Physical Address

304 North Cardinal St.
Dorchester Center, MA 02124

North Korean IT Workers Are Being Exposed on a Massive Scale


Young developers have the time of their lives. Shining wine pots are opened, eat steak food, play football and all the activities taken in a luxury special pool, later in photos taken online. In a way a man breaks up in front of a life-sized man Minions Cutting Cutting. However, despite their majority, these are not successful Silicon Valley entrepreneurs; wake up Employees from the Kingdom of North Korea’s HermitThose who infiltrate and pay their salaries to Western companies.

Before moving to Russia in early 2024, two members of North Korean developers allegedly from Lao, Southeastern Asia, are appointed by researchers in CyberSecurity Dtex. The people considered by DTEX, ‘Naoki Murano’ and ‘Jenson Collins’ and ‘Jenson Collins’, the lawyer allegedly allegedly allegedly to be allegedly in advance of the lawyer is alleged to raise money for North Korean regime It is associated with a dollar of $ 6 million Crypto firm last year in Deltaprime.

Yes, Kim Jong’s North Korea created one most ink and Dangerous Cyber threats Landing billions of cryptists to avoid stolen hackers and sanctions to develop their technology to Western countries and enterprises and Create a nuclear weapon. FBI in February declared North Korea’s largest cryptist leaves Heisti, To steal $ 1.5 billion From Crypto Exchange bybit. Often Pyongyang’s IT employees, located in China or Russia, along with Pyongyang’s IT employees, but also made disgraceful companies that work away as those who work away from increased danger.

“If we don’t work and work, it doesn’t work fast enough,” he said. Both Murano and Collins, Dtex, A Detailed report on North Korea’s cyber activityThere is also publishing house More than 1,000 e-mail addresses that North Korea claims to be identified as related to IT employee activities. The move is one of the biggest statements of North Korea’s employment activities so far.

North Korea’s wide cyber operations can not be compared to other enemy peoples such as Russia and China, in the DTEX report, Pyongyang, not more traditional military or intelligence operations, such as “state sanctioned”. Barnhart says everything is managed by financing the mode, develop weapons and collect data. “Everything is connected to each other in a way, in shape or form.”

Misfits come in

In 2022 and 2023, DTEX, Both Naoki Murano and Jenson Collins – their real names of Jenson Collins – did not travel in Laos and vadivostok in Russia. The couple appeared among a wider group of possible northern Koreans in Laos and the cache of their photos were first exposed Dropbox folder. The photos were found by the staff of North Korean researchers who often cooperate with Barnhart and called themselves the union of “discrepancies.” They placed in the last weeks Numerous images North Korean workers online.

North Korea’s IT workers are trying to leak more than one company at the same time as the use of stolen identities, or try to leak more than one company. Some use free platforms; Others try Hire international guards to run laptop farms. Online staff can be fake, the country – millions of people do not have basic human rights or Internet accessThe educated children and hackers carry the educators to the education pipeline. This is likely that many workers and hackers can recognize each other because they are children. Despite being a technician, they often follow digital bread crumbs in their awakening.

Murano was first relating to North Korean operations by Cryptocurrency researcher ZachxbtPublishing names, cryptocurrency wallet details and email addresses More than 20 North Korean IT employee last year. Murano was later associated with deltaprime heist Report by Coinbase In October .. Members of the Misfits team revealed Murano’s photos She is happy with her while eating steak and a picture of Japanese passport for allegedly.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *