Security firm experiencing nightmare after learning remote employee is North Korean hacker

Date:

A digital security firm got the shock of a lifetime when it came to light that one of its remote workers was actually a North Korean hacker after he infected his new company laptop with malware.

“The moment it was received, it immediately started to load malware,” security firm KnowBe4 wrote in a blog post about the incident. The company stressed that “no illegal access was gained, and no data was lost, compromised or exfiltrated on any KnowBe4 systems.”

“KnowBe4 needed a software engineer for our internal IT AI team,” the company explained. “We posted the job, received resumes, conducted interviews, performed background checks, verified references and hired the person. We sent them their Mac workstation, and the moment it was received, it immediately started to load malware.”

KnowBe4 hired the unnamed employee and noticed “a series of suspicious activities” on July 15 after sending a Mac laptop to the employee for work purposes. The company reached out to the user, but the employee responded that he was troubleshooting a “speed issue” and may have “caused a compromise.”

FTC PROBES AI-POWERED ‘SURVEILLANCE PRICING’ AT MASTERCARD, JPMORGAN CHASE, MCKINSEY AND OTHERS

Attempts to follow up with the employee were met with silence as he appeared unavailable for a call and did not respond. 

The company claimed the hacker operated as part of a “well-organized, state-sponsored, large criminal ring with extensive resources.” It was likely referring to Andariel, a group the U.S. government has highlighted due to its ties to the Democratic People’s Republic of Korea (DPRK)’s military intelligence agency. 

“The case highlights the critical need for more robust vetting,” the company argued, along with more stringent security vetting and monitoring. 

HEALTH CARE INDUSTRY EXPERIENCING INCREASING ATTACKS BY CYBERCRIMINALS

North Korea computers

The incident occurred as the U.S. Department of State revealed an indictment against a North Korean national who allegedly hacked hospitals in the U.S. Rim Jong Hyok worked for a cyber group known as Andariel, which is controlled by the DPRK’s military intelligence agency, according to the department. 

Rim and others “conspired to hack into the computer systems of U.S. hospitals and other healthcare providers, install Maui ransomware and extort ransoms,” according to the State Department’s statement on the case.

“In one computer intrusion operation that began in November 2022, the malicious cyber actors hacked a U.S-based defense contractor from which they extracted more than 30 gigabytes of data, including unclassified technical information regarding material used in military aircraft and satellites, much of which was from 2010 or earlier,” the department said. 

SAMSUNG’S MAIN UNION IN SOUTH KOREA TO GO ON STRIKE INDEFINITELY

Justice indictment hackers

The FBI was able to seize online accounts used by the hacking group along with more than $600,000 in proceeds from the ransomware attacks, which has or will be returned to victims, a senior FBI official told reporters.

The Justice Department has brought multiple criminal cases related to North Korean hacking in recent years, often alleging a profit-driven motive that differentiates the activity from that of hackers in Russia and China.

The Associated Press contributed to this report. 

Read the full article here

spot_img

Share post:

Subscribe to our newsletter

To be updated with all the latest news, offers and special announcements.

Popular

More like this
Related

Russiagate story 'will not die,' journalist Matt Taibbi says: 'How much meat is on the bone?'

The Justice Department is again accusing Russia of...

Packers’ Jordan Love appears to avoid ACL injury, more tests to come: report

Green Bay Packers quarterback Jordan Love seems to...

Former cadets allege Coast Guard Academy failed to prevent sex abuse

Thirteen former cadets at the U.S. Coast Guard Academy...