home bbs files messages ]

Just a sample of the Echomail archive

<< oldest | < older | list | newer > | newest >> ]

 Message 1373 
 Mike Powell to All 
 North Korean IT workers h 
 12 May 25 11:29:00 
 
TZUTC: -0500
MSGID: 1106.consprcy@1:2320/105 2c875c58
PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0
TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0
BBSID: CAPCITY2
CHRS: ASCII 1
These North Korean IT workers have been infiltrating Western businesses since
2016

Date:
Mon, 12 May 2025 13:29:00 +0000

Description:
The Nickel Tapestry threat has continued for almost ten years.

FULL STORY
======================================================================
 - North Korean hackers have been impersonating job applicants
 - These applicants gain employment in western firms
 - New research suggests these campaigns have been going on since 2016

North Korean hackers have been making the headlines recently by fraudulently
gaining employment in western firms. Research from Sophoss Counter Threat 
Unit (CTU) has been tracking this as the Nickel Tapestry campaign, 
identifying infrastructure links that suggest money-making schemes have been
operating since 2016. 

The research shows that the campaign is increasingly targeting European and
Japanese organizations - probably thanks to increased awareness amongst
American companies. These fraudulent job applicants have been observed
impersonating Japanese, Vietnamese, and Singaporean professionals, as well as
American personas. 

Previous research has shown that North Korean hackers are posing as software
development recruiters to target freelancers , spreading malware through the
recruitment scams and stealing cryptocurrency from victims. 

Dual objectives

The salaries earned by the hackers seem to help fund the government interests
of the Democratic Peoples Republic of Korea - and record breaking crypto 
scams have also successfully earned the Lazarus hacking group $1.5 billion .
Around $300 million of this was successfully converted by the group into
unrecoverable funds from this one incident alone, so these campaigns are
lucrative for the state. 

Thats not all though, as the fraudulent workers have also been observed
stealing credentials and exfiltrating data, as well as deliberately gaining
employment in industries with sensitive data, like defense, aerospace, and
cybersecurity. 

These roles allow the workers to use remote access software and AI generated
writing, CV building, image editing, and video enhancing tools to impersonate
legitimate workers and circumvent default systems. 

Organizations are urged to remain vigilant and to check candidate identities
thoroughly, and review their CVs and addresses thoroughly, even suggesting
in-person interviews where possible. 

As remote positions become increasingly popular, companies should monitor for
traditional insider threat activity, suspicious usage of legitimate tools, 
and impossible travel alerts to detect activity often associated with
fraudulent workers Sophos confirms.

======================================================================
Link to news story:
https://www.techradar.com/pro/security/these-north-korean-it-workers-have-been
-infiltrating-western-businesses-since-2016

$$
--- SBBSecho 3.20-Linux
 * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)
SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30
SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664
SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45
SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35
PATH: 2320/105 229/426


<< oldest | < older | list | newer > | newest >> ]

(c) 1994,  bbs@darkrealms.ca