Kraken Thwarts North Korean Hacker Posing as Job Candidate
Kraken, a prominent cryptocurrency exchange, recently uncovered a significant security threat when a North Korean hacker attempted to infiltrate the company by posing as a job candidate. The hacker used fraudulent employment paperwork to apply for an engineering position, but Kraken's trained security personnel and IT experts detected the suspicious activity.
Ask Aime: "Did North Korean hackers infiltrate Kraken, a major cryptocurrency exchange, by using fraudulent employment paperwork?"
The recruitment process initially appeared routine, but red flags began to surface during the interview. The applicant used a different name than the one on their resume, and their voice exhibited unusual variations in pitch. Additionally, the candidate seemed to be receiving guidance from an external source during the interview, raising further suspicions.
Kraken received an early warning about the potential threat from industry partners, who alerted the company to North Korean hackers targeting cryptocurrency job applications at private companies. The company was provided with a list of problematic email addresses, one of which matched the applicant's email.
Instead of immediately refusing the candidate, Kraken's security staff decided to maintain the ruse and continue the interview process to gather more information. The Red Team at Kraken initiated an Open-Source Intelligence (OSINT) effort, tracing the candidate’s email through multiple fake identity registrations that appeared in different data breaches. Previous identities owned by this applicant had been used to seek employment at various technology companies, with some employees from the potential candidates having already accepted positions at the same companies.
Further investigation revealed that the candidate was using remote Mac desktops connected through a VPN to conceal their actual physical location. A GitHub account belonging to the candidate had been flagged by a past data leak through its email address, and the presented identification document showed signs of falseness, being connected to a known incident of identity theft.
To confirm their suspicions, Kraken set up a final "chemistry" interview, which turned out to be a deliberate extraction process rather than a typical candidacy assessment. The candidate was asked to prove their location by showing valid government identification and was posed basic questions about dining options in the geographic area they claimed to reside. The hacker was unable to respond to these questions and exhibited nervous behavior, ultimately failing the verification procedures.
Kraken declared the attack to be state-sponsored, confirming that no actual job candidate was involved in the process. The incident serves as a stark reminder for businesses worldwide to verify information rather than trust blindly, as hacker assaults can affect both companies and nations. The defensive framework of companies requires hr departments to participate in maintaining security, as future attacks may not rely on traditional methods like malware but instead exploit job application systems to implement malicious strategies.
