A North Korean operative, posing as a Japanese developer named “Motoki,” inadvertently revealed ties to a broader network of cyber threat actors during a staged job interview designed to expose infiltration attempts within the cryptocurrency industry.
The sting operation was orchestrated by Heiner Garcia, a cyber threat intelligence expert at Telefónica, in collaboration with Cointelegraph. Garcia had been investigating a cluster of GitHub accounts linked to suspected North Korean operatives seeking freelance work in the crypto sector. His attention was drawn to Motoki’s profile, which unusually featured a human face photo—a rarity among North Korean state actors.
Garcia initiated contact with Motoki under the guise of a headhunter for a fictitious company. During the interview conducted on February 25, Motoki’s behavior raised suspicions. He repeatedly gave identical answers to different questions and failed to demonstrate proficiency in Japanese, despite claiming to be a native speaker. When prompted to introduce himself in Japanese, Motoki hesitated, appeared to search for a scripted response, and ultimately terminated the call abruptly.
Notably, during the interview, Motoki shared his screen, inadvertently exposing access to private GitHub repositories associated with “bestselection18,” a known alias for a seasoned North Korean IT infiltrator. This revelation provided concrete evidence linking Motoki to a larger network of operatives attempting to penetrate the crypto gig economy through platforms like OnlyDust.
Garcia’s findings underscore the sophisticated tactics employed by North Korean cyber actors, who leverage false identities and exploit remote work opportunities to infiltrate sensitive sectors. The incident highlights the critical need for rigorous vetting processes and heightened vigilance in the hiring practices within the cryptocurrency industry.