Remote Working North Korean Cyber Criminal Takes Revenge By Hacking The Company For Firing Him

6

A company hired an IT professional for remote work, but little did they know they were at Pyongyang’s radar. The undercover North Korean cyber criminal worked for the firm for four months before getting fired. Reportedly, the remote staff presented fake employment history and forged personal details. The hacker was given access to the company’s computer network for routine work; however, the sleuth siphoned off sensitive private data of the computer. Per Securework, as cited in BBC, the unnamed company, which wishes to remain anonymous, had hired the presumably male IT worker in summer as a contractor. The hacker then used the company’s remote working tools to log into the company’s corporate network. He was able to discreetly download as much data as possible after gaining access to the company’s internal system. Before being sacked for poor performance, the remote working North Korean agent collected salary as well every month. Researchers believe that the money must have been laundered through a complex labyrinth of network. After the hacker’s sacking, the company started receiving ransom emails demanding to be paid in six-figure cryptocurrency or get the sensitive data sold or published online.

See Also: Microsoft Reveals How Easy It Is To Jailbreak Popular AI Models Like ChatGPT And Gemini With Skeleton Key

See Also: Man Claims He Hacked NASA, Agency Responds With Letter Of Appreciation; Here’s Why

See Also: Bengaluru Techie Ends Up Hacking Indigo Airline’s Website While Searching For His Lost Luggage; Twitter Reacts

The aforementioned is not an isolated case of North Korean cyber criminals infiltrating tech companies in the West. All the hackers use AI-generated or altered pictures to evade getting caught by the recruiters. Last month, Cyber security company Mandiant revealed that several Fortune 100 companies were found to have employed North Koreans with fake IT worker profiles. Earlier in July, KnowBe4, a Florida-based company reported how they hired a Principal Software Engineer for their IT AI team and soon after started detecting suspicious activities on the employee’s user account. Despite four video conference interviews and additional background checks, the individual was cleared as the information was of a stolen identity while the image was altered via AI, which was caught later. More details are here on the company’s blog here.

See Also: Airtel India’s Database Of 375 Million Customers Breached; Company Denies Hacker’s Claim

See Also: Aussie YouTuber Alleges Scamster Video Editor From India Changed His Channel’s Name To ‘Scumbag Beggar’

See Also: Delhi Man Arrested For Hacking IRCTC, Selling Rs 30 Lakhs Worth of Illegal Tatkal Tickets

See Also: As Hackers Demand Rs 200 Crore In Cryptos For AIIMS Delhi Server, Twitter Is Doing What It Does Best (Memes)

Source

Previous articleSelection committee cut down to five members
Next articleSouth Africa stun Australia to reach Women’s T20 World Cup final