Crypto Hacker Busted by Kraken Through Smart Interview Trap

By: cryptotale org|2025/05/02 15:45:01
Share
copy
During the interview, Kraken found a fake applicant using voice tricks and false names.The email used by the hacker matched records tied to known cybercrime and breaches.Tests revealed the hacker failed to confirm their location or show real ID documents.In a stunning example of cyber defense in action, Kraken foiled an alleged infiltration attempt by a North Korean state-sponsored hacker who posed as an engineering job applicant. The exchange’s security and recruitment team made the candidate advance to the next level to uncover their methods. As the interview progressed, mismatched identities, voice inconsistencies, and altered documents posed as red flags. The interview enabled Kraken to highlight significant security gaps in hiring at digital currency firms. UPDATE: @krakenfx discovered a North Korean hacker posing as an engineering candidate. The team spotted red flags, gathered intel, and exposed the state-backed operation during the interview.Latest updates https://t.co/YGGHcDVn1z pic.twitter.com/cJhRBRuoN2— Crypto Tale (@cryptotalemedia) May 2, 2025Red Flags Spark Deep Internal ProbeThe exchange found the candidate suspicious, right when the interview commenced. In the video call, initiated by the firm, the candidate used another name, different from the one in his resume. When he was confronted over the name change, the applicant quickly rectified the mistake, raising alarm among the recruiting team. Moreover, the candidate’s voice changed periodically during the interview, indicating possible real-time coaching by a third party, a tactic commonly used in coordinated cyber operations. According to Kraken, “The frequent shifts suggested the applicant wasn’t acting alone.”Industry partners had previously shared warnings about state-affiliated hackers targeting jobs in crypto startups. Kraken had obtained a list of flagged email addresses associated with known North Korean hacking groups, wherein one of the email addresses matched that of the candidate, used in the interview. Kraken’s Red Team launched a background investigation using Open-Source Intelligence (OSINT) techniques and cross-referenced the email against breach data, discovering ties to fake identities used in prior attacks.Technical Traps and OSINT Confirm ThreatSubsequent investigations also revealed that the GitHub profile of the candidate matched that of a limited email account compromised in an earlier breach. Additionally, the candidate worked on a colocated Mac desktop that was accessed via VPN, disguising its real location.The identity card submitted was reportedly modified and linked to a known identity theft case. Despite the clues, Kraken intentionally moved the candidate to the next level to observe and expose their tactics. According to Chief Security Officer Nick Percoco, “The goal was not to recruit, but to reveal.”The applicant was given a range of technical and identity verification tests, which include location verification, ID authentication, and cybersecurity knowledge assessments. During the final interview, Kraken added location-based questions and two-factor prompts. Related: CEX Kraken Eyes $1B Debt Raise Before Potential IPOLast Interview Reveals Hidden IntentionsThis final round, hosted by CSO Nick Percoco and other senior staff, was held to subtly verify the applicant’s claimed location and identity. The Kraken team requested that the applicant verify their identity, provide a government document, and answer questions based on their citizenship. Every question was designed to reveal some inconsistencies, and due to pressure, the candidate faltered and failed to provide relevant answers. With this, the interrogation ended without any ambiguity. The exchange confirmed an infiltration attempt by a nefarious contender trying to access the internal systems. Kraken stated that the candidate was not an engineer, but a state-backed threat actor using deceptive means to penetrate the infrastructure.The post Crypto Hacker Busted by Kraken Through Smart Interview Trap appeared first on Cryptotale.

You may also like

When Everyone Uses AI Trading, Where Does Cryptocurrency Alpha Go in 2026?

In 2025, AI trading has become the default, but Alpha hasn’t disappeared — it’s been eroded by crowding, as similar data, models, and strategies cause traders to act in sync and lose their edge.
Real Alpha has shifted to harder-to-copy layers like behavioral and on-chain data, execution quality, risk management, and human judgment in extreme markets, where acting differently — or not acting at all—matters more than better predictions.

Without Narrative Power, Web3 Will Not Tap into the Vastness

In the Web3 space, the importance of storytelling far surpasses any other industry.

Insight: 2026 Could Usher in a “Crypto Winter,” but Institutionalization and On-chain Transformation Are Accelerating

Key Takeaways Cantor Fitzgerald predicts Bitcoin could face an extended downtrend, signaling a potential “Crypto Winter” by 2026.…

Caixin: Digital RMB Wallet Balances to Begin Earning Interest in 2026

Key Takeaways: Starting January 1, 2026, digital RMB wallets will earn interest on balances. The operational structure will…

Key Market Information Discrepancy on December 30th – A Must-See!

Key Takeaways Meta’s massive acquisition of Manus is poised to reshape the tech landscape, indicating significant growth in…

From Failures to Success: Building Crypto Products That Truly Matter

Key Takeaways Building infrastructure in crypto doesn’t guarantee success; understanding user needs is critical. Products aimed at younger…

Popular coins

Latest Crypto News

Read more