Charts
DataOn-chain
VIP
Market Cap
API
Rankings
CoinOSNew
CoinClaw🦞
Language
  • 简体中文
  • 繁体中文
  • English
Leader in global market data applications, committed to providing valuable information more efficiently.

Features

  • Real-time Data
  • Special Features
  • AI Grid

Services

  • News
  • Open Data(API)
  • Institutional Services

Downloads

  • Desktop
  • Android
  • iOS

Contact Us

  • Chat Room
  • Business Email
  • Official Email
  • Official Verification

Join Community

  • Telegram
  • Twitter
  • Discord

© Copyright 2013-2026. All rights reserved.

简体繁體English
|Legacy
BTCBTC
💲70648.40
-
0.9%
ETHETH
💲2078.56
-
0.73%
SOLSOL
💲87.32
-
1.37%
TRUMPTRUMP
💲4.07
+
21.49%
USDCUSDC
💲0.9999
-
0%
DOGEDOGE
💲0.09472
-
1.86%

North Korean hackers try to apply for Binance every day, forging a large number of resumes

律动BlockBeats
律动BlockBeats|Aug 13, 2025 13:25
BlockBeats News: On August 13th, Binance Chief Security Officer Jimmy Su stated that the trading platform receives a large number of forged resumes every day, and he is confident that these resumes are written by potential North Korean attackers. In his view, national level attackers from North Korea are the biggest threat facing companies in the cryptocurrency industry today. Su explained that North Korean attackers have always been a problem in Binance's eight year operating history, but recently their attack methods have been upgraded in the cryptocurrency field. The biggest threat to the encryption industry currently is national level attackers, especially the Lazarus Group in North Korea, "Su added." In the past two to three years, they have focused on the encryption field and achieved considerable success in their operations. "He also mentioned that" almost all major North Korean hacking incidents involve a person disguised as an employee assisting in the implementation of the attack There are two common attack methods used by North Korean national level attackers: implanting malicious code in public NPM libraries and issuing false job invitations to encryption practitioners. NPM (Node Package Manager) library or package is a commonly used reusable code collection by developers. Malicious attackers can copy these packages and insert a small line of malicious code, which could result in serious consequences while maintaining the original functionality. Even if the malicious code is only discovered once, it will gradually penetrate the system as developers build new features on top of it. To prevent such risks, Binance must carefully review every line of code. The main cryptocurrency exchange platforms will share security intelligence in Telegram and Signal groups to mark libraries implanted with malicious code and emerging attack methods in North Korea.
Mentioned
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Timeline

Sep 09, 04:09Projects like Uniswap were not affected by the NPM supply chain attack
Aug 21, 21:40Writing code without malicious intent does not constitute a crime
Aug 12, 06:30【Web3 Interview Scam Involves Disguising as a Legitimate Open Source Project】
Jul 27, 23:42【Recruitment project hides malicious code, suspected of stealing cryptocurrency assets】

HotFlash

|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

APP
Windows
Mac

X

Telegram

Facebook

Reddit

CopyLink

Hot Reads