Gate 广场「创作者认证激励计划」开启:入驻广场,瓜分每月 $10,000 创作奖励!
无论你是广场内容达人,还是来自其他平台的优质创作者,只要积极创作,就有机会赢取豪华代币奖池、Gate 精美周边、流量曝光等超 $10,000+ 丰厚奖励!
参与资格:
满足以下任一条件即可报名👇
1️⃣ 其他平台已认证创作者
2️⃣ 单一平台粉丝 ≥ 1000(不可多平台叠加)
3️⃣ Gate 广场内符合粉丝与互动条件的认证创作者
立即填写表单报名 👉 https://www.gate.com/questionnaire/7159
✍️ 丰厚创作奖励等你拿:
🎁 奖励一:新入驻创作者专属 $5,000 奖池
成功入驻即可获认证徽章。
首月发首帖(≥ 50 字或图文帖)即可得 $50 仓位体验券(限前100名)。
🎁 奖励二:专属创作者月度奖池 $1,500 USDT
每月发 ≥ 30 篇原创优质内容,根据发帖量、活跃天数、互动量、内容质量综合评分瓜分奖励。
🎁 奖励三:连续活跃创作福利
连续 3 个月活跃(每月 ≥ 30 篇内容)可获 Gate 精美周边礼包!
🎁 奖励四:专属推广名额
认证创作者每月可优先获得 1 次官方项目合作推广机会。
🎁 奖励五:Gate 广场四千万级流量曝光
【推荐关注】资源位、“优质认证创作者榜”展示、每周精选内容推荐及额外精选帖激励,多重曝光助你轻
Ex‑SEAL Warns: North Korean Crypto Infiltration Far Deeper Than Believed - Crypto Economy
TL;DR
Pablo Sabbatella, founder of the Web3 audit firm Opsek and a member of the Security Alliance, made an alarming statement, referring to the extent of North Korea’s operations in the cryptocurrency ecosystem as “much worse than everyone thinks.”
He made the claim in an interview with DL News, where he also revealed that North Korean infiltrators are reportedly embedded in up to 20% of all crypto companies globally.
The threat is not limited to external hacks, the expert assured, stating that these have already stolen over $3 billion in the last three years to fund Pyongyang’s nuclear weapons programs, according to the US Treasury. What is most concerning is the internal access: these operatives are hired by legitimate companies, gaining access to critical systems and operating infrastructures that support major platforms.
The rate of penetration attempts is even more alarming. The expert estimates that between 30% and 40% of job applications received by cryptocurrency companies come from North Korean actors. The magnitude of this infiltration effort, if the figures are correct, poses a colossal systemic risk to the sector.}

How North Korea Achieves Infiltration into Crypto Companies
North Korean workers do not apply directly for jobs due to international sanctions. Instead, they are experts at developing “fronting” methods to evade detection and thus infiltrate crypto companies.
They typically use freelance platforms like Upwork to contact unsuspecting remote workers in developing countries, especially in Ukraine and the Philippines, to act as intermediaries.
The offer is simple: the collaborator hands over their verified credentials or allows the North Korean operative to use their identity remotely, in exchange for 20% of the earnings, while the operative keeps 80%.
To circumvent geographical restrictions and obtain a US IP address, North Korean hackers infect their “front person’s” computer with malware to gain remote access. Once hired, they are often valued by companies. Sabbatella commented that “they work well, they work a lot, and they never complain.” A security measure he suggested to detect these infiltrators is to ask them for their opinion on Kim Jong Un, as “they are not allowed to say anything bad” about their leader.
Sabbatella concluded by attributing the success of North Korean criminal activities to the industry’s weakness. “The crypto industry probably has the worst operational security in the entire computer industry,” he stated, pointing out that founders are fully doxxed, mishandle their private keys, and are easy victims of social engineering. This lack of OpSec is the true Achilles’ heel that enables the alarming North Korean infiltration into crypto companies.