Particle.news

Download on the App Store

Compromised Device Reveals North Korean IT Operatives Used 30 Fake Identities in $680K Crypto Hack

Metadata from Google Drive exports plus expense spreadsheets provide an unprecedented look at how DPRK operatives leverage AI tools plus rented hardware to win remote developer roles

north korea
Image

Overview

  • The compromised laptop detailed expense logs for fake Social Security numbers, AI subscriptions, VPNs, proxies and computer rentals tied to each fabricated identity.
  • Exports from Google Calendar, Sheets and Docs showed a five-person cell maintaining scripted backstories and schedules across more than 30 personas.
  • AnyDesk remote-access sessions and VPN routing through Russian relays masked the operatives’ true locations and confirmed their North Korean origins through Chrome browser history.
  • One Ethereum wallet on the device was traced to the June 2025 Favrr breach that siphoned $680,000, with earnings funneled through Payoneer before conversion to cryptocurrency.
  • Analysts say weak ID verification on hiring platforms and limited private–public data sharing have allowed similar DPRK infiltration schemes to persist despite recent DOJ and FBI disruptions.