Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » North Korean shell companies impersonate US IT companies to fund missile programs
Global Security

North Korean shell companies impersonate US IT companies to fund missile programs

AdminBy AdminNovember 21, 2024No Comments4 Mins Read
Missile Programs
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


November 21, 2024Ravi LakshmananMalware / Cyber ​​Fraud

Programs for rockets

Threat actors linked to the Democratic People’s Republic of Korea (DPRK) impersonate US-based software and technology consulting companies to achieve their financial targets as part of a broader information technology (IT) worker scheme.

“Shock companies, often based in China, Russia, Southeast Asia and Africa, play a key role in masking the true origins of workers and managing payments,” SentinelOne security researchers Tom Hegel and Dakota Carey said in a report shared with The Hacker News.

North Korea’s network of IT workers, both individually and under the guise of front companies, is seen as a method of evading international sanctions imposed on the country and generating illicit income.

A global company that is also tracked as Vagemol Palo Alto Networks Unit 42, involves using fake IDs to get jobs at various companies in the US and elsewhere, and funneling huge chunks of their earnings back to the Hermit Kingdom in an attempt to finance their weapons of mass destruction (WMD). and ballistic missile programs.

In October 2023 the US government said it seized 17 websites posing as US IT companies to defraud businesses at home and abroad, allowing IT workers to hide their true identity and location while applying online for remote jobs around the world.

Cyber ​​security

The IT workers were found to be working for two companies based in China and Russia, namely Yanbian Silverstar Network Technology Co. Ltd. and Volasys Silver Star.

“These IT workers funneled the proceeds of their fraudulent IT work back to the DPRK using online payments and Chinese bank accounts,” the US Department of Justice (DoJ) said at the time.

SentinelOne, which analyzed four new North Korean IT worker front companies, said they were all registered through NameCheap and claimed to outsource development, consulting and software, copying their content from legitimate companies –

  • Independent Lab LLC (inditechlab(.)com), which copied the website format of the American company Kitrum
  • Shenyang Tonywang Technology L TD (tonywangtech(.)com), which copied the website format of the American company Urolime
  • Tony WKJ LLC (wkjllc(.)com) who copied the website format of the Indian company ArohaTech IT Services
  • HopanaTech (hopanatech(.)com), which copied the format of the website of the American company ITechArt

Despite the fact that October 10, 2024 The U.S. government seized all of the aforementioned sites, SentinelOne said it traced them to a larger, active network of shell companies originating in China.

Additionally, another company called Shenyang Huguo Technology Ltd (huguotechltd(.)com) was discovered to exhibit similar characteristics, including using copied content and logos from another Indian software firm, TatvaSoft. The domain was registered through NameCheap in October 2023.

“These tactics highlight a sophisticated and evolving strategy that uses the global digital economy to finance government activities, including weapons development,” the researchers said.

Cyber ​​security

“Organizations are encouraged to implement robust vetting processes, including due diligence on potential contractors and suppliers, to reduce risk and prevent unwitting support for such illegal operations.”

The disclosure follows Unit 42’s findings that the North Korean IT Worker Activity Cluster, which it calls CL-STA-0237, “has been involved in recent phishing attacks using video conferencing software infected with malware” to deliver the BeaverTail malware, which shows a connection between Wagemole and another intrusion kit known as Contagious Interview.

CL-STA-0237 used a US small and medium business (SMB) IT services company to apply for other jobs. said. “In 2022, CL-STA-0237 was offered a position at a major technology company.”

​​​​​​While the exact nature of the relationship between the threat actor and the exploited company is unclear, it is believed that CL-STA-0237 either stole the company’s credentials or was hired as an outsourced employee and is now impersonating the company , to secure IT jobs and target potential job seekers with malware under the guise of conducting an interview.

“North Korean threat actors have been very successful in generating profits to fund illicit activities within their country,” Unit 42 said, noting that the cluster likely operates out of Laos.

“They started by impersonating fake IT workers to ensure steady streams of income, but began to move into more aggressive roles, including engaging in insider threats and malware attacks.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025

Breaking: 7000-Delicious Proxy using iol Systems Systems

May 9, 2025

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.