North Korean Devs Pose As Freelancers To Steal Privileged Access

Share post:

The U.S. government has warned that IT workers from the Democratic People’s Republic of Korea (DPRK) are disguising themselves as freelancers to steal privileged access. The stolen access can be used sometimes to facilitate cyber intrusions.

To circumvent the controls put in place by the United States and the United Nations, the IT workers try to cover their North Korean origins.

The advisory warning organizations were provided by the U.S. Department of State, the U.S. Department of the Treasury, and the Federal Bureau of Investigation FBI.

While the warning states that North Korea is not necessarily involved in cyber intrusions, it has been able to gain access to this information through contractors strategically placed in numerous organizations.

The affected North Korean IT workers pose as teleworkers in the U.S. or other non-sanctioned countries to get into the desired position. They also change their name, use virtual private network (VPN) connections, or use IP addresses from other regions to eliminate their identity.

Some hints to detect these intruders include logins to the same account from different IP addresses in a short time, several developers logging in from the same IP address, and technical clues indicating the use of remote desktop sharing software or a VPN connection.

Others are accounts that receive positive reviews from a customer with similar documentation for setting up developer accounts and, frequent money transfers, especially to banks in China.

The sources for this piece include an article in BleepingComputer.

SUBSCRIBE NOW

Related articles

MIT students exploit blockchain vulnerability to steal 25 million dollars

Two MIT students have been implicated in a highly sophisticated cryptocurrency heist, where they reportedly exploited a vulnerability...

Microsoft’s AI success may spell defeat for it’s climate goals

Microsoft's ambitious strides in AI technology are now posing a significant challenge to its own climate goals, as...

OpenAI’s Chief Scientist Ilya Sutskever Departs Company

Ilya Sutskever, co-founder and chief scientist of OpenAI, has officially announced his departure from the company. This move...

Cyber Security Today, May 15, 2024 – Ebury botnet still exploits Linux servers, Microsoft, SAP and Apple issue security updates

The Ebury botnet continues to exploit Linux servers, Microsoft, SAP and Apple issue security updates, and more. Welcome to...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways