Summary:
- North Korean hackers have been setting up fake U.S. shell companies to target and hack into cryptocurrency developers.
- The hackers use these fake companies to gain the trust of crypto developers and then try to steal their login credentials or install malware on their devices.
- This allows the North Korean hackers to gain access to the developers' cryptocurrency wallets and steal their digital assets.