Summary: How did North Korean IT operatives infiltrate cryptocurrency projects? According to blockchain investigator ZachXBT, five North Korean IT operatives used over 30 fake identities to secure developer roles. They relied on government IDs, purchased professional accounts, and used tools like AnyDesk and VPNs to mask their locations. The investigation also revealed detailed schedules, communications, and financial records showing how they coordinated and received payments. Blockchain investigator ZachXBT has revealed a sophisticated operation in which five North Korean IT operatives allegedly used more than 30 fabricated identities to secure positions as developers within cryptocurrency projects
source: https://news.shib.io/2025/08/14/north-korean-it-operatives-used-30-fake-identities-to-join-crypto-projects/