Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
INSIDER THREAT EXPOSED: ETHEREUM-FUNDED PROJECT UNCOVERS 100 NORTH KOREAN OPERATIVES IN WEB3
As of April 19, 2026, a major security breach within the global blockchain infrastructure has been brought to light. According to the latest findings from the Ketman Project, an initiative funded by the Ethereum Foundation’s ETH Rangers Program, approximately 100 suspected North Korean (DPRK) IT workers have been identified infiltrating 53 different crypto projects. These operatives successfully bypassed standard hiring protocols and KYC verifications, embedding themselves into the core development teams of various Web3 organizations. This mass exposure highlights a sophisticated “Supply Chain Attack” strategy where malicious actors gain internal access to codebases, potentially laying the groundwork for catastrophic exploits. The Art of the Fake KYC: Forged Japanese Identities The investigation reveals the extreme lengths to which DPRK operatives go to appear as legitimate, high-level developers. Fabricated Personas: Operatives frequently posed as Japanese freelance developers on platforms like OnlyDust. Using AI-generated profile photos and names such as “Hiroto Iwaki” and “Motoki Masuo,” they presented a professional front that fooled several hiring committees.Forged Documentation: To pass verification, the workers submitted high-quality forged Japanese identity documents. In one chilling instance, the deception was only confirmed during a live video call when a suspect, unable to speak Japanese, abruptly abandoned the interview after being asked to introduce himself.Deep Code Access: Investigators traced three distinct actor clusters across 11 different repositories. In total, 62 pull requests were merged into various projects before the operatives were detected and purged, raising serious concerns about the integrity of the code currently live on those networks. The Ketman Shield: Fighting Back with Open Source In response to this pervasive threat, the Ethereum-funded team has developed a new suite of tools to help the industry defend itself. gh-fake-analyzer: The Ketman Project has released an open-source GitHub profile analysis tool, now available on PyPI. This tool is designed to flag suspicious patterns in developer history, such as forged contribution graphs or mismatched regional metadata.The DPRK IT Workers Framework: In collaboration with the Security Alliance (SEAL), the project co-authored a standardized industry framework for detecting and reporting North Korean infiltration. This has already become a benchmark reference for HR and security teams across the Web3 sector.The ETH Rangers Impact: The broader ETH Rangers Program, which includes groups like Secureum and The Red Guild, has reported significant success in its latest recap: over $5.8 million in funds recovered, 785 vulnerabilities reported, and 36 critical incident responses handled. A Stepping Stone for Billions: The Strategic Goal Security researchers warn that this infiltration is rarely the end goal, but rather a preliminary phase for state-sponsored theft. Supply Chain Risks: By gaining “Contributor” or “Admin” status, DPRK workers can inject subtle vulnerabilities into smart contracts. These “backdoors” can be exploited months or even years later by specialized hacking units to drain protocols.Bypassing Sanctions: These workers typically funnel their high-salaries back to the North Korean regime in cryptocurrency, providing a critical stream of revenue that bypasses international banking sanctions.The Billion-Dollar Threat: North Korean hacking groups have stolen billions in digital assets over the last five years. This latest discovery confirms that their tactics have shifted from external “Brute Force” attacks to internal, clandestine infiltration. Essential Financial Disclaimer This analysis is for informational and educational purposes only and does not constitute financial, investment, or legal advice. Reports of the Ketman Project identifying 100 North Korean IT workers across 53 crypto projects are based on the ETH Rangers Program recap published as of April 19, 2026. Infiltration by state-sponsored actors poses an extreme risk to project security and investor funds. The effectiveness of open-source detection tools like gh-fake-analyzer is not guaranteed. Always conduct your own exhaustive research (DYOR) and consult with a licensed cybersecurity professional.
Are you auditing the developers behind the projects in your portfolio, or do you trust the “Verified” badges on freelance platforms?