{"id":12480,"date":"2024-07-28T12:25:17","date_gmt":"2024-07-28T12:25:17","guid":{"rendered":"https:\/\/thisbiginfluence.com\/?p=12480"},"modified":"2024-07-28T12:25:17","modified_gmt":"2024-07-28T12:25:17","slug":"security-firm-alarmed-to-discover-their-remote-employee-is-a-north-korean-hacker","status":"publish","type":"post","link":"https:\/\/thisbiginfluence.com\/?p=12480","title":{"rendered":"Security Firm Alarmed to Discover Their Remote Employee Is a North Korean Hacker"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div id=\"incArticle\">\n<h2 class=\"block pb-1 text-3xl leading-none uppercase border-b lg:hidden xs:text-4xl font-k lg:text-5 border-red\">It is a hard-earned lesson.<\/h2>\n<h2 class=\"font-k text-4 font-black  lg:border-b border-gray-900 pb-1\">Faux IT<\/h2>\n<p>An safety and anti-phishing firm known as KnowBe4 employed a distant employee \u2014 who,\u00a0in an ironic twist, turned out to be a North Korean hacker.<\/p>\n<p>The corporate employed the software program engineer after they&#8217;d handed by means of 4 separate video interviews and cleared background checks.<\/p>\n<p>However shortly after the employee was despatched a company-issued laptop, issues instantly went awry.<\/p>\n<p>&#8220;The second it was obtained, it instantly began to load malware,&#8221; the corporate&#8217;s founder and CEO Stu Sjouwerman wrote in a <a href=\"https:\/\/blog.knowbe4.com\/how-a-north-korean-fake-it-worker-tried-to-infiltrate-us\" class=\"underline hover:text-the-byte hover:no-underline transition-all duration-200 ease-in-out\" style=\"text-decoration-color:#ff0033\">blog post<\/a>.<\/p>\n<p>Because it seems, the engineer was a &#8220;pretend IT employee from North Korea.&#8221;<\/p>\n<p>&#8220;This was an actual particular person utilizing a legitimate however stolen US-based identification,&#8221; Sjouwerman wrote. &#8220;The image was AI &#8216;enhanced.'&#8221;<\/p>\n<h2 class=\"font-k text-4 font-black  lg:border-b border-gray-900 pb-1\">Hack and Slash<\/h2>\n<p>Whereas the corporate claims that &#8220;no unlawful entry was gained&#8221; and &#8220;no knowledge was misplaced, compromised, or exfiltrated,&#8221; the hacker did not waste any time.<\/p>\n<p>&#8220;The attacker carried out numerous actions to govern session historical past recordsdata, switch probably dangerous recordsdata, and execute unauthorized software program,&#8221; the weblog put up reads.<\/p>\n<p>It is an particularly ironic scenario, given KnowBe4 sells software program that teaches staff to determine phishing makes an attempt and unfold safety consciousness.<\/p>\n<p>The FBI has additionally repeatedly warned that North Korean state actors are infiltrating the US personal sector by posing as distant IT employees. In a <a href=\"https:\/\/www.ic3.gov\/Media\/Y2023\/PSA231018\" class=\"underline hover:text-the-byte hover:no-underline transition-all duration-200 ease-in-out\" style=\"text-decoration-color:#ff0033\">PSA last year<\/a>, the company listed a variety of &#8220;crimson flag indicators,&#8221; together with &#8220;unwillingness or lack of ability to seem on digicam, conduct video interviews or video conferences,&#8221; indications of dishonest, company-issued laptops being freight forwarded abroad, and &#8220;repeated requests for prepayment.&#8221;<\/p>\n<p>Earlier this yr, the US Justice Division <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/five-arizona-ukraine-charged-for-cyber-schemes-infiltrating-over-300-companies-to-benefit-north-koreas-weapons-program\/\" class=\"underline hover:text-the-byte hover:no-underline transition-all duration-200 ease-in-out\" style=\"text-decoration-color:#ff0033\">charged five individuals<\/a>, accusing them of serving to North Korea&#8217;s nuclear weapons program to generate income by infiltrating the US job market.<\/p>\n<p>In consequence, KnowBe4 recommends different corporations vet references extra diligently and get any hires on digicam to &#8220;ask them concerning the work they&#8217;re doing.&#8221;<\/p>\n<p>&#8220;It is a well-organized, state-sponsored, giant prison ring with intensive assets,&#8221; Sjouwerman argued. &#8220;The case highlights the crucial want for extra strong vetting processes, steady safety monitoring, and improved coordination between HR, IT, and safety groups in defending towards superior persistent threats.&#8221;<\/p>\n<p>Briefly, it is a hard-learned lesson, particularly for a cybersecurity consciousness firm.<\/p>\n<p>&#8220;Our controls caught it, however that was certain a studying second that I&#8217;m joyful to share with everybody,&#8221; Sjouwerman wrote.<\/p>\n<p class=\"\"><strong>Extra on North Korean hackers:<\/strong> <em><a href=\"https:\/\/futurism.com\/the-byte\/north-korea-ai\" class=\"underline hover:text-the-byte hover:no-underline transition-all duration-200 ease-in-out\" style=\"text-decoration-color:#ff0033\">Experts Warn North Korea Is Using AI Nefarious Purposes<\/a><\/em><\/p>\n<p><\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/futurism.com\/the-byte\/security-firm-remote-employee-north-korean-hacker\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It is a hard-earned lesson. Faux IT An safety and anti-phishing firm known as KnowBe4 employed a distant employee \u2014 who,\u00a0in an ironic twist, turned out to be a North Korean hacker. The corporate employed the software program engineer after they&#8217;d handed by means of 4 separate video interviews and cleared background checks. However shortly [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":12482,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[9208,1373,4233,4045,6481,2919,192,2822,301],"class_list":["post-12480","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","tag-alarmed","tag-discover","tag-employee","tag-firm","tag-hacker","tag-korean","tag-north","tag-remote","tag-security"],"_links":{"self":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/12480","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12480"}],"version-history":[{"count":0,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/12480\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/media\/12482"}],"wp:attachment":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12480"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12480"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}