North Korean IT Team Infiltrates Crypto Firms with Fake IDs

Security researcher ZachXBT uncovered a six-member North Korean IT team that used more than 30 fake IDs to infiltrate leading crypto firms, including Polygon Labs, OpenSea and Chainlink. The operatives purchased stolen government IDs, phone numbers and LinkedIn and Upwork profiles to secure blockchain developer roles. They used Google Sheets to manage budgets, Google Translate for communication, and AnyDesk and VPN services to mask North Korean IPs, executing a covert crypto infiltration. On-chain analysis linked one of their ERC-20 wallets (0x78e1a) to the $680,000 Favrr exploit in June 2025. Device forensics revealed screenshots, Google Drive exports and browser histories via Russian IPs, confirming the operation’s North Korean origin. Following the exposé, major crypto platforms launched internal audits, underscoring the urgent need for stringent identity verification, network security and on-chain monitoring to prevent similar fake ID attacks.
Bearish
This report of state-sponsored infiltration and a high-value exploit via fake IDs is bearish for Favrr’s token. In the short term, revelations of security failures and on-chain hacks undermine trader confidence and could trigger sell-offs. Over the long term, investors may demand stronger auditing and identity verification, but reputational damage and potential regulatory scrutiny may suppress Favrr’s market recovery. The hack emphasizes systemic risks, likely weighing on the token’s price performance.