North Korean Hackers Shift from Cyber Espionage to Ransomware Attacks

North Korean Hackers Shift from Cyber Espionage to Ransomware Attacks

HAcker\

North Korean Hackers Shift from Cyber Espionage to Ransomware Attacks

North Korean hackers, specifically the group APT45, known for cyber espionage, are now focusing on ransomware attacks. Google-owned Mandiant reports that APT45 has targeted critical infrastructure in South Korea, Japan, and the U.S. using ransomware like SHATTEREDGLASS and Maui. This shift indicates a broader strategy to generate funds for the North Korean regime. The group’s activities now include targeting healthcare and crop science sectors, reflecting North Korea’s changing geopolitical priorities.

For more details, visit The Hacker News.

Stay secure, everyone!

  • TheMadAdmin (AKA Dave)
KnowBe4 Hired a Fake IT Worker from North Korea

KnowBe4 Hired a Fake IT Worker from North Korea

 

KnowBe4 Hired a Fake IT Worker from North Korea

Recently, KnowBe4, a well-known cybersecurity firm, discovered they had unknowingly hired a North Korean IT worker posing as a U.S. resident. This individual used stolen identities and falsified documents to secure the position, a tactic employed by many North Korean IT professionals to generate revenue for their authoritarian regime. These workers often take advantage of the demand for IT skills in software and mobile app development, blending into the workforce while secretly funneling earnings back to North Korea.

Despite not always engaging in malicious activities directly, these IT workers use their access to facilitate cyber intrusions, support North Korea’s cyber operations, and fund its weapons programs. The U.S. government has issued multiple warnings about this threat, emphasizing the importance of thorough background checks and vigilance in hiring processes to prevent such incidents.

This incident highlights the critical need for robust incident response policies. Having a clear, written policy ensures that organizations are prepared to handle such breaches effectively, protecting their systems and maintaining trust with clients and stakeholders.

For more detailed insights, you can read the full story on The Record and BleepingComputer.

Stay safe out there!

  • TheMadAdmin (AKA Dave)

News Post

This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post This is a News Post