Artwork

เนื้อหาจัดทำโดย Laura Shin เนื้อหาพอดแคสต์ทั้งหมด รวมถึงตอน กราฟิก และคำอธิบายพอดแคสต์ได้รับการอัปโหลดและจัดหาให้โดยตรงจาก Laura Shin หรือพันธมิตรแพลตฟอร์มพอดแคสต์ของพวกเขา หากคุณเชื่อว่ามีบุคคลอื่นใช้งานที่มีลิขสิทธิ์ของคุณโดยไม่ได้รับอนุญาต คุณสามารถปฏิบัติตามขั้นตอนที่แสดงไว้ที่นี่ https://th.player.fm/legal
Player FM - แอป Podcast
ออฟไลน์ด้วยแอป Player FM !

How North Koreans Infiltrated the Crypto Industry to Fund the Regime - Ep. 715

1:13:28
 
แบ่งปัน
 

Manage episode 444185197 series 1822984
เนื้อหาจัดทำโดย Laura Shin เนื้อหาพอดแคสต์ทั้งหมด รวมถึงตอน กราฟิก และคำอธิบายพอดแคสต์ได้รับการอัปโหลดและจัดหาให้โดยตรงจาก Laura Shin หรือพันธมิตรแพลตฟอร์มพอดแคสต์ของพวกเขา หากคุณเชื่อว่ามีบุคคลอื่นใช้งานที่มีลิขสิทธิ์ของคุณโดยไม่ได้รับอนุญาต คุณสามารถปฏิบัติตามขั้นตอนที่แสดงไว้ที่นี่ https://th.player.fm/legal

The crypto community is facing a new kind of threat—North Korean devs are infiltrating crypto companies to steal millions and funnel funds back to the regime in order to bypass sanctions.

In this episode, Sam Kessler, CoinDesk’s deputy managing editor for tech and protocols, and Taylor Monahan, security at MetaMask, explain how North Korea has embedded its operatives into the crypto space, the red flags companies should watch for, and what these hackers are doing once inside crypto firms.

Plus, they share their most interesting stories about how these hackers have gotten hired at crypto companies and the red flags the industry should know about.

Show highlights:

  • What Sam found in his investigation about North Koreans infiltrating the industry
  • How Taylor has found that this is a recurring issue
  • Why Sam and Taylor refer to these infiltrated workers as ‘IT’ workers
  • The most interesting stories that Sam and Taylor have discovered
  • The trends in the hiring process that lead to North Koreans being hired and also what the big red flags are
  • How “easy it is to de-anonymize” addresses and transactions in blockchains
  • What assets and networks these workers often use to get paid
  • How, after infiltrating a company, those projects get hacked
  • How to deal with a situation in which you’ve already hired North Koreans
  • How to protect a protocol from another type of North Korean hack: by hacking groups
  • Whether the industry is getting better at security

Visit our website for breaking news, analysis, op-eds, articles to learn about crypto, and much more: unchainedcrypto.com

Thank you to our sponsors!

Guests:

Links

Others:

Timestamps:

  • 00:00 Intro
  • 01:59 Sam's findings on North Korean workers infiltrating crypto projects
  • 04:04 Taylor on the recurring nature of the issue
  • 09:05 Why they’re referred to as ‘IT’ workers
  • 16:17 Most interesting infiltration stories
  • 34:16 Hiring trends and red flags for North Korean operatives
  • 44:02 How easy it is to de-anonymize blockchain transactions
  • 51:05 Assets and networks used for payment
  • 54:06 How infiltrated companies end up getting hacked
  • 58:36 What to do if you've already hired North Korean operatives
  • 1:00:21 How to protect a protocol from being hacked
  • 1:06:22 Is the industry improving in security?

Learn more about your ad choices. Visit megaphone.fm/adchoices

  continue reading

761 ตอน

Artwork
iconแบ่งปัน
 
Manage episode 444185197 series 1822984
เนื้อหาจัดทำโดย Laura Shin เนื้อหาพอดแคสต์ทั้งหมด รวมถึงตอน กราฟิก และคำอธิบายพอดแคสต์ได้รับการอัปโหลดและจัดหาให้โดยตรงจาก Laura Shin หรือพันธมิตรแพลตฟอร์มพอดแคสต์ของพวกเขา หากคุณเชื่อว่ามีบุคคลอื่นใช้งานที่มีลิขสิทธิ์ของคุณโดยไม่ได้รับอนุญาต คุณสามารถปฏิบัติตามขั้นตอนที่แสดงไว้ที่นี่ https://th.player.fm/legal

The crypto community is facing a new kind of threat—North Korean devs are infiltrating crypto companies to steal millions and funnel funds back to the regime in order to bypass sanctions.

In this episode, Sam Kessler, CoinDesk’s deputy managing editor for tech and protocols, and Taylor Monahan, security at MetaMask, explain how North Korea has embedded its operatives into the crypto space, the red flags companies should watch for, and what these hackers are doing once inside crypto firms.

Plus, they share their most interesting stories about how these hackers have gotten hired at crypto companies and the red flags the industry should know about.

Show highlights:

  • What Sam found in his investigation about North Koreans infiltrating the industry
  • How Taylor has found that this is a recurring issue
  • Why Sam and Taylor refer to these infiltrated workers as ‘IT’ workers
  • The most interesting stories that Sam and Taylor have discovered
  • The trends in the hiring process that lead to North Koreans being hired and also what the big red flags are
  • How “easy it is to de-anonymize” addresses and transactions in blockchains
  • What assets and networks these workers often use to get paid
  • How, after infiltrating a company, those projects get hacked
  • How to deal with a situation in which you’ve already hired North Koreans
  • How to protect a protocol from another type of North Korean hack: by hacking groups
  • Whether the industry is getting better at security

Visit our website for breaking news, analysis, op-eds, articles to learn about crypto, and much more: unchainedcrypto.com

Thank you to our sponsors!

Guests:

Links

Others:

Timestamps:

  • 00:00 Intro
  • 01:59 Sam's findings on North Korean workers infiltrating crypto projects
  • 04:04 Taylor on the recurring nature of the issue
  • 09:05 Why they’re referred to as ‘IT’ workers
  • 16:17 Most interesting infiltration stories
  • 34:16 Hiring trends and red flags for North Korean operatives
  • 44:02 How easy it is to de-anonymize blockchain transactions
  • 51:05 Assets and networks used for payment
  • 54:06 How infiltrated companies end up getting hacked
  • 58:36 What to do if you've already hired North Korean operatives
  • 1:00:21 How to protect a protocol from being hacked
  • 1:06:22 Is the industry improving in security?

Learn more about your ad choices. Visit megaphone.fm/adchoices

  continue reading

761 ตอน

همه قسمت ها

×
 
Loading …

ขอต้อนรับสู่ Player FM!

Player FM กำลังหาเว็บ

 

คู่มืออ้างอิงด่วน