#dprk-it-worker-fraud

[ follow ]
Information security
fromThe Hacker News
17 hours ago

DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea

DPRK-linked threat actors use GitHub for command-and-control in attacks on South Korean organizations, employing obfuscated LNK files and PowerShell scripts.
#north-korea
fromTechCrunch
17 hours ago
Remote teams

Watch this video of how a job interviewer exposes a North Korean fake IT worker | TechCrunch

World news
fromwww.aljazeera.com
15 hours ago

North Korea keeping Iran at arm's length, reports Seoul

North Korea is distancing from Iran to pursue a new relationship with the US, according to South Korean intelligence.
Cryptocurrency
fromSecurityWeek
4 days ago

North Korean Hackers Drain $285 Million From Drift in 10 Seconds

A North Korean threat actor executed a $285 million heist from the Drift DeFi platform using sophisticated techniques and pre-signed transactions.
fromTechCrunch
17 hours ago
Remote teams

Watch this video of how a job interviewer exposes a North Korean fake IT worker | TechCrunch

World news
fromwww.aljazeera.com
15 hours ago

North Korea keeping Iran at arm's length, reports Seoul

North Korea is distancing from Iran to pursue a new relationship with the US, according to South Korean intelligence.
Cryptocurrency
fromSecurityWeek
4 days ago

North Korean Hackers Drain $285 Million From Drift in 10 Seconds

A North Korean threat actor executed a $285 million heist from the Drift DeFi platform using sophisticated techniques and pre-signed transactions.
Mental health
fromwww.theguardian.com
5 hours ago

I felt ashamed and scared': how an online friendship became a sextortion nightmare

Online friendships can lead to severe risks, including sextortion, which can have devastating emotional consequences.
Germany news
fromThe Hacker News
1 day ago

BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks

Germany's BKA identified Daniil Shchukin and Anatoly Kravchuk as key figures behind the REvil ransomware operation, linked to numerous attacks and significant financial losses.
#axios
Node JS
fromAxios
6 days ago

North Korean hackers implicated in major supply chain attack

A compromised maintainer account for the Axios npm package led to the publication of malicious software versions targeting various operating systems.
Node JS
fromSecurityWeek
6 days ago

Axios NPM Package Breached in North Korean Supply Chain Attack

Malicious Axios NPM library versions were distributed in a supply chain attack by North Korean hackers, affecting millions of users.
Information security
fromTechzine Global
5 days ago

North Korea behind social engineering attack on Axios project

Attackers compromised the Axios maintainer's account through social engineering, publishing malicious versions that installed a Remote Access Trojan on victims' systems.
Node JS
fromAxios
6 days ago

North Korean hackers implicated in major supply chain attack

A compromised maintainer account for the Axios npm package led to the publication of malicious software versions targeting various operating systems.
Node JS
fromSecurityWeek
6 days ago

Axios NPM Package Breached in North Korean Supply Chain Attack

Malicious Axios NPM library versions were distributed in a supply chain attack by North Korean hackers, affecting millions of users.
Information security
fromTechzine Global
5 days ago

North Korea behind social engineering attack on Axios project

Attackers compromised the Axios maintainer's account through social engineering, publishing malicious versions that installed a Remote Access Trojan on victims' systems.
Careers
fromZDNET
2 days ago

FTC reports a surge in $220M job fraud - here's how to vet listings, according to recruiters

Job scams are on the rise, exploiting vulnerable job seekers with vague offers and promises of high pay for little work.
Privacy professionals
fromNextgov.com
3 days ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
#phishing
Information security
fromThe Hacker News
5 days ago

Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures

A phishing campaign targets Spanish-speaking users in Latin America and Europe, delivering banking trojans via malware called Horabot.
Information security
fromThe Hacker News
5 days ago

CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails

A phishing campaign impersonating CERT-UA distributed malware called AGEWHEEZE targeting various organizations in Ukraine.
Information security
fromThe Hacker News
1 week ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
Information security
fromThe Hacker News
5 days ago

Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures

A phishing campaign targets Spanish-speaking users in Latin America and Europe, delivering banking trojans via malware called Horabot.
Information security
fromThe Hacker News
5 days ago

CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails

A phishing campaign impersonating CERT-UA distributed malware called AGEWHEEZE targeting various organizations in Ukraine.
Information security
fromThe Hacker News
1 week ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
Intellectual property law
fromNextgov.com
3 days ago

Tech bills of the week: Limiting adversaries' access to US tech; and boosting cyber apprenticeships

New legislation aims to strengthen U.S. export controls on sensitive technologies to prevent adversaries from exploiting them for economic gain.
#cybersecurity
fromTechCrunch
18 hours ago
Information security

North Korea's hijack of one of the web's most used open source projects was likely weeks in the making | TechCrunch

Information security
fromSilicon Canals
17 hours ago

A three-hour window: North Korean hackers compromised the Axios library and exposed thousands of systems - Silicon Canals

A North Korean hacking group compromised Axios, affecting millions before the malicious packages were removed after three hours.
fromTechCrunch
3 days ago
EU data protection

