Google reveals the infiltration of North Korea in European encryption companies

According to North Korea, IT workers have expanded their operations beyond the United States, as they targeted encryption projects, Blockchain and web development in the United Kingdom and Europe, according to Jadida. a report From the Google Intelligence Group (GTIG).
These individuals, who work under false identities, have included themselves in remote encryption situations, in order to generate revenues for the North Korean regime.
Increased global infrastructure and corporate risk
The increasing challenges of scrutiny and verification in the United States have prompted many of these workers to search for opportunities elsewhere, in the first place in Europe. According to GTIG Jimmy Coleer Counselor, actors created a global network of fraudulent figures for the better Mobility in international recruitment systems.
The report indicates that some of these workers have taken roles in the development of Blockchain, which includes smart contract platforms or encryption networks such as Solana and Anchor, and in projects that benefit from artificial intelligence through Blockchain integration.
Coller highlights the presence of facilitators in the UK, supports the formation of a broader infrastructure that allows continuous processes. GTIG’s investigation found that North Korean workers managed to join stretch projects Blockchain advanced ecosystem And the development of traditional technology.
According to what was reported, some individuals used multiple fake characters All over EuropeEven submitting accreditation papers from universities such as the University of Belgrade and demanding residency in countries including Slovakia, Germany and Portugal.
The fraudulent activity carries significant risks for the CYPTO companies concerned. GTIG warns that organizations that employ these workers may face spy threats, stealing data and internal disorder.
According to what was stated, these risks have escalated since October, as it is claimed that former workers threaten employers to leak data if the conditions of separation are not fulfilled. Sensitive property data, including the source code, were mentioned in these threats.
Fraud tactics and employment processing
The GTIG report also revealed broader evidence of employment manipulation, including entry -sharing adopting data for European job gates and detailed instructions to move on these platforms.
A broker has also been identified that facilitates the use of fake passports. Coller emphasized that the campaign appears to be paid Financial motives Associated with the North Korean state, with an increase in pressure to replace the income currents lost in the United States.
It is worth noting, with the continuous diversification of their goals and improving the use of international job searching strategies, Blockchain and Crypto may continue to infiltrate if left without deterrence.
Meanwhile, it appears that organizations throughout Europe and other places are already taking steps to enhance identity and monitoring measures Unusual Among the distant employees. Coller Books:
To avoid distributing companies for companies, some companies are working on the policy of bringing your device (BYD), allowing employees to access the company’s systems through virtual devices. Unlike companies that can be monitored, personal devices that work under BYD policy may lack traditional security and registration tools, making it difficult to track activities and define potential threats.
A distinctive image created with Dall-E, the tradingView chart
Editing process For Bitcoinist, it is focused on providing accurate, accurate and non -biased content. We support strict resource standards, and each page is subject to a diligent review by our team of senior technology experts and experienced editors. This process guarantees the integrity of our content, importance and value of our readers.
https://bitcoinist.com/wp-content/uploads/2025/04/DALLĀ·E-2025-04-02-14.15.54-A-dramatic-and-creative-digital-illustration-symbolizing-cyber-infiltration-by-North-Korean-hackers-into-European-crypto-firms.-The-image-features-a-s.webp