lazarusholic

Everyday is lazarus.dayβ

DPRK IT workers are typically easy to spot and are not the smartest individuals

2024-07-15, ZachXBT
https://archive.md/Jx653
#ITWorker #Munchables

Contents

DPRK IT workers are typically easy to spot and are not the smartest individuals.

Example: Light Fury (@Gary Lee) is a DPRK IT worker who transferred $300K+ from his public ENS address to Kim Sang Man who is on the OFAC sanctions list.

Fake Name: Gary Lee
Alias: Light Fury
GitHub: Light-Fury
Telegram: leech_dev
Number: +1 639 389 9939
Alias email: leech.developer@gmail[.]com
Wallet address
lightfury.eth
0xe8A06462628b49eb70DBF114EA510EB3BbBDf559



DEGEN NEWS
DEGEN NEWS
@DegenerateNews
Jul 15
View on Twitter
NEW: NORTH KOREAN NATIONALS ARE APPLYING FOR CRYPTO JOBS TO INFILTRATE PROJECTS FOR NEFARIOUS PURPOSES - PER @DL News

Show this thread
Example 2: Four other DPRK IT workers who were on the Munchables team and involved in the $62.5M hack
ZachXBT
ZachXBT
@zachxbt
Mar 27
View on Twitter
Four different devs hired by the Munchables team and linked to the exploiter are likely all the same person as they:

>recommended each other for the job
>regularly transferred payments to the same two exchange deposit addresses >funded each others wallets

Github Username
NelsonMurua913
Werewolves0493
BrightDragon0719
Super1114

Payment address
0x4890e32a6A631Ba451b7823dAd39E88614f59C97
0x6BE96b68A46879305c905CcAFFF02B2519E78055
0x9976Fe30DAc6063666eEA87133dFad1d5ec27c5E

Exchange deposit address
0x84e86b461a3063ad255575b30756bdc4d051a04b
0xe362130d4718dc9f86c802ca17fe94041f1cfc77


Show this thread
Example …