Back to top
  • 공유 Share
  • 인쇄 Print
  • 글자크기 Font size
URL copied.

CZ Issues Critical Warning on North Korean Hackers Targeting Crypto Users

CZ Issues Critical Warning on North Korean Hackers Targeting Crypto Users. Source: Web Summit, CC BY 2.0, via Wikimedia Commons

Binance founder Changpeng Zhao (CZ) has issued a major security alert to the crypto community, warning about the sophisticated tactics used by North Korean hackers. Taking to his X account, CZ described these cybercriminals as “advanced, creative, and patient,” urging crypto users and companies to remain vigilant.

According to Zhao, one of the most common methods hackers use is posing as job applicants, especially for roles in development, finance, or cybersecurity. By infiltrating companies through recruitment, they gain access to sensitive systems. Hackers also impersonate employers conducting online interviews. In such cases, they often claim to have technical issues with Zoom, tricking victims into clicking on malicious links disguised as updates. Another approach involves sending “sample code” that secretly contains harmful software.

Customer support channels are another target. Hackers pretend to be users experiencing problems and send links carrying viruses. Beyond technical deception, some hackers resort to bribing employees or outsourcing partners to obtain crucial data. CZ highlighted a recent attack on a major Indian outsourcing company that led to the theft of sensitive information from a U.S. exchange, costing users over $400 million in crypto losses.

He concluded his warning with a strong reminder for exchanges and wallet providers to implement strict preventive measures. Training employees not to download unverified files, carefully screening job candidates, and reinforcing internal security protocols are essential to blocking such attacks.

As North Korean hackers refine their strategies, CZ’s warning stands as a timely reminder for the entire crypto industry: vigilance and proactive defense remain the best protection against digital threats.

<Copyright ⓒ TokenPost, unauthorized reproduction and redistribution prohibited>

Most Popular

Comment 0

Comment tips

Great article. Requesting a follow-up. Excellent analysis.

0/1000

Comment tips

Great article. Requesting a follow-up. Excellent analysis.
1