Key Takeaways
The crypto job market keeps growing, attracting skilled workers and cyber threats.
In May 2025, Kraken, a centralized cryptocurrency exchange, revealed that a supposed software engineer named “Steven Smith” was actually a North Korean hacker trying to infiltrate the company.
North Korean hacker groups, especially the Lazarus Group, have repeatedly targeted cryptocurrency exchanges and companies. These operations are believed to help fund North Korea’s nuclear weapons and ballistic missile programs, according to multiple reports from the United Nations, U.S. Treasury , and cybersecurity firms like Chainalysis .
Kraken’s security team, led by Chief Security Officer Nicholas Percoco, continued the interview process to understand how these threats operate.
Percoco used casual questions about Halloween and food to uncover inconsistencies in the applicant’s story. What started as a standard hiring process became a live investigation into state-backed deception.
This article explains the social engineering tactics targeting crypto employers, the red flags in suspicious job applications, how to vet candidates in Web3, and what crypto companies can do to strengthen their hiring protocols.
Steven Smith submitted a resume, completed tests, and scheduled interviews. But things changed during the live video calls. He used a different name when joining the call, and his voice occasionally shifted, as if someone was coaching him in real time.
The applicant failed to provide clear answers or showed confusion, revealing gaps in cultural knowledge that usually come with living in the U.S., as the resume claimed. Further checks raised deeper concerns.
The email address matched one used in past North Korean cyber campaigns. The GitHub activity was tied to compromised codebases.
The applicant also accessed the interviews through remote desktops behind a VPN, masking the real location. This case is not isolated and similar tactics have been reported.
Kraken documented the whole process and shared it with media outlets to warn others in the industry, ensuring that Steven did not get the job at Kraken.
However, as Chief Security Officer Nicholas Percoco pointed out, he almost certainly got hired by another company in the industry.
CCN reached out to Sam Wellalage, executive recruiter in blockchain and fintech at WorkInCrypto, to understand how fake job applicants have evolved in the Web3 space. He confirmed that this is not new, but the methods have changed.
“This is something I’ve been seeing for a while,” he said, explaining that the problem includes both fake job ads and fake applications. The focus here, he noted, is on the applicants, who have grown far more sophisticated since 2021.
Wellalage recalled how scams used to be easy to spot. Fake candidates often used common names like “John Matthews” and listed experience from top-tier firms. However, once asked for a video interview, they would claim a camera malfunction and refuse to show their face.
Today’s tactics go further. Some applicants mimic real professionals with cloned resumes, coached responses, and masked identities. Wellalage emphasized the importance of using live video.
“We never put someone forward unless we’ve spoken to them on video ourselves, no matter what level they’re at.” The issue, however, lies with companies and recruiters who skip this step and forward candidates without even seeing them or assessing them in depth.
Surface-level questions do not reveal the truth. Instead, Wellalage advises asking what the applicant personally did on past projects and how it impacted outcomes. “The depth and authenticity of those answers usually tell you everything you need to know.”
In Web3 hiring, scammers no longer rely on fake resumes alone; they create full identities meant to slip through basic screening. Hiring teams must recognize warning signs early in the process.
Some of the red flags are the following:
Hiring in Web3 involves unique risks that traditional frameworks do not fully address. Remote structures, pseudonymous applicants, and decentralized team models increase the likelihood of infiltration.
Strengthening protocols requires balancing privacy concerns with the need for rigorous verification.
Recommended practices for reinforcing hiring frameworks include:
These are strategic and structural changes that make the entire hiring system more secure over time:
A strong hiring process protects companies, projects, and entire organizations and it reinforces the integrity and credibility of the crypto ecosystem. But security must never override ethics.
As cases of company espionage rise across the industry, protecting internal systems from infiltration is essential.
The best defense against social engineering is a balance of structured verification, professional empathy, and respect for privacy.
Web3 companies that invest in thoughtful hiring frameworks will be able to block insider threats and build trust with the right talent.
Very common. Groups like Lazarus have been linked to high-profile hacks and fake job campaigns. Their goal is often to fund state operations through stolen crypto. They can offer clues, but they are not definitive. They must be cross-verified with other data. Yes. With standardized workflows, strong identity checks, and layered onboarding practices, remote-first companies can remain both agile and secure. How common are North Korean attacks on crypto companies?
Are blockchain addresses reliable for background checks?
Can fully remote crypto teams still enforce secure hiring?