{"id":23920,"date":"2024-11-30T01:10:23","date_gmt":"2024-11-30T01:10:23","guid":{"rendered":"https:\/\/www.bitrabo.com\/discover\/?p=23920"},"modified":"2024-11-30T01:10:23","modified_gmt":"2024-11-30T01:10:23","slug":"north-koreas-covert-cyber-syndicate-how-tech-workers-are-plundering-billions-in-cryptocurrency","status":"publish","type":"post","link":"https:\/\/www.bitrabo.com\/discover\/north-koreas-covert-cyber-syndicate-how-tech-workers-are-plundering-billions-in-cryptocurrency\/","title":{"rendered":"North Korea&#8217;s Covert Cyber Syndicate: How Tech Workers Are Plundering Billions in Cryptocurrency"},"content":{"rendered":"\n<p>Cybersecurity threats, such as hacking and identity theft, have posed significant risks to individuals and organizations alike, costing the global economy billions. Many governments believe that North Korea is a major hub for these cybercriminal activities.<\/p>\n<p>Recent findings from the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/techcrunch.com\/2024\/11\/28\/north-korean-hackers-have-stolen-billions-in-crypto-by-posing-as-vcs-recruiters-and-it-workers\/\" target=\"_blank\" rel=\"noopener nofollow\">Cyberwarcon<\/a>, a conference on cybersecurity held in Washington DC, support these claims and reveal an extensive strategy by North Korean hackers to compromise businesses.<\/p>\n<p>James Elliot from <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/11\/22\/microsoft-shares-latest-intelligence-on-north-korean-and-chinese-threat-actors-at-cyberwarcon\/\" target=\"_blank\" rel=\"noopener nofollow\">Microsoft<\/a> reported that individuals posing as &#8220;IT workers&#8221; from North Korea have infiltrated numerous companies globally by impersonating legitimate candidates.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Nations_Targeted_by_North_Korean_Hackers\"><\/span><strong>Nations Targeted by North Korean Hackers<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Experts explain that North Korean hackers often take on roles as corporate recruiters, venture capitalists, and IT professionals. Presentations at Cyberwarcon highlighted the escalating cybersecurity challenges and disruptions stemming from such threats, with specialists offering a current evaluation of hacker risks to worldwide security.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">North Korean hackers have stolen billions in crypto by posing as VCs, recruiters and IT workers <a rel=\"nofollow\" target=\"_blank\" href=\"\" rel=\"nofollow\" target=\"_blank\"><\/a><\/p>\n<p>\u2014 TechCrunch (@TechCrunch) <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/twitter.com\/TechCrunch\/status\/1862121125896998945?ref_src=twsrc%5Etfw\" rel=\"nofollow noopener\" target=\"_blank\">November 28, 2024<\/a><\/p>\n<\/blockquote>\n<p>Experts indicate that North Korea is persistently undermining corporations by enabling its hackers to masquerade as job seekers. The primary goals of these hackers include funding the North Korean regime and acquiring sensitive information to further its weapons development.<\/p>\n<p>This group has also been linked to a series of cryptocurrency hacks, amassing wealth in the billions. Given their sanctioned status, North Korea has become increasingly audacious in its cyber operations.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"North_Koreas_Cyber_Operations\"><\/span><strong>North Korea&#8217;s Cyber Operations<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Multiple hacker collectives coordinate with the North Korean government. Microsoft identifies one such group, \u201cRuby Sleet,\u201d which infiltrates defense and aerospace sectors to gather intelligence beneficial for enhancing North Korea&#8217;s navigation systems and weaponry.<\/p>\n<p><\/p>\n<p>Another group, \u201cSapphire Sleet,\u201d impersonates HR recruiters and venture capitalists to siphon cryptocurrencies from firms and individuals. Investigations reveal that these hackers set up virtual meetings with targets, often causing technical issues on purpose.<\/p>\n<p>In this context, they trick individuals into downloading malware disguised as solutions for the problems encountered during these meetings. As part of a fake recruitment process, they might request candidates to complete a skills assessment that secretly contains malware.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" data-recalc-dims=\"1\" class=\"aligncenter size-full wp-image-345869\" src=\"https:\/\/www.bitrabo.com\/discover\/wp-content\/uploads\/2024\/11\/Hackers-In-Disguise-North-Korean-Operatives-Steal-Billions-In-Crypto.jpg\" alt=\"\" width=\"1024\" height=\"576\" \/><\/p>\n<p><strong>Microsoft Issues Caution About North Korean Hackers<\/strong><\/p>\n<p>During the conference, researchers alerted the industry to the &#8220;triple threat&#8221; posed by North Korean cyber criminals. They highlighted how these hackers can secure jobs through deception, make money, and potentially acquire sensitive data.<\/p>\n<p>A study by Microsoft indicated that numerous businesses unknowingly hired these cyber infiltrators, with very few companies disclosing their experiences publicly. One example is KnowBe4, which realized they had hired impostors and promptly revoked their access to the system.<\/p>\n<p><em>Featured image from Bleeping Computer, chart from TradingView<\/em><\/p>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity threats, such as hacking and identity theft, have posed significant risks to individuals and organizations alike, costing the global economy billions. Many governments believe that North Korea is a major hub for these cybercriminal activities. Recent findings from the Cyberwarcon, a conference on cybersecurity held in Washington DC, support these claims and reveal an [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":23921,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"slim_seo":{"title":"North Korea's Covert Cyber Syndicate: How Tech Workers Are Plundering Billions in Cryptocurrency - Bitrabo","description":"Cybersecurity threats, such as hacking and identity theft, have posed significant risks to individuals and organizations alike, costing the global economy billi"},"footnotes":""},"categories":[316],"tags":[3220,504,10445,648,2524,2523,10446,1795,10447],"class_list":["post-23920","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-crypto-news","tag-billions","tag-crypto","tag-disguise","tag-hackers","tag-korean","tag-north","tag-operatives","tag-steal","tag-workers"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.bitrabo.com\/discover\/wp-json\/wp\/v2\/posts\/23920","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bitrabo.com\/discover\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bitrabo.com\/discover\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bitrabo.com\/discover\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bitrabo.com\/discover\/wp-json\/wp\/v2\/comments?post=23920"}],"version-history":[{"count":0,"href":"https:\/\/www.bitrabo.com\/discover\/wp-json\/wp\/v2\/posts\/23920\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bitrabo.com\/discover\/wp-json\/wp\/v2\/media\/23921"}],"wp:attachment":[{"href":"https:\/\/www.bitrabo.com\/discover\/wp-json\/wp\/v2\/media?parent=23920"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bitrabo.com\/discover\/wp-json\/wp\/v2\/categories?post=23920"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bitrabo.com\/discover\/wp-json\/wp\/v2\/tags?post=23920"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}