Artwork

Inhalt bereitgestellt von Laura Shin. Alle Podcast-Inhalte, einschließlich Episoden, Grafiken und Podcast-Beschreibungen, werden direkt von Laura Shin oder seinem Podcast-Plattformpartner hochgeladen und bereitgestellt. Wenn Sie glauben, dass jemand Ihr urheberrechtlich geschütztes Werk ohne Ihre Erlaubnis nutzt, können Sie dem hier beschriebenen Verfahren folgen https://de.player.fm/legal.
Player FM - Podcast-App
Gehen Sie mit der App Player FM offline!

How North Koreans Infiltrated the Crypto Industry to Fund the Regime - Ep. 715

1:13:28
 
Teilen
 

Manage episode 444185197 series 1822984
Inhalt bereitgestellt von Laura Shin. Alle Podcast-Inhalte, einschließlich Episoden, Grafiken und Podcast-Beschreibungen, werden direkt von Laura Shin oder seinem Podcast-Plattformpartner hochgeladen und bereitgestellt. Wenn Sie glauben, dass jemand Ihr urheberrechtlich geschütztes Werk ohne Ihre Erlaubnis nutzt, können Sie dem hier beschriebenen Verfahren folgen https://de.player.fm/legal.

The crypto community is facing a new kind of threat—North Korean devs are infiltrating crypto companies to steal millions and funnel funds back to the regime in order to bypass sanctions.

In this episode, Sam Kessler, CoinDesk’s deputy managing editor for tech and protocols, and Taylor Monahan, security at MetaMask, explain how North Korea has embedded its operatives into the crypto space, the red flags companies should watch for, and what these hackers are doing once inside crypto firms.

Plus, they share their most interesting stories about how these hackers have gotten hired at crypto companies and the red flags the industry should know about.

Show highlights:

  • What Sam found in his investigation about North Koreans infiltrating the industry
  • How Taylor has found that this is a recurring issue
  • Why Sam and Taylor refer to these infiltrated workers as ‘IT’ workers
  • The most interesting stories that Sam and Taylor have discovered
  • The trends in the hiring process that lead to North Koreans being hired and also what the big red flags are
  • How “easy it is to de-anonymize” addresses and transactions in blockchains
  • What assets and networks these workers often use to get paid
  • How, after infiltrating a company, those projects get hacked
  • How to deal with a situation in which you’ve already hired North Koreans
  • How to protect a protocol from another type of North Korean hack: by hacking groups
  • Whether the industry is getting better at security

Visit our website for breaking news, analysis, op-eds, articles to learn about crypto, and much more: unchainedcrypto.com

Thank you to our sponsors!

Guests:

Links

Others:

Timestamps:

  • 00:00 Intro
  • 01:59 Sam's findings on North Korean workers infiltrating crypto projects
  • 04:04 Taylor on the recurring nature of the issue
  • 09:05 Why they’re referred to as ‘IT’ workers
  • 16:17 Most interesting infiltration stories
  • 34:16 Hiring trends and red flags for North Korean operatives
  • 44:02 How easy it is to de-anonymize blockchain transactions
  • 51:05 Assets and networks used for payment
  • 54:06 How infiltrated companies end up getting hacked
  • 58:36 What to do if you've already hired North Korean operatives
  • 1:00:21 How to protect a protocol from being hacked
  • 1:06:22 Is the industry improving in security?

Learn more about your ad choices. Visit megaphone.fm/adchoices

  continue reading

761 Episoden

Artwork
iconTeilen
 
Manage episode 444185197 series 1822984
Inhalt bereitgestellt von Laura Shin. Alle Podcast-Inhalte, einschließlich Episoden, Grafiken und Podcast-Beschreibungen, werden direkt von Laura Shin oder seinem Podcast-Plattformpartner hochgeladen und bereitgestellt. Wenn Sie glauben, dass jemand Ihr urheberrechtlich geschütztes Werk ohne Ihre Erlaubnis nutzt, können Sie dem hier beschriebenen Verfahren folgen https://de.player.fm/legal.

The crypto community is facing a new kind of threat—North Korean devs are infiltrating crypto companies to steal millions and funnel funds back to the regime in order to bypass sanctions.

In this episode, Sam Kessler, CoinDesk’s deputy managing editor for tech and protocols, and Taylor Monahan, security at MetaMask, explain how North Korea has embedded its operatives into the crypto space, the red flags companies should watch for, and what these hackers are doing once inside crypto firms.

Plus, they share their most interesting stories about how these hackers have gotten hired at crypto companies and the red flags the industry should know about.

Show highlights:

  • What Sam found in his investigation about North Koreans infiltrating the industry
  • How Taylor has found that this is a recurring issue
  • Why Sam and Taylor refer to these infiltrated workers as ‘IT’ workers
  • The most interesting stories that Sam and Taylor have discovered
  • The trends in the hiring process that lead to North Koreans being hired and also what the big red flags are
  • How “easy it is to de-anonymize” addresses and transactions in blockchains
  • What assets and networks these workers often use to get paid
  • How, after infiltrating a company, those projects get hacked
  • How to deal with a situation in which you’ve already hired North Koreans
  • How to protect a protocol from another type of North Korean hack: by hacking groups
  • Whether the industry is getting better at security

Visit our website for breaking news, analysis, op-eds, articles to learn about crypto, and much more: unchainedcrypto.com

Thank you to our sponsors!

Guests:

Links

Others:

Timestamps:

  • 00:00 Intro
  • 01:59 Sam's findings on North Korean workers infiltrating crypto projects
  • 04:04 Taylor on the recurring nature of the issue
  • 09:05 Why they’re referred to as ‘IT’ workers
  • 16:17 Most interesting infiltration stories
  • 34:16 Hiring trends and red flags for North Korean operatives
  • 44:02 How easy it is to de-anonymize blockchain transactions
  • 51:05 Assets and networks used for payment
  • 54:06 How infiltrated companies end up getting hacked
  • 58:36 What to do if you've already hired North Korean operatives
  • 1:00:21 How to protect a protocol from being hacked
  • 1:06:22 Is the industry improving in security?

Learn more about your ad choices. Visit megaphone.fm/adchoices

  continue reading

761 Episoden

همه قسمت ها

×
 
Loading …

Willkommen auf Player FM!

Player FM scannt gerade das Web nach Podcasts mit hoher Qualität, die du genießen kannst. Es ist die beste Podcast-App und funktioniert auf Android, iPhone und im Web. Melde dich an, um Abos geräteübergreifend zu synchronisieren.

 

Kurzanleitung