ETH
BIND
CRED
ZACH
READ
A new threat pattern is forcing crypto companies to treat recruiting and access control as one security problem: attackers can enter through hiring pipelines, then operate with the trust level of an internal engineer.
On April 8, 2026, investigator ZachXBT published findings that triggered reports of a $3.5M operation tied to fake DPRK-linked developer identities inside crypto firms, according to unconfirmed reports from a single incident write-up.
ZachXBT wrote that leaked records from an internal North Korean payment server included 390 accounts, chat logs, and crypto transactions, and said he reviewed the dataset before publishing on April 8, 2026.
1/ Recently an unnamed source shared data exfiltrated from an internal North Korean payment server containing 390 accounts, chat logs, crypto transactions.
— ZachXBT (@zachxbt) April 8, 2026
I spent long hours going through all of it, none of which has ever been publicly released.
It revealed an intricate… pic.twitter.com/aTybOrwMHq
A supporting incident report said the leak began with a compromised DPRK IT-worker device infected by an infostealer, then expanded into chats and wallet-flow records used for attribution.
U.S. Treasury context predates this thread: OFAC's July 8, 2025 action named Korea Songkwang Trading General Corporation and Korea Saenal Trading Corporation in DPRK IT-worker revenue schemes using false identities, and OFAC's July 24, 2025 action sanctioned Korea Sobaeksu Trading Company for clandestine revenue generation that included IT-worker operations.
The reported total comes from one media summary that said related wallets moved funds since late November 2025, according to unconfirmed reports that were not fully reproduced in the accessible primary thread.
Because the described leak included 390 accounts plus chats and transaction records, the risk model is insider-style: fake hires can combine repository visibility, internal communications context, and payment metadata faster than perimeter-only controls can detect abuse.
The OFAC naming of Songkwang, Saenal, and Sobaeksu across the July 8, 2025 designation and July 24, 2025 designation supports immediate segmentation of hot-wallet workflows, CI/CD deploy permissions, production cloud consoles, and payout operations.
Business impact can escalate from code tampering to treasury loss: Chainalysis estimated $2.02 billion in DPRK-attributed crypto theft during 2025, within more than $3.4 billion in total crypto theft during 2025, so one compromised identity can drive fund outflows, downtime, and reputational damage.
With $2.02 billion in DPRK-attributed theft during 2025 already documented, teams should avoid treating security as secondary to growth narratives around How BlockDAG's 95x ROI at $0.0000061 Pulls Buyers Away From Ethereum & Cardano This April, repeated framing on BlockDAG's $0.0000061 entry and 95x upside angle, and promotional cycles such as Spartans Casino Announces a $7M Leaderboard - $5M on the Line for One Lucky Winner.
The scale of the leaked dataset, including 390 accounts, indicates that identity checks must run before repository invitations, payment setup, or production access.
The combined evidence from OFAC's July 8, 2025 action and July 24, 2025 action supports role-based access that separates code contribution, deployment approval, wallet signing, and vendor payout authority.
For operators, the measurable takeaway is straightforward: the same ecosystem that recorded $2.02 billion in DPRK-attributed theft during 2025 now has public evidence of hiring-channel abuse signals, so identity proofing and privilege segmentation should be treated as treasury controls rather than administrative overhead.
Disclaimer: This article is for informational purposes only and does not constitute financial or investment advice. Cryptocurrency and digital asset markets carry significant risk. Always do your own research before making decisions.
Read original article on coinlive.me