Laughing Hyena
  • Home
  • Hyena Games
  • Esports
  • NFT Gaming
  • Crypto Trends
  • Game Reviews
  • Game Updates
  • GameFi Guides
  • Shop
Tag:

Protects

Nearly half of stolen $1.4b from Bybit now untraceable 
GameFi Guides

How Coinbase Protects Data from North Korean Hackers

by admin August 24, 2025



In an interview with Stripe’s John Collison, Coinbase CEO Brian Armstrong shared details on tactics North Korean hackers use to infiltrate Coinbase. Attempts by deceptive agents to bribe the exchange’s support team or get jobs at Coinbase resulted in stricter security standards. What did we learn about hackers from the DPRK?

Summary

  • In a new interview, Brian Armstrong emphasized that North Korea is trying to infiltrate tech companies with a large number of its agents disguised as remote IT workers.
  • Armstrong said it feels like around 500 new agents graduate from special schools every quarter.
  • According to Armstrong, threat actors are trying to bribe the Coinbase support team with hundreds of thousands of dollars to get private info.
  • Coinbase had to tighten up its security standards while hiring new people. Only the fingerprinted employees with U.S. citizenship and family in-country can access sensitive info.
  • Previously, investigators found out that the DPRK is constantly trying to get its agents hired in tech companies so they can steal cryptocurrency there. Stolen crypto is thought to be used as funding for the North Korean nuclear program.

North Korea takeaways from Armstrong’s interview

On Aug. 20, 2025, the Stripe YouTube channel released a new video. In it, Collison and Armstrong, who are the heads of Stripe and Coinbase, have a conversation about notable trends in the cryptocurrency space.

Collison asked Armstrong what the general tech public does not appreciate about the cybercrime landscape, and Armstrong’s nearly immediate response was “a lot of North Korean agents are trying to work at these companies,” most of the time remotely.

Armstrong said that while companies are working with law enforcement and get notified about some candidates as “known actors,” it feels like 500 more agents graduate from “some kind of school” in the DPRK each quarter, and infiltrating tech companies is their “whole job.”

He emphasized that he does not blame individuals for becoming agents:

“In many of these cases, it’s not the individual person’s fault. Their families will be coerced or detained if they don’t cooperate. So actually, they’re the victim as well in many cases.”

During online job interviews, the DPRK agents usually have some kind of a coach around who assists them, so Coinbase employees have to demand that candidates turn on the camera to make sure they are talking with a real person and no one is nearby to give instructions.

If an employee needs to access any sensitive system, they are required to come to the U.S. in person for orientation. Coinbase limits access to sensitive data by allowing only fingerprinted employees with U.S. citizenship and family in-country. Such a strict approach is dictated by increased security concerns associated with the DPRK infiltration attempts. 

Another concern voiced by Armstrong during the interview is the cases when threat actors were trying to bribe Coinbase support team agents, offering hundreds of thousands of dollars in exchange for smuggling in personal phones, taking screen photos, and sharing other types of data. To address the risk of leaks resulting from bribery, Coinbase had to increase control over the support team and move customer support offices to the U.S. and Europe. Armstrong said:

“[We] really started to make a deterrent in the sense of, when we catch people doing this – and we red‑team it consistently — we don’t walk them out the door — they go to jail. We try to make it very clear that you’re destroying the rest of your life by taking this, even if you think it’s some life‑changing amount of money, it’s not worth going to jail.”

Another measure is putting out a $20 million bounty for information that could help arrest or convict attackers. Armstrong emphasized that Coinbase is not only going after insiders but targets the threat actors themselves.

What is known about hackers from the DPRK?

During the same interview, Armstrong said that “DPRK is very interested in stealing crypto,” and this statement cannot be underestimated. According to a blockchain analyst company, Elliptic, the hacking of a crypto exchange, ByBit, by North Korean hackers was the biggest heist in history. Hackers from the infamous Lazarus Group associated with the DPRK managed to steal $1.46 billion in crypto assets. Since 2017, the DPRK has stolen over $5 billion in crypto.  Allegedly, 40% of the North Korean military’s nuclear program is funded via stolen cryptocurrencies. Over $300 million of money stolen from ByBit was probably used to fund nuclear weapons.

