🕵️‍♂️ INSIDER THREAT EXPOSED: ETHEREUM-FUNDED PROJECT UNCOVERS 100 NORTH KOREAN OPERATIVES IN WEB3

As of April 19, 2026, a major security breach within the global blockchain infrastructure has been brought to light. According to the latest findings from the Ketman Project, an initiative funded by the Ethereum Foundation’s ETH Rangers Program, approximately 100 suspected North Korean (DPRK) IT workers have been identified infiltrating 53 different crypto projects. These operatives successfully bypassed standard hiring protocols and KYC verifications, embedding themselves into the core development teams of various Web3 organizations. This mass exposure highlights a sophisticated “Supply Chain Attack” strategy where malicious actors gain internal access to codebases, potentially laying the groundwork for catastrophic exploits.

The Art of the Fake KYC: Forged Japanese Identities

The investigation reveals the extreme lengths to which DPRK operatives go to appear as legitimate, high-level developers.

  • Fabricated Personas: Operatives frequently posed as Japanese freelance developers on platforms like OnlyDust. Using AI-generated profile photos and names such as “Hiroto Iwaki” and “Motoki Masuo,” they presented a professional front that fooled several hiring committees.
  • Forged Documentation: To pass verification, the workers submitted high-quality forged Japanese identity documents. In one chilling instance, the deception was only confirmed during a live video call when a suspect, unable to speak Japanese, abruptly abandoned the interview after being asked to introduce himself.
  • Deep Code Access: Investigators traced three distinct actor clusters across 11 different repositories. In total, 62 pull requests were merged into various projects before the operatives were detected and purged, raising serious concerns about the integrity of the code currently live on those networks.

The Ketman Shield: Fighting Back with Open Source

In response to this pervasive threat, the Ethereum-funded team has developed a new suite of tools to help the industry defend itself.

  • gh-fake-analyzer: The Ketman Project has released an open-source GitHub profile analysis tool, now available on PyPI. This tool is designed to flag suspicious patterns in developer history, such as forged contribution graphs or mismatched regional metadata.
  • The DPRK IT Workers Framework: In collaboration with the Security Alliance (SEAL), the project co-authored a standardized industry framework for detecting and reporting North Korean infiltration. This has already become a benchmark reference for HR and security teams across the Web3 sector.
  • The ETH Rangers Impact: The broader ETH Rangers Program, which includes groups like Secureum and The Red Guild, has reported significant success in its latest recap: over $5.8 million in funds recovered, 785 vulnerabilities reported, and 36 critical incident responses handled.

A Stepping Stone for Billions: The Strategic Goal

Security researchers warn that this infiltration is rarely the end goal, but rather a preliminary phase for state-sponsored theft.

  • Supply Chain Risks: By gaining “Contributor” or “Admin” status, DPRK workers can inject subtle vulnerabilities into smart contracts. These “backdoors” can be exploited months or even years later by specialized hacking units to drain protocols.
  • Bypassing Sanctions: These workers typically funnel their high-salaries back to the North Korean regime in cryptocurrency, providing a critical stream of revenue that bypasses international banking sanctions.
  • The Billion-Dollar Threat: North Korean hacking groups have stolen billions in digital assets over the last five years. This latest discovery confirms that their tactics have shifted from external “Brute Force” attacks to internal, clandestine infiltration.

Essential Financial Disclaimer

This analysis is for informational and educational purposes only and does not constitute financial, investment, or legal advice. Reports of the Ketman Project identifying 100 North Korean IT workers across 53 crypto projects are based on the ETH Rangers Program recap published as of April 19, 2026. Infiltration by state-sponsored actors poses an extreme risk to project security and investor funds. The effectiveness of open-source detection tools like gh-fake-analyzer is not guaranteed. Always conduct your own exhaustive research (DYOR) and consult with a licensed cybersecurity professional.

Are you auditing the developers behind the projects in your portfolio, or do you trust the “Verified” badges on freelance platforms?

ETH-2.39%
DYOR1.67%
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 11
  • 8
  • Share
Comment
Add a comment
Add a comment
EchoesOfMistValley
· 3h ago
If it's true, the ETH Rangers funded by the foundation did something big, at least bringing the issue to the table.
View OriginalReply0
MoonlightTake-ProfitLine
· 5h ago
Being able to penetrate 53 projects out of 100 is a bit frightening in terms of penetration rate.
View OriginalReply0
ColdWalletLeftInTheAir
· 6h ago
If 100 people can get in, it indicates that the recruitment process and permission management are basically not minimized.
View OriginalReply0
GateUser-1bc81bb2
· 6h ago
It is recommended that project teams perform cross-verification for code submissions, salary payments, device fingerprints, and time zone schedules. Relying solely on video interviews makes it too easy to fake.
View OriginalReply0
GateUser-656cc6e4
· 6h ago
The DPRK IT worker industry chain is really mature, and the Web3 remote collaboration model is simply a natural vulnerability.
View OriginalReply0
GateUser-8d51653b
· 6h ago
Security does not end after auditing the contract; personnel security is also an attack surface.
View OriginalReply0
ALampInMistyValley
· 6h ago
Next, there will probably be a wave of "team background audit" services gaining popularity, but don't let it turn into a new scam to fleece investors.
View OriginalReply0
GateUser-08ae47f3
· 6h ago
Is the Ketman project reliable? Are there any publicly available methodologies or evidence chains, and not just dismiss it with a vague "suspected" statement at the end.
View OriginalReply0
MempoolSparrow
· 6h ago
Are there any leading projects among the 53? Or is it just a bunch of small projects being targeted?
View OriginalReply0
GateUser-f7b40cee
· 6h ago
Requesting a link/report original text to see how they identify: IP, social engineering, wallet behavior, or code style?
View OriginalReply0
View More
  • Pin