protocol attack in June 2025. Its CTO and other developers were later confirmed to be North Korean IT workers with forged credentials. This address has also been used to identify North Korean IT personnel involved in other infiltration projects.

The team also found the following key evidence in their search records and browser history.

One might ask, “How can we be sure they are from North Korea?” In addition to all the fraudulent documents detailed above, their search history also shows that they frequently use Google Translate and translate into Korean using a Russian IP.

Currently, the main challenges for enterprises in preventing North Korean IT workers are as follows:

  • Lack of systematic collaboration: There is a lack of effective information sharing and cooperation mechanisms between platform service providers and private enterprises;
  • Employer oversight: Hiring teams often become defensive after receiving risk warnings, or even refuse to cooperate with investigations;
  • Impact of numerical advantage: Although its technical means are not complicated, it continues to penetrate the global job market with its huge base of job seekers;
  • Funding conversion channels: Payment platforms such as Payoneer are frequently used to convert fiat currency income from development work into cryptocurrency;

I have introduced the indicators that need attention many times. If you are interested, you can check out my historical tweets. I will not repeat them here.

Share to:

Author: Odaily星球日报

This article represents the views of PANews columnist and does not represent PANews' position or legal liability.

The article and opinions do not constitute investment advice

Image source: Odaily星球日报. Please contact the author for removal if there is infringement.

Follow PANews official accounts, navigate bull and bear markets together
App内阅读