The North Korean hackers use diverse tactics to steal crypto and launder money. On Aug. 13, 2025, a prominent anonymous crypto sleuth using the ZachXBT handle on X shared documents leaked from the North Korean hackers who pretended to be IT workers in Western companies. 

The leak revealed that five agents have been operating 30 fake identities and had bogus LinkedIn and Upwork IT worker accounts. They were communicating mostly in English and using various Google services to conduct their operations, buying accounts on job platforms, serial security numbers, etc. Some of the screenshots of the browser history of these agents reveal low levels of tech competency. According to ZachXBT, hiring a North Korean agent is “100% negligence.” In his opinion, figuring out that the candidate is a DPRK agent is not that hard.

However, despite the fact that the DPRK agents are bad at work and get fired quickly, they find new jobs; usually, several agents are taking positions at the same company simultaneously, and eventually manage to steal crypto.

6/ I am closely monitoring five other larger clusters of DPRK ITWs but will not share those addresses publicly since they are active.

One thing to note is the number does not include exploits conducted by them on projects (LND, ChainSaw, Favrr, Munchables, Dream, etc)

They… pic.twitter.com/kIbFewIM8b

— ZachXBT (@zachxbt) July 2, 2025

North Korean hackers used to launder stolen assets via Binance and Coinbase, but had to find other ways as these exchanges increased KYC/AML scrutiny. They developed a chain of over-the-counter brokers. Also, Korean hackers use crypto mixer platforms that obfuscate transaction data. In relation to the Lazarus Group activity, the U.S. Treasury named such mixer platforms as Sinbad, Tornado Cash, and Blender.

According to ZachXBT, public company Circle, which is a prime competitor of Tether, is neglecting the use of its stablecoin USDC in the DPRK-related money laundering operations, being the only company that didn’t freeze flagged wallets when ZachXBT brought up the connection. The company eventually froze the addresses involved in hacking months later. The Circle CEO, Jeremy Allaire, responded to ZachXBT’s criticism by saying that the company would not freeze addresses solely based on ZachXBT’s investigation. The request from the law enforcement was necessary.

5/ USDC was sent directly from Circle accounts to three addresses in this cluster.

It’s 1 hop from an address blacklisted by Tether in April 2023 tied to Hyon Sop Sim.

Other DPRK ITW clusters currently have decent sized quantities of USDC sitting.

I think it’s misleading… pic.twitter.com/vGCcMZX6wL

— ZachXBT (@zachxbt) July 2, 2025

ZachXBT accuses Circle of allowing Korean hackers to use USDC so that the company will earn via transaction fees. Similar claims were made against the MetaMask wallet, which was allegedly involved in the DPRK money laundering operations.

While ZachXBT dismisses the sophistication of the DPRK agents when they try to infiltrate tech companies, Coinbase has its reasons to be cautious. Given that Coinbase is responsible for the custody of over 2.2 million bitcoins, which is more than 10% of the total supply, extensive control over the works may not seem unnecessary. 





Source link

August 24, 2025 0 comments
0 FacebookTwitterPinterestEmail
The Whatsapp logo in disguise, with a big moustache..
Gaming Gear

U.S. House of Representatives memo reveals WhatsApp has been banned from employee devices, citing “a high risk to users due to the lack of transparency in how it protects user data” and security concerns

by admin June 25, 2025



Messaging apps are one of the banes of my existence. Every time I connect with someone new it seems there’s some back and forth on what app we should use to communicate. Often a part of this includes explaining to folks why I don’t use things like WhatsApp, due to the mix of ownership, security, and general distaste. It’s a horrible conversation where I look like an elitist jerk, but it warms my heart a little to know that now, everyone who works in the US House of Representatives will have to do the same thing.

According to Reuters, a memo went around the House of Representatives staff on Monday explaining that the popular messaging app has been banned. The Meta (Facebook) owned WhatsApp messaging service has been deemed too much of a security risk to be allowed on employees devices.

