Site iconSite icon ForkLog

Password ‘123456’ exposes a DPRK IT-worker network in crypto

Password '123456' exposes a DPRK IT-worker network in crypto

North Korean IT specialists have been posing as ordinary developers to join crypto projects they later try to compromise, according to on-chain sleuth ZachXBT.

An unnamed source provided the researcher with data from an internal DPRK payments server. The leak included 390 accounts, chat logs and crypto transactions.

“I spent hours studying these data. They have never been published. The scheme turned out to be intricate: fake identities, forged documents and conversion of crypto to fiat at roughly $1m a month,” the expert wrote.

How the scheme worked

The computer of one DPRK IT worker, who used the handle Jerry, was compromised. Extracted data included IPMsg chat logs, fake job-seeker profiles and browser history.

Analysis showed that on luckyguys[.]site—an internal payments platform with a Discord-like interface—the fraudsters reported incoming payments to their handlers. The default password—“123456”—was left unchanged for ten users.

Their accounts, ZachXBT found, listed roles, Korean names, cities and coded group names reflecting DPRK IT-worker operations.

Three companies that appeared in the records—Sobaeksu, Saenal and Songkwang—are sanctioned by OFAC.

Soon after the investigation was published, luckyguys[.]site went offline.

Operational details

From December 2025 to April 2026 a WebMsg user styling himself Rascal discussed payment transfers and the creation of fake identities in DMs with PC-1234. All transactions ran through, and were approved by, the server admin account PC-1234.

Accounts and goods were paid for via addresses in Hong Kong (their authenticity is still being verified). Since late November 2025 those wallets have received more than $3.5m.

The flow was formulaic: users either sent crypto from an exchange or service, or converted it to fiat via Chinese bank accounts using platforms such as Payoneer.

Structure and intrusion attempts

Drawing on the dataset, ZachXBT reconstructed the network’s organisational chart, including per-user and per-group payouts for December 2025 to February 2026.

Analysis of internal transactions revealed on-chain links to several known DPRK IT-worker clusters. In December 2025 Tether froze one such wallet on TRON.

Jerry’s compromised device showed VPN usage and a trove of fabricated resumes.

In an internal Slack, a user called Nami shared a blog post about a DPRK IT-worker deepfake job applicant. One colleague asked whether it was them; another noted they were not allowed to forward external links.

Jerry actively discussed with another DPRK IT worker the possibility of stealing funds from Arcano (a game on GalaChain) via a Nigerian proxy. It is unclear whether the attack was ever carried out.

Training and threat level

From November 2025 to February 2026 the administrator sent the group 43 Hex-Rays/IDA Pro training modules. The coursework covered disassembly, decompilation, local and remote debugging, and other aspects of cybersecurity.

ZachXBT noted that this DPRK IT group is less sophisticated than AppleJeus and TraderTraitor, which operate more effectively and pose the main threat to the industry.

He had previously estimated the earnings of North Korean developers at several million dollars a month, and the latest data corroborate those figures.

“My unpopular opinion: hackers are missing out by not attacking low-level DPRK groups. The risk is low, competition is almost non-existent, and the targets may be worth it,” the on-chain detective emphasised.

How to spot a North Korean hacker

A video from a job interview recently went viral on X, in which a DPRK IT worker was asked to insult the country’s leader, Kim Jong Un.

The candidate did not comply—the picture froze immediately after the request. One reason may be that criticising the leader is a criminal offence in North Korea.

The developer posed as a Japanese man named Taro Aikuchi. The day after the clip was posted he deleted his resumes from LinkedIn and his personal site, and changed his Telegram handle.

In April, MetaMask security researcher Taylor Monahan said that North Korean IT specialists have been getting hired at DeFi protocols for at least seven years.

Among the projects she highlighted were SushiSwap, Thorchain, Fantom, Shib, Yearn, Floki and many others.

Exit mobile version