Counter-Hack Exposes North Korean IT Workers’ Infiltration of Crypto Industry
- Gator

- Aug 13
- 4 min read

Introduction
On August 13, 2025, crypto investigator ZachXBT revealed insights from a counter-hack of a North Korean IT worker’s device, exposing a sophisticated operation linked to a $680,000 hack of fan-token marketplace Favrr in June 2025. A small team of six North Korean operatives, using 31 fake identities, infiltrated crypto projects by posing as blockchain developers and smart contract engineers. The leaked data, obtained by an unnamed source, showed the group’s use of Google tools, VPNs, and remote access software to mask their identities and secure high-paying roles. The findings highlight the growing threat of North Korean IT workers exploiting remote hiring to fund illicit activities, prompting calls for stronger due diligence in the crypto industry.
Key Points
Counter-Hack Revelations: ZachXBT shared screenshots from a compromised North Korean IT worker’s device, detailing a team of six operatives managing 31 fake identities with forged government IDs, phone numbers, and purchased LinkedIn and UpWork accounts.
Crypto Hack Connection: The group is linked to the $680,000 Favrr hack, with one wallet address (“0x78e1a”) tied to the theft. ZachXBT previously alleged that Favrr’s CTO, “Alex Hong,” was a North Korean operative in disguise.
Operational Tactics: The operatives used Google Drive and Chrome profiles for task management, communicating in English via Google’s Korean-to-English translation tool. They secured freelance roles on platforms like UpWork, using AnyDesk for remote access and VPNs to hide their locations, often routing through “laptop farms” in China or Russia.
Infiltration Attempts: One operative interviewed for a full-stack engineer role at Polygon Labs, using scripted responses claiming experience at OpenSea and Chainlink. A May 2025 expense report showed $1,489.80 spent on operational costs, including computer rentals and VPNs.
Industry Impact: North Korean IT workers are linked to a $1.4 billion Bitbit exchange hack in February 2025 and other crypto exploits. ZachXBT urged crypto firms to enhance hiring due diligence, citing the group’s relatively unsophisticated methods. The U.S. Treasury sanctioned two individuals and four entities in July 2025 for similar schemes.
Critical Analysis
The article exposes a critical vulnerability in the crypto industry’s hiring practices, but its narrative and implications require deeper scrutiny:
Scope of the Threat: The article links North Korean IT workers to major crypto hacks, including Favrr ($680,000) and Bitbit ($1.4 billion), framing them as a significant threat. However, the scale of their operations—six operatives managing 31 identities—suggests a targeted, niche approach rather than a widespread epidemic. The article’s emphasis on high-profile hacks may overstate the group’s impact compared to broader cybercrime trends, like the $1.49 billion stolen in DeFi hacks in 2024 alone.
Counter-Hack Ethics and Attribution: The article relies on ZachXBT’s claims without questioning the ethics or legality of the counter-hack. The “unnamed source” who compromised the device raises concerns about unverified data and potential vigilantism. While the findings are compelling, the lack of transparency about the source’s methods or motives weakens the evidence’s credibility.
Tactics and Sophistication: The article describes the operatives’ methods—forged IDs, VPNs, and remote access tools—as unsophisticated, yet their ability to infiltrate firms like Polygon Labs suggests otherwise. The use of Google tools and Payoneer for fiat-to-crypto conversions indicates a blend of accessible tech and strategic planning. The article underplays how these tactics exploit remote work trends, a vulnerability seen in non-crypto firms like KnowBe4, where a North Korean operative attempted malware deployment.
Industry Accountability: ZachXBT’s call for better due diligence is valid but overlooks systemic issues. The crypto industry’s decentralized, remote-first nature makes it a prime target for such schemes. The article doesn’t address why platforms like UpWork or LinkedIn fail to detect purchased accounts, nor does it explore how sanctions on North Korea drive these revenue-generating tactics. The U.S. Treasury’s July 2025 sanctions highlight the issue’s persistence since 2022 warnings, yet the article lacks solutions beyond generic “vetting” advice.
Broader Context: The article connects the Favrr hack to North Korean operatives but omits their broader crypto crime footprint, such as the $3 billion stolen by the Lazarus Group over six years, including the $1.5 billion Bybit hack. This context would underscore the regime’s reliance on crypto for sanctions evasion. Conversely, Chainalysis suggests North Korea’s crypto crime reliance may have dipped in late 2024 due to Russia ties, a nuance the article ignores.
Global Parallels: The article’s focus on crypto-specific infiltration misses parallels with non-crypto cases, like Secureworks’ report of a North Korean worker stealing data and extorting a Western firm for a six-figure crypto ransom. This escalation from salary scams to data theft and extortion, seen in the U.S., U.K., and Australia, suggests a broader threat the article underplays.
Supporting Data
Hack Details: The Favrr hack stole $680,000 in June 2025, linked to wallet “0x78e1a.” The Bitbit hack in February 2025 involved $1.4 billion in ETH.
Operative Tactics: The team used 31 fake identities, Google Drive for task management, and AnyDesk for remote access. A $1,489.80 expense report covered VPNs and computer rentals in May 2025.
Sanctions and Warnings: The U.S. Treasury sanctioned two individuals and four entities in July 2025 for North Korean IT worker schemes. The FBI warned of such infiltrations since 2022.
Industry Impact: North Korean workers targeted roles at Polygon Labs, OpenSea, and Chainlink. Google’s Threat Intelligence Group noted their expansion to U.K. and European crypto projects in April 2025.
Crypto Crime Context: Chainalysis reported $1.3 billion in North Korean crypto thefts in 2024. The Lazarus Group stole $3 billion over six years.
Conclusion
The counter-hack of a North Korean IT worker’s device reveals a sophisticated yet opportunistic scheme to infiltrate crypto projects, fund illicit activities, and execute hacks like Favrr’s $680,000 theft. While ZachXBT’s findings highlight vulnerabilities in remote hiring, the article’s focus on individual tactics overlooks systemic issues, such as lax platform oversight and the crypto industry’s decentralized nature. The escalation from salary scams to data theft and extortion, seen in both crypto and non-crypto sectors, underscores the need for robust vetting and cross-industry collaboration. As North Korea adapts to U.S. sanctions by targeting Europe and the U.K., crypto firms must prioritize due diligence to mitigate risks, though regulatory gaps and global disparities complicate solutions.





Comments