Fireblocks has disclosed details of a highly coordinated cyber campaign in which North Korean threat actors impersonated the company’s recruiters to target cryptoFireblocks has disclosed details of a highly coordinated cyber campaign in which North Korean threat actors impersonated the company’s recruiters to target crypto

Fireblocks Exposes Sophisticated Lazarus-Linked Hiring Scam

2026/01/23 15:04
4 min read
For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

Fireblocks has disclosed details of a highly coordinated cyber campaign in which North Korean threat actors impersonated the company’s recruiters to target crypto developers with malware. The investigation, published on January 22, 2026, revealed that attackers linked to the Lazarus Group leveraged fake recruitment processes to compromise victims’ systems and steal sensitive digital asset credentials.

The operation, internally labeled Operation Contagious Interview by Fireblocks’ security team, demonstrated a high level of sophistication. Attackers posed as legitimate Fireblocks recruiters on LinkedIn and used realistic hiring workflows to establish credibility before delivering malicious payloads disguised as routine coding tasks.

Impersonation Tactics and Social Engineering

According to the findings, the attackers created multiple convincing LinkedIn profiles that appeared to belong to Fireblocks executives, recruiters, and hiring managers. These profiles included professional photographs, detailed employment histories, and network connections aligned with blockchain and technical roles. Unlike many phishing attempts, the campaign avoided obvious warning signs such as spelling mistakes or poor formatting.

Once developers engaged with these profiles, they were sent professionally designed PDF documents outlining a fictitious initiative referred to as the Fireblocks Poker Platform. To further reinforce authenticity, the attackers built detailed design mockups using tools such as Figma. The materials closely mirrored Fireblocks’ real branding and referenced the company’s recent acquisition of Dynamic, which had been announced only weeks earlier. This level of accuracy indicated that the attackers were actively monitoring Fireblocks’ public announcements.

Fake Interviews and Malware Delivery

The scam extended beyond written communication into live interaction. Victims were invited to video interviews conducted over Google Meet, where the impostors followed standard hiring practices by asking about work experience and compensation expectations. After establishing rapport, the interviewers assigned what was presented as a code review or technical assessment and abruptly ended the call, citing scheduling constraints.

The malicious stage of the attack occurred when candidates followed standard developer workflows. Victims were instructed to clone a GitHub repository and run npm install, a common setup step. Executing this command triggered hidden malicious code, granting attackers access to the victim’s system. The malware infrastructure also employed a technique known as EtherHiding, which uses blockchain smart contracts to host command-and-control instructions, making the operation more resilient to takedowns.

Attribution to the Lazarus Group

Fireblocks’ security research team attributed the campaign to APT 38, a subgroup of the Lazarus Group known for financially motivated cyber operations. The investigation identified similarities with earlier attacks, including a previous recruitment scam that impersonated Multibank Group and used a comparable fake poker platform as bait.

The primary objective of the operation was financial theft. By compromising developers’ machines, the attackers sought to steal credentials, private keys, seed phrases, and access to development environments. Because developers often have elevated access to production systems and sensitive repositories, successful infections could provide attackers with entry points into entire organizations.

Indicators and Campaign Disruption

Fireblocks identified at least twelve fake personas used during the campaign. Indicators of compromise included the use of personal email addresses instead of corporate domains, Calendly links hosted on non-corporate sites, AI-generated profile descriptions, and LinkedIn accounts with little historical activity that suddenly became active.

The campaign began to unravel when several job seekers contacted Fireblocks employees directly to ask about the supposed poker platform project. These inquiries were escalated internally, allowing the security team to confirm the impersonation. Fireblocks then worked with LinkedIn to report and remove fraudulent profiles and coordinated the takedown of malicious repositories.

Guidance for the Crypto Community

Fireblocks has stated that it coordinated with intelligence partners and law enforcement to reduce the risk of follow-on attacks. The company, which reports securing more than $10 trillion in digital asset transfers across hundreds of millions of wallets, emphasized the importance of vigilance during recruitment processes.

Job seekers in the crypto sector are advised to verify recruiter outreach against official company career pages and ensure that communications originate from verified corporate email addresses. Fireblocks also noted that being asked to clone repositories and run installation commands as part of an interview process should be treated with caution, even when the overall interaction appears legitimate.

The post Fireblocks Exposes Sophisticated Lazarus-Linked Hiring Scam appeared first on CoinTrust.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Bio Protocol Raises $6.9M to Advance AI-Powered Decentralized Science

Bio Protocol Raises $6.9M to Advance AI-Powered Decentralized Science

The post Bio Protocol Raises $6.9M to Advance AI-Powered Decentralized Science appeared on BitcoinEthereumNews.com. Decentralized science (DeSci) platform Bio Protocol secured backing from investors including Maelstrom Fund and Animoca Brands to expand its artificial intelligence-native biotech research framework.  Bio Protocol announced Wednesday that it had raised $6.9 million in funding, reflecting growing interest in decentralized approaches to drug discovery that integrate AI, blockchain and community engagement.  Maelstrom founder Arthur Hayes described Bio Protocol as a potential “category-defining launchpad” for scientific research. “If it works, it’s not just a launchpad – it’s the birth of an AI-native research market,” he said. Hayes also highlighted how it opens up research opportunities that communities find appealing, not just what academics find interesting.  Cointelegraph reached out to Maelstrom and Animoca for more information, but did not receive a response by publication.  Source: Bio Protocol Speeding up science using AI and crypto DeSci is a movement that uses blockchain technology, crypto incentives and decentralized governance to change how scientific research is conducted, funded and shared. Bio Protocol said it’s speeding up science by integrating crypto and AI. Its approach compresses the drug discovery pipeline using blockchain-based funding and coordination.  Instead of waiting years for traditional grants to be awarded or pharma partnerships to be formed, researchers can use decentralized AI agents, dubbed “BioAgents” that generate hypotheses, connect to onchain wallets and channel community-raised capital into experiments.  Each step of the process will be recorded onchain, ensuring that contributors will be credited and maintaining an immutable record of research progress.  The protocol also uses crypto-native incentives to keep research moving faster. It uses tokenized intellectual property, staking systems and loyalty rewards to align investors, researchers and community members around shared outcomes.  Related: ‘Science needs an update’: How DeSci can fix junk science and cure baldness Addressing inefficiencies in academic research Simon Dedic, the founder of Moonrock Capital, one of Bio…
Share
BitcoinEthereumNews2025/09/19 11:05
Winklevoss Brothers’ $130M Bitcoin Move Sparks Market Scrutiny and Strategic Speculation

Winklevoss Brothers’ $130M Bitcoin Move Sparks Market Scrutiny and Strategic Speculation

BitcoinWorld Winklevoss Brothers’ $130M Bitcoin Move Sparks Market Scrutiny and Strategic Speculation NEW YORK, April 2025 – A substantial Bitcoin transaction
Share
bitcoinworld2026/03/10 19:10
YouTube Surpasses Disney as World’s Largest Media Giant With $62.3B Revenue

YouTube Surpasses Disney as World’s Largest Media Giant With $62.3B Revenue

YouTube generated $62.3B in 2025 revenue, surpassing Disney to become the world's largest media company, valued at $500B-$560B by MoffettNathanson. The post YouTube
Share
Blockonomi2026/03/10 19:31