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

fromSilicon Canals
7 hours ago
Information security

One maintainer, one compromised laptop: How North Korean hackers hijacked the Axios open source project - Silicon Canals

Information security
fromThe Hacker News
3 hours ago

China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware

A China-based threat actor is using zero-day vulnerabilities to execute high-velocity attacks, particularly targeting healthcare and finance sectors.
Information security
fromNextgov.com
14 hours ago

Government official impersonation scam complaints doubled in 2025, FBI report shows

Complaints of government impersonation scams nearly doubled from 2024 to 2025, resulting in approximately $800 million in losses.
Information security
fromTechCrunch
18 hours ago

North Korea's hijack of one of the web's most used open source projects was likely weeks in the making | TechCrunch

A North Korean cyberattack compromised the Axios project, highlighting security vulnerabilities in open source software development.
Information security
fromSilicon Canals
17 hours ago

A three-hour window: North Korean hackers compromised the Axios library and exposed thousands of systems - Silicon Canals

A North Korean hacking group compromised Axios, affecting millions before the malicious packages were removed after three hours.
EU data protection
fromTechCrunch
3 days ago

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

A cybercriminal group known as TeamPCP hacked the EU's executive body, stealing 92 gigabytes of data, including personal information.
Information security
fromSilicon Canals
7 hours ago

One maintainer, one compromised laptop: How North Korean hackers hijacked the Axios open source project - Silicon Canals

North Korean hackers compromised the Axios HTTP library by socially engineering its maintainer, publishing malicious versions that exposed sensitive data.
Information security
fromThe Hacker News
3 hours ago

China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware

A China-based threat actor is using zero-day vulnerabilities to execute high-velocity attacks, particularly targeting healthcare and finance sectors.
Information security
fromNextgov.com
14 hours ago

Government official impersonation scam complaints doubled in 2025, FBI report shows

Complaints of government impersonation scams nearly doubled from 2024 to 2025, resulting in approximately $800 million in losses.
Privacy technologies
fromEngadget
4 days ago

Russia closes loophole to fully block payments for Apple services

Russia is intensifying its crackdown on online speech by targeting VPNs and restricting access to Apple digital services.
Cryptocurrency
fromnews.bitcoin.com
2 days ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
Remote teams
fromTheregister
2 weeks ago

North Korean's 100k fake IT workers net $500M a year for Kim

North Korea operates a sophisticated fake IT worker scheme generating $500 million annually, with over 100,000 operatives in 40 countries infiltrating companies to steal money and sensitive information.
fromwww.dw.com
6 days ago

Cambodia: Alleged cyber scam boss extradited to China

Investigations found that Li Xiong, the former chairman of Huione Group under the Prince Group, is suspected of multiple crimes. Li was identified as a core member of Chen Zhi's criminal gang.
World news
#ransomware
Cryptocurrency
fromCointelegraph
2 weeks ago

How a 'Wrong Number' Message Turned Into a $3.4M Crypto Scam

This $3.4 million scam illustrates the rise of social engineering in crypto fraud, focusing on emotional manipulation over technical exploits.
#cybercrime
fromThe Cipher Brief
3 days ago
Information security

New Presidential Executive Order Targets Transnational Cybercrime

Transnational cybercrime is escalating, with significant financial losses and a need for enhanced national security measures.
Information security
fromThe Hacker News
4 days ago

Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK

Drift decentralized exchange lost $285 million due to a sophisticated attack involving unauthorized access and social engineering.
#cryptocurrency-security
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

Bitrefill Discloses Cyberattack, Points To North Korea's Lazarus Group

Bitrefill suffered a cyberattack on March 1 originating from a compromised employee laptop, with the Lazarus Group suspected as the perpetrator, resulting in stolen cryptocurrency and exposure of approximately 18,500 customer records.
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

Bitrefill Discloses Cyberattack, Points To North Korea's Lazarus Group

Bitrefill suffered a cyberattack on March 1 originating from a compromised employee laptop, with the Lazarus Group suspected as the perpetrator, resulting in stolen cryptocurrency and exposure of approximately 18,500 customer records.
#ai-security
Information security
fromnews.bitcoin.com
1 day ago

Deepmind's 'AI Agent Traps' Paper Maps How Hackers Could Weaponize AI Agents Against Users

Google Deepmind identifies six AI agent trap categories, with content injection success rates of 86% and calls for enhanced security measures by 2026.
Information security
fromSecurityWeek
19 hours ago

Google DeepMind Researchers Map Web Attacks Against AI Agents

Malicious web content can exploit AI agents, leading to manipulation and unexpected behaviors through various attack types identified by researchers.
Information security
fromnews.bitcoin.com
1 day ago

Deepmind's 'AI Agent Traps' Paper Maps How Hackers Could Weaponize AI Agents Against Users

Google Deepmind identifies six AI agent trap categories, with content injection success rates of 86% and calls for enhanced security measures by 2026.
Information security
fromThe Hacker News
19 hours ago

Multi-OS Cyberattacks: How SOCs Close a Critical Risk in 3 Steps

Multi-OS attacks complicate SOC operations, leading to delays, fragmented evidence, and increased escalation volume, ultimately allowing attackers more time to operate.
Information security
fromSecurityWeek
3 days ago

