Main points :

1. A New Phase of the Crypto War: Infiltration from the Inside

The article you provided highlights a stark warning from Pablo Sabbatella, founder of Web3 audit firm opsek and member of security collective SEAL. On November 22, 2025, he warned that North Korean operatives may have already infiltrated as many as 15–20% of crypto companies, primarily via remote-work hiring channels. According to his estimate, around 30–40% of job applications that some Web3 firms receive are in fact forged or fronted by North Korean IT workers.

This is not a theoretical risk. Over the past few years, crypto has become a core funding stream for North Korea’s weapons programs. UN reports and allied governments estimate that DPRK-linked hackers have stolen about $3 billion in crypto between 2017 and 2023, with the money suspected of funding nuclear and ballistic-missile development.

What began as “external” hacks on exchanges and DeFi protocols has now evolved into a more dangerous pattern: the enemy is applying for a job inside your company. For founders, token issuers, and DeFi builders, this means that the attack surface is no longer just smart contracts or bridges. It includes your recruitment pipeline, HR processes, and remote-work infrastructure.

2. How the Infiltration Works: Fake Remote Workers and Identity Fronts

2.1 The front-person model and the 80/20 split

According to Sabbatella’s analysis, North Korean IT workers rarely apply under their real identities. Instead, they:

This structure allows the DPRK to bypass sanctions and KYC, turning ordinary payroll flows into a covert funding rail. U.S. authorities and international media have documented similar patterns in non-crypto sectors, where North Korean remote IT workers funnel income back to the regime using forged documents, stolen identities, and shell companies.

Once inside a crypto firm as a “normal” developer, DevOps engineer, or security contractor, these operatives gain:

From here, the step from “employee” to “inside attacker” is dangerously small.

3. From Job Application to Attack: OPSEC Failures in Crypto

3.1 Why Sabbatella calls Web3 “the worst OPSEC in IT”

Sabbatella describes the crypto sector as having “the worst operational security in the IT industry.” Many Web3 projects are small, fast-moving teams where founders are juggling fundraising, token listings, exchange relations, and community building. Under pressure to ship quickly, they:

This creates a perfect environment for malware installation, credential harvesting, and quiet data exfiltration.

Once a North Korean–linked operator is onboarded, they can:

These are no longer “smash and grab” exploits. They are long-term embedded campaigns that treat Web3 firms as both targets and stepping stones in a larger global laundering network.

4. The Broader Threat Landscape: From Bybit to DeFi and Mixers

The infiltration issue sits on top of an already massive record of direct DPRK crypto thefts:

These funds are laundered through:

To visualize the scale and evolution of the threat, you can use the following conceptual figure:

For builders, the main message is that North Korean operations are now diversified: some teams specialize in protocol or bridge exploits; others focus on infiltrating companies through remote work and insider attacks.

5. Global Response: Joint Statements, Sanctions, and Industry Pressure

5.1 U.S.–Japan–South Korea alignment

On January 14, 2025, the U.S., Japan, and South Korea released a joint statement calling out North Korean cryptocurrency thefts and urging both governments and private firms to strengthen defenses and cooperate on asset recovery.

Key points from this and related statements:

In November 2025, the U.S. Treasury’s OFAC sanctioned individuals and entities involved in laundering cybercrime proceeds and funds derived from North Korean IT worker schemes, highlighting again that fake remote workers are now a top enforcement priority. U.S. 

6. Attack Vectors: From Fake Job Offers to Supply-Chain Attacks

6.1 Fake job offers and poisoned code

Recent investigations show that North Korean actors are spamming the crypto industry with highly credible job offers and candidate profiles, sometimes even impersonating well-known companies or using cloned LinkedIn and GitHub identities.

Typical patterns include:

This blends social engineering with supply-chain compromise, making it extremely hard to detect—especially in open, remote-friendly Web3 teams.

6.2 Visualizing infiltration channels

You can think of the threat landscape as a mix of several major vectors:

While classic exchange and bridge hacks remain substantial, the combination of fake remote jobs and IT worker schemes is gaining share as a preferred method of infiltration. For North Korea, this approach has an added advantage: it creates steady, recurring revenue from salaries, separate from one-off hack payouts.

7. What Crypto Builders and Investors Should Do Now

For readers who are exploring new crypto assets, next revenue sources, or practical blockchain applications, this topic might sound like pure “defense” rather than opportunity. In practice, it is both.

Projects that demonstrate serious OPSEC and insider-risk controls will increasingly stand out in:

Below are concrete measures that founders, token issuers, and infrastructure builders can adopt today.

7.1 Secure hiring and identity verification

  1. Multi-layer identity checks for remote hires
    • Require government ID plus live video verification, and cross-check IP locations with stated residence.
    • Use KYB/KYC providers that specialize in synthetic identity and sanctions screening.
    • Be skeptical of “too perfect” profiles with very broad skill sets and indistinct work histories.
  2. Country-of-origin risk scoring
    • Flag applicants from high-risk routes commonly used by DPRK fronts (e.g., mismatched IP locations, payments routed through unusual third-country banks).
    • For critical roles (devops, security, wallet engineering), consider restricting to vetted jurisdictions or requiring stronger documentation.
  3. Contractor segregation
    • Separate core infrastructure and signing logic from general development.
    • Limit access for contractors to narrow, clearly defined repositories and revoke access automatically when contracts end.

7.2 Network, access, and code-security controls

  1. Zero-trust and least-privilege
    • Implement role-based access control (RBAC) with minimal privileges per role.
    • Enforce multi-factor authentication everywhere, especially for admin panels and signing services.
  2. Segmented environments
    • Isolate production, staging, and development environments.
    • Use bastion hosts, VPNs, and device posture checks before granting access.
  3. Secure SDLC and supply-chain defenses
    • Use signed commits, reproducible builds, and dependency scanning.
    • Integrate SAST/DAST tools and periodic manual code reviews, especially around wallet logic and bridge contracts.
  4. Insider-risk monitoring
    • Log and review privileged actions (key changes, policy edits, large transfers).
    • Set up alert thresholds for unusual behavior (off-hours access from new IPs, large code changes by new hires, etc.).

7.3 Strategic opportunity: security as a revenue driver

For entrepreneurs and token hunters, this threat also creates new markets and monetization paths:

Tokens and projects that can prove measurable reductions in insider and nation-state risk are more likely to attract institutional flows, insurance coverage, and enterprise customers.

8. Conclusion: Infiltration Risk as a Core Part of Crypto’s Next Cycle

The warning that “up to 20% of crypto firms may already be infiltrated” is not merely sensational. It reflects a convergence of:

The result is a quiet, ongoing campaign where job offers, GitHub contributions, and Slack accounts are weapons alongside smart-contract exploits and bridge hacks.

For serious builders, the response must go beyond patching individual vulnerabilities. It requires:

In the next cycle, crypto projects that survive and thrive will be those that combine innovation with rigorous security discipline. For investors searching for the next asset or revenue stream, a project’s stance on North Korean–style threats—fake workers, insider risk, and supply-chain compromise—should be a core part of due diligence.

Security is no longer just a cost center. In a world where adversaries are literally trying to join your team, it is part of the product, part of the brand, and a major driver of long-term value.