{"id":3505,"date":"2024-11-30T01:03:29","date_gmt":"2024-11-30T01:03:29","guid":{"rendered":"https:\/\/dogewisperer.com\/?p=3505"},"modified":"2024-11-30T01:03:29","modified_gmt":"2024-11-30T01:03:29","slug":"hackers-in-disguise-north-korean-operatives-steal-billions-in-crypto-as-it-workers","status":"publish","type":"post","link":"https:\/\/dogewisperer.com\/?p=3505","title":{"rendered":"Hackers In Disguise: North Korean Operatives Steal Billions In Crypto As IT Workers"},"content":{"rendered":"<div>\n<p>For years, cybersecurity threats like hacking and identity theft have compromised not just individual accounts but also companies and organizations. And many governments point their fingers to North Korea as the probable location of these hackers that cost the global economy billions of dollars.<\/p>\n<p>Now, reports from the <a href=\"https:\/\/techcrunch.com\/2024\/11\/28\/north-korean-hackers-have-stolen-billions-in-crypto-by-posing-as-vcs-recruiters-and-it-workers\/\" target=\"_blank\" rel=\"noopener nofollow\">Cyberwarcon<\/a>, a cybersecurity conference in Washington DC, have confirmed the allegations and painted a sustained effort of North Korean hackers to undermine corporations.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/11\/22\/microsoft-shares-latest-intelligence-on-north-korean-and-chinese-threat-actors-at-cyberwarcon\/\" target=\"_blank\" rel=\"noopener nofollow\">Microsoft<\/a> researcher James Elliot disclosed that \u201cIT workers\u201d from North Korea have infiltrated hundreds of companies worldwide through impersonation.<\/p>\n<h2><strong>Hackers Secretly Work With North Korea To Infiltrate Organizations<\/strong><\/h2>\n<p>According to experts, a corporate recruiter, venture capitalist, and IT worker are typical jobs <a href=\"https:\/\/www.securityweek.com\/north-korea-deploying-fake-it-workers-in-china-russia-other-countries\/\" target=\"_blank\" rel=\"noopener nofollow\">North Korean hackers<\/a> hold. Security experts at Cyberwarcon disclosed the growing cybersecurity breach that highlights the disruptions caused by cybersecurity threats. During the meeting, experts provided an updated assessment of hackers\u2019 threat to global security.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">North Korean hackers have stolen billions in crypto by posing as VCs, recruiters and IT workers <a href=\"https:\/\/t.co\/5mQwES2eqq\" rel=\"nofollow\" target=\"_blank\">https:\/\/t.co\/5mQwES2eqq<\/a><\/p>\n<p>\u2014 TechCrunch (@TechCrunch) <a href=\"https:\/\/twitter.com\/TechCrunch\/status\/1862121125896998945?ref_src=twsrc%5Etfw\" rel=\"nofollow noopener\" target=\"_blank\">November 28, 2024<\/a><\/p>\n<\/blockquote>\n<p>Experts say North Korea is sustaining an effort to undermine companies by allowing its hackers to pose as prospective employees. The hackers\u2019 main objectives were to earn money for the North Korean government and steal information that could help build its weapons program.<\/p>\n<p>The group was also responsible for the <a href=\"https:\/\/www.ndtv.com\/world-news\/us-court-links-sanctions-on-tornado-case-linked-to-north-korean-hackers-7116008\" target=\"_blank\" rel=\"noopener nofollow\">recent spate of cryptocurrency hacking<\/a> incidents, raking in billions of dollars. Since it has already been sanctioned, North Korea is increasingly bolder in its efforts.<\/p>\n<h2><strong>North Korea And Its Hacking Groups<\/strong><\/h2>\n<p>Experts say that several hacker groups partner with the North Korean government. According to Microsoft, one of these groups is \u201cRuby Sleet,\u201d who infiltrated defense and aerospace companies to steal industry information that can help the hermit state develop its navigation and weapons systems.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-full\" src=\"https:\/\/www.tradingview.com\/x\/tbGLbCwh\/\" width=\"1847\" height=\"959\"><\/p>\n<p>Then, there\u2019s the \u201cSapphire Sleet,\u201d who passed themselves off as human resource recruiters and venture capitalists. This group worked to steal cryptocurrencies from companies and individuals. According to investigations, the hackers would contact their targets to set up a virtual meeting. However, this virtual meeting is designed not to load correctly.<\/p>\n<p>Under this setup, the hackers will convince the unsuspecting targets to download malware, which they will explain as a tool to solve the issue. Under the fake recruitment process, the hacker will ask the candidate to download a skills assessment test that includes malware.<\/p>\n<p><img loading=\"lazy\" data-recalc-dims=\"1\" decoding=\"async\" class=\"aligncenter size-full wp-image-345869\" src=\"https:\/\/bitcoinist.com\/wp-content\/uploads\/2024\/11\/a_b2ac41.jpg?resize=1024%2C576\" alt=\"\" width=\"1024\" height=\"576\" srcset=\"https:\/\/bitcoinist.com\/wp-content\/uploads\/2024\/11\/a_b2ac41.jpg?w=1280 1280w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2024\/11\/a_b2ac41.jpg?w=640 640w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2024\/11\/a_b2ac41.jpg?w=768 768w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2024\/11\/a_b2ac41.jpg?w=980 980w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2024\/11\/a_b2ac41.jpg?w=750 750w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2024\/11\/a_b2ac41.jpg?w=1140 1140w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\"><\/p>\n<p><strong>Microsoft Warns Against Hackers From NoKor<\/strong><\/p>\n<p>In the same conference, researchers warned the industry about the \u201ctriple threat.\u201d They mentioned that NoKor cyber criminals can gain employment by tricking employees, earning money through their jobs, and potentially stealing information.<\/p>\n<p>In the Microsoft study, hundreds of companies inadvertently hired these hackers. Only a few companies have come forward and shared their experiences.<\/p>\n<p>For example, KnowBe4 shared that they were tricked into hiring these impostors. Upon learning of the scheme, the company immediately blocked the hackers\u2019 access to their system.<\/p>\n<p><em>Featured image from Bleeping Computer, chart from TradingView<\/em><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>For years, cybersecurity threats like hacking and identity theft have compromised not just individual accounts but also companies and organizations. And many governments point their fingers to North Korea as the probable location of these hackers that cost the global economy billions of dollars. Now, reports from the Cyberwarcon, a cybersecurity conference in Washington DC, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"iawp_total_views":2,"footnotes":""},"categories":[2],"tags":[3,4,5],"class_list":["post-3505","post","type-post","status-publish","format-standard","hentry","category-news","tag-crypto","tag-doge","tag-news"],"_links":{"self":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts\/3505","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3505"}],"version-history":[{"count":0,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts\/3505\/revisions"}],"wp:attachment":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3505"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3505"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}