The memo reads the “Office of Cybersecurity has deemed WhatsApp a high risk to users due to the lack of transparency in how it protects user data, absence of stored data encryption, and potential security risks involved with its use.”


Related articles

The ban actually comes just in time, as Meta gets ready to add ads to make the messaging app a bit more like Instagram. This memo has likely saved many in the House of Representatives from some pretty invasive targeted advertising.

Naturally Meta is none too pleased with this development and disagrees “in the strongest possible terms,” to the move to ban the app. A spokesperson from Meta also stated that WhatsApp has a higher level of security than other messaging apps that are still allowed. But it’s likely not just the security level, but also the likelihood of being targeted that singled WhatsApp out for this ban.

WhatsApp being so popular, and not exactly having the best security around has made it the target of bad actors in the past. This includes Israeli spyware companies like Paragon Solutions. It also means that it’s so much easier for hackers to get access via someone you know, due to the apps prevalence, especially with those not so security minded.

Other messaging apps were recommended as alternatives in the memo from the chief administrative officer. Weirdly we don’t see Discord, for the gamers in the House (of reps). Instead, these include Microsoft Teams, Amazon’s Wickr, Apple’s iMessage and FaceTime, and my pick of the bunch, Signal.

Keep up to date with the most important stories and the best deals, as picked by the PC Gamer team.

Signal is an end-to-end encrypted messaging app I’ve been using for years. It’s an independent nonprofit dedicated to privacy, so there’s no ads or tracking. Most importantly, they can’t see your chats and neither can anyone else, so it’s usually the one I push for in that “what messaging app do you use” conversation from earlier.

Hopefully this will see more people give WhatsApp the boot in favour of exploring some slightly less partial messaging providers. If it’s not good enough for the United States House of Representatives, then is it really good enough for you? I don’t think so! Maybe consider this the time to treat yourself to a safer, more transparent messaging system that isn’t owned by one of the world’s richest men.

Best gaming setup 2025

Our current recommendations



Source link

June 25, 2025 0 comments
0 FacebookTwitterPinterestEmail

Categories

  • Crypto Trends (997)
  • Esports (751)
  • Game Reviews (692)
  • Game Updates (876)
  • GameFi Guides (989)
  • Gaming Gear (943)
  • NFT Gaming (971)
  • Product Reviews (933)
  • Uncategorized (1)

Recent Posts

  • Brewers pay tribute to legendary broadcaster Bob Uecker
  • Ripple expands in Asia, Bo Hines joins Tether
  • Fed Rate Cut Hopes May Backfire On Crypto
  • Strategy’s Michael Saylor Signals Impending BTC Buy For Treasury
  • The Best Cheap TVs (2025): TCL, Hisense, and More

Recent Posts

  • Brewers pay tribute to legendary broadcaster Bob Uecker

    August 24, 2025
  • Ripple expands in Asia, Bo Hines joins Tether

    August 24, 2025
  • Fed Rate Cut Hopes May Backfire On Crypto

    August 24, 2025
  • Strategy’s Michael Saylor Signals Impending BTC Buy For Treasury

    August 24, 2025
  • The Best Cheap TVs (2025): TCL, Hisense, and More

    August 24, 2025

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

About me

Welcome to Laughinghyena.io, your ultimate destination for the latest in blockchain gaming and gaming products. We’re passionate about the future of gaming, where decentralized technology empowers players to own, trade, and thrive in virtual worlds.

Recent Posts

  • Brewers pay tribute to legendary broadcaster Bob Uecker

    August 24, 2025
  • Ripple expands in Asia, Bo Hines joins Tether

    August 24, 2025

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

@2025 laughinghyena- All Right Reserved. Designed and Developed by Pro


Back To Top
Laughing Hyena
  • Home
  • Hyena Games
  • Esports
  • NFT Gaming
  • Crypto Trends
  • Game Reviews
  • Game Updates
  • GameFi Guides
  • Shop

Shopping Cart

Close

No products in the cart.

Close