Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Justice Department indicts 14 North Koreans for defrauding IT workers of $88 million over six years
Global Security

Justice Department indicts 14 North Koreans for defrauding IT workers of $88 million over six years

AdminBy AdminDecember 13, 2024No Comments5 Mins Read
IT Worker Fraud
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


IT employee fraud

The US Department of Justice (DoJ) has charged 14 nationals of the Democratic People’s Republic of Korea (DPRK or North Korea) for their alleged involvement in an ongoing conspiracy to violate sanctions and commit fraud, money laundering and identity theft. by illegally seeking employment in American companies and non-profit organizations.

“The conspirators, who worked for the DPRK-controlled companies Yanbian Silverstar and Volasys Silverstar, located in the People’s Republic of China (PRC) and the Russian Federation (Russia), respectively, conspired to use false, stolen, and borrowed identities from the United States and others to conceal their North Korean identities and foreign locate and obtain employment as remote information technology (IT) workers, “DoJ said.

The IT worker’s scheme is said to have netted the North Korean regime at least $88 million over six years. In addition, remote workers steal information such as proprietary source code and threatened to leak data unless ransom has been paid. The illicit proceeds thus generated were then funneled through the US and Chinese financial systems back to Pyongyang.

The Justice Department said it is aware of one employer that suffered hundreds of thousands of dollars in damages after refusing to give in to extortion demands by a North Korean IT worker who leaked sensitive information online.

Cyber ​​security

The identified individuals below –

  • Jung Sung Hwa
  • Ri Kyung Sik
  • Kim Ryu song
  • Rome Un Chol
  • Kim Moo Rim
  • Cho Chung Pom
  • Hyun Chol’s song
  • Song Un Chol
  • Seok Kwang Hyuk
  • Choi Jung Young
  • Ko Chung Seok
  • Kim Ye Won
  • John Kyung Cheol and
  • Jang Cheol Myung

The 14 conspirators are said to have worked in a variety of roles, from senior company executives to IT workers. The two sanctioned companies employed at least 130 North Korean IT workers, known as “IT Warriors,” who participated in “competitions for socialism” organized by the companies to raise money for the DPRK. The best performers are awarded with prizes and other prizes.

The development is the latest in a series of actions the US government has taken in recent years to combat IT worker fraud, a campaign tracked by the cybersecurity community under the moniker Wagemole.

The Justice Department said it has since seized 29 fake website domains (October 17, 2023 and May 12, 2024) is used by North Korean IT workers to imitate western IT companies to support their bona fide attempts to enter into telework contracts for US and other companies around the world. The agency said it also seized $2.26 million (including $1.5 million seized in October 2023) from bank accounts linked to the scheme.

Separately, the State Department announced a reward offer of up to $5 million for information on shell companies, identified individuals and their illegal activities.

“DPRK IT worker schemes include the use of pseudonymous email, social media, payment platforms, and job site accounts, as well as fake websites, proxies, virtual private networks, virtual private servers, and unwitting third parties in the United States. and elsewhere,” the Justice Department said. “The conspirators used a variety of methods to conceal their North Korean identity from their employers.”

One such method is to use laptop farms in usa paying people living in the country to obtain and set up company-issued laptops and allowing IT staff to connect remotely through the software installed on them. The idea is to create the impression that they are accessing work from the US, when in fact they are in China or Russia.

All 14 conspirators were charged with conspiracy to violate the International Emergency Economic Powers Act, conspiracy to commit wire fraud, conspiracy to commit money laundering and conspiracy to commit identity theft. Eight of them were charged with aggravated identity theft. If convicted, each of them faces a maximum sentence of 27 years in prison.

Radiant Capital Crypto Heist related to Citrine Sleet

IT worker fraud is just one of many methods North Korea has adopted to generate illicit revenue and support its strategic goals. cryptocurrency theft and targeting with banking and blockchain companies.

Cyber ​​security

Earlier this month, decentralized finance (DeFi) platform Radiant Capital attributed to associated with North Korea threat actor dubbing Citrine Slit yes Theft of $50 million worth of cryptocurrency this happened after its systems were hacked in October 2024.

Adversary, also known as Shining Fish, Hollim’s Labyrinth, Nickel Academy, and UNC4736, is a subcluster in the Lazarus group. He is also known for running a persistent social engineering campaign called Operation Dream Job, which aims to lure developers with lucrative job opportunities to get them to download malware.

It should be noted that these efforts also take different forms depending on the cluster of activities behind them, which may differ from coding tests (Contagious interview) to collaborate on a GitHub project (Jade Sleet).

The attack on Radiant Capital was no different, with a threat actor reaching out to a company developer on Telegram in September, posing as a trusted former contractor, purportedly asking for feedback on their work on a new smart contract career opportunity. auditing.

The message included a link to a ZIP archive containing a PDF file, which in turn delivered a macOS backdoor codenamed INLETDRIFT, which, in addition to displaying a decoy document to the victim, also established a hidden connection to a remote server (“atokyonews(. )com “).

“Attackers were able to compromise multiple developer devices,” Radiant Capital said. “The front-ends displayed benign transaction data, while the malicious transactions were signed in the background. Traditional checks and simulations showed no obvious discrepancies, making the threat virtually undetectable during routine screening steps.”

Did you find this article interesting? This article is from one of our respected partners. Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.