React2Shell Exploited in Large-Scale Credential Harvesting Campaign

Threat actor exploits Next.js vulnerabilities to exfiltrate credentials and compromise systems at scale, affecting over 766 systems and collecting more than 10,000 files.
Information security
fromArs Technica
3 days ago

OpenClaw gives users yet another reason to be freaked out about security

OpenClaw's vulnerabilities pose severe security risks, allowing attackers to gain administrative access with minimal permissions.
fromComputerworld
3 days ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
#malware
Information security
fromThe Hacker News
4 days ago

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

Operation REF1695 uses fake installers to deploy RATs and cryptocurrency miners, monetizing infections through CPA fraud since November 2023.
Information security
fromThe Hacker News
4 days ago

New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

A new version of SparkCat malware targets cryptocurrency users on mobile platforms, concealing itself in benign apps and evolving its technical capabilities.
Information security
fromThe Hacker News
4 days ago

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

Operation REF1695 uses fake installers to deploy RATs and cryptocurrency miners, monetizing infections through CPA fraud since November 2023.
Information security
fromSecurityWeek
3 days ago

Mobile Attack Surface Expands as Enterprises Lose Control

Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
#identity-theft
fromTechCrunch
1 month ago
Information security

Ukrainian man jailed for identity theft that helped North Koreans get jobs at US companies | TechCrunch

fromTechCrunch
1 month ago
Information security

Ukrainian man jailed for identity theft that helped North Koreans get jobs at US companies | TechCrunch

Information security
fromSecurityWeek
6 days ago

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

Stolen credentials significantly enhance ransomware attacks, enabling illegitimate access and operational disruption within networks.
Information security
fromSecurityWeek
6 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Information security
fromThe Hacker News
2 weeks ago

OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobs

OFAC sanctioned six individuals and two entities for operating a North Korean IT worker scheme that defrauds U.S. businesses and generates illicit revenue for weapons of mass destruction programs.
#north-korean-threat-actors
Information security
fromThe Hacker News
3 weeks ago

Konni Deploys EndRAT Through Spear-Phishing, Uses KakaoTalk to Propagate Malware

North Korean threat actor Konni uses spear-phishing emails to compromise victims and abuse their KakaoTalk application to distribute malware to contacts while stealing sensitive documents.
Information security
fromThe Hacker News
3 weeks ago

Konni Deploys EndRAT Through Spear-Phishing, Uses KakaoTalk to Propagate Malware

North Korean threat actor Konni uses spear-phishing emails to compromise victims and abuse their KakaoTalk application to distribute malware to contacts while stealing sensitive documents.
fromwww.theguardian.com
1 month ago

North Korean agents using AI to trick western firms into hiring them, Microsoft says

The scam typically involves state-backed fraudsters applying for remote IT work in the west, using fake identities and the help of facilitators in the country where the company targeted is based. Once hired, they send their wages back to Kim Jong-un's state and have even been known to threaten to release sensitive company data after being fired.
Information security
Information security
fromThe Hacker News
1 month ago

North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT

North Korean threat actors deployed 26 malicious npm packages using steganography to hide command-and-control infrastructure in Pastebin essays, targeting developers with credential stealers and remote access trojans.
Information security
fromSecurityWeek
1 month ago

North Korean APT Targets Air-Gapped Systems in Recent Campaign

APT37 deployed five new malicious tools in the Ruby Jumper campaign targeting air-gapped systems using USB-based data exfiltration and persistence mechanisms.
Information security
fromTheregister
1 month ago

Suspected Nork intruders infecting US healthcare, education

North Korean-linked hackers deployed a new backdoor called Dohdoor to infect US education and healthcare institutions since December for financial gain.
#quishing
fromThe Hacker News
1 month ago

North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations

The North Korea-linked threat actor known as UNC1069 has been observed targeting the cryptocurrency sector to steal sensitive data from Windows and macOS systems with the ultimate goal of facilitating financial theft. "The intrusion relied on a social engineering scheme involving a compromised Telegram account, a fake Zoom meeting, a ClickFix infection vector, and reported usage of AI-generated video to deceive the victim," Google Mandiant researchers Ross Inman and Adrian Hernandez said.
Information security
Information security
fromThe Hacker News
2 months ago

FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing

North Korean-affiliated Kimsuky uses malicious QR codes (quishing) in targeted spear-phishing to move victims to less-secure mobile devices and bypass defenses.
Information security
fromThe Hacker News
2 months ago

North Korean PurpleBravo Campaign Targeted 3,136 IP Addresses via Fake Job Interviews

North Korean-linked PurpleBravo targeted 3,136 IPs and 20 organizations across sectors and regions using malicious developer tools and job-seeker lures.
Information security
fromwww.mercurynews.com
1 month ago

Asian hackers hit sensitive targets in 37 nations in spying plot

State-aligned Asian cyberespionage group infiltrated networks of 70 organizations across 37+ countries to steal emails, financial, military, and diplomatic information.
[ Load more ]