logo
#

Latest news with #DevinDeBacker

North Korean Hackers Pose As Remote Workers To Infiltrate U.S. Firms
North Korean Hackers Pose As Remote Workers To Infiltrate U.S. Firms

Forbes

time25-04-2025

  • Business
  • Forbes

North Korean Hackers Pose As Remote Workers To Infiltrate U.S. Firms

Remote hiring has created extraordinary flexibility for global workforces. It has also opened new ... More frontiers for exploitation by nation-state actors using synthetic identities and cross-border deception. Even cybersecurity companies aren't immune. In mid-2024, KnowBe4, a global leader in security awareness training, hired a seemingly well-qualified remote software engineer. The candidate passed a rigorous background check, provided references, attended multiple video interviews, and even submitted a professional photo. But just weeks into the role, their security team discovered malware being installed on the employee's company-issued laptop. The engineer wasn't who he claimed to be. He was a North Korean threat actor using a stolen U.S. identity and an AI-enhanced image to dupe one of the most security-conscious companies in the world. That incident, once viewed as an outlier, now appears to be part of a much larger and more coordinated national security threat. In December 2024, the Department of Justice announced the indictment of 14 North Korean nationals who fraudulently obtained remote IT jobs with U.S. companies using stolen identities and false credentials. Over six years, the scheme generated at least $88 million, money that was ultimately funneled to the North Korean regime to fund its weapons programs. Just weeks later, in January 2025, another indictment charged two additional North Korean nationals and three international facilitators — including two U.S. citizens — with similar fraud. That group allegedly infiltrated 64 U.S. companies, laundering more than $866,000 through just ten of them. One of the American defendants reportedly ran a 'laptop farm' out of his North Carolina home, receiving company-issued devices and installing remote access software so North Korean workers could appear to be U.S.-based hires. 'The Department of Justice remains committed to disrupting North Korea's cyber-enabled sanctions-evading schemes, which seek to trick U.S. companies into funding the North Korean regime's priorities, including its weapons programs,' said Devin DeBacker of the DOJ National Security Division. This isn't a minor fraud operation. It's an intentional, state-directed economic campaign. Thousands of North Korean 'IT warriors' have been dispatched abroad, mostly to China and Russia, where they use fabricated online profiles and borrowed identities to gain employment with U.S. firms, often as freelancers or contract developers. Some even extort their employers by threatening to leak stolen source code if additional payments aren't made. 'The indictments announced today should highlight to all American companies the risk posed by the North Korean government,' warned FBI Cyber Division Assistant Director Bryan Vorndran. The methods used by these operatives are sophisticated and increasingly difficult to detect: In the KnowBe4 case, a stolen identity was paired with an AI-enhanced photo to impersonate a qualified U.S. engineer. Despite multiple interviews, background checks, and reference calls, the ruse held until malware activity triggered an alert. This mirrors growing concerns from federal law enforcement. A 2021 FBI bulletin warned that foreign and criminal actors would 'almost certainly leverage synthetic content' to enable cyber and fraud operations. This includes a rising threat known as Business Identity Compromise (BIC), a form of digital impersonation where adversaries use AI to pose as legitimate employees or contractors. 'Synthetic content may also be used... to create a sophisticated emulation of an existing employee,' the FBI states. And now, the DOJ has launched a formal crackdown on domestic enablers of this threat. Under the DPRK RevGen: Domestic Enabler Initiative, prosecutors are targeting individuals operating laptop farms in the U.S. and facilitating access to sensitive systems for foreign adversaries. Hiring fraud has evolved. It's no longer limited to resume inflation or fake degrees. It now involves state-sponsored threat actors, synthetic identities, and cross-border data laundering. The stakes? Intellectual property theft, regulatory liability, sanctions exposure, and brand-damaging extortion. And it's not just the 'big names' being targeted. The DOJ confirmed that dozens of U.S. companies, across sectors, have unknowingly employed Democratic People's Republic of Korea (DPRK) operatives, sometimes for years. This is a wake-up call for employers to modernize identity verification and improve cyber-hiring resilience. Identity verification should go beyond basic document review to include government-issued ID validation, biometric face matching, and liveness detection. One example is HireRight's Global ID check, which leverages technology from identity verification provider Yoti Ltd. to authenticate identity documents from more than 200 countries. The system can also verify that the individual presenting the document is both physically present and matches the ID photo, all completed remotely in minutes. This process offers a practical alternative to in-person verification, helping employers strengthen identity assurance while streamlining remote hiring. Don't rely on a single video call. Spread interviews across stages, require on-camera participation during onboarding, and watch for proxies or inconsistencies in responses. Ensure endpoint protection is in place. Look for signs of foreign remote access, VPN manipulation, or device sharing. In KnowBe4's case, early detection through endpoint detection and response (EDR) software helped prevent a deeper breach. Be cautious about shipping equipment to addresses that don't match hiring documentation. If devices are requested at odd times or to alternate addresses, investigate further. The FBI warns of telltale signs of synthetic media, such as distorted facial features, inconsistent lighting, or awkward lip-syncing in video. Use identity screening platforms with liveness and deepfake detection features. Train HR and talent acquisition teams on how to recognize fraud indicators. Use the FBI's SIFT method — Stop, Investigate the source, Find trusted coverage, Trace original content — to evaluate suspicious profiles or resumes. The line between a fake resume and a national security breach is blurring. Remote hiring has created extraordinary flexibility for global workforces. It has also opened new frontiers for exploitation by nation-state actors using synthetic identities and cross-border deception. What began as a fringe tactic has become a well-coordinated global campaign, and the private sector is squarely in its sights. As Stu Sjouwerman, CEO of KnowBe4, warned after his company fell victim to one such scheme: As the DOJ ramps up enforcement and threat actors increase their sophistication, employers must shift from reactive to proactive hiring security. In this era, it's not enough to verify that someone can work. You must confirm who they are.

United States seizes Venezuelan aircraft violation export law
United States seizes Venezuelan aircraft violation export law

Yahoo

time07-02-2025

  • Politics
  • Yahoo

United States seizes Venezuelan aircraft violation export law

Feb. 7 (UPI) -- The U.S. Justice Department seized a Venezuelan aircraft on Thursday for violating U.S. export control and sanctions laws over U.S. parts used to service the plane. The jet was operated by Petroleos de Venezuela, the country's state-owned oil and natural-gas company, the Justice Department said in a statement. "The use of American-made parts to service and maintain aircraft operated by sanctioned entities like PdVSA is intolerable," said Devin DeBacker, head of the Justice Department's National Security Division. "The Justice Department, along with its federal law enforcement partners, will continue to safeguard our national security by identifying, disrupting and dismantling schemes aimed at procuring American goods in violation of our sanctions and export control laws." During his first presidency, President Donald Trump in 2019 signed an executive order barring the United States from engaging in transactions with people acting on behalf of Petroleos de Venezuela. The plane was serviced and underwent maintenance on multiple occasions using parts from the United States, in violation of the order. "The servicing included a brake assembly, electronic flight displays and flight management computers: all in violation of U.S. export control and sanctions laws," the Justice Department release said. According to the Treasury Department, the plane carried Oil Minister Manuel Salvador Quevedo Fernandez to a meeting of OPEC in violation of Trump's executive order. Fernandez is also sanctioned by the United States. The plane has also been used to transport senior members of the Venezuelan President Nicolas Maduro regime in what the U.S. calls a continuation of the regime's misappropriation of PdVSA assets. "The seizure of this Venezuelan aircraft, used for evading U.S. sanctions and money laundering, is a powerful example of our resolve to hold the illegitimate Maduro regime accountable for its illegal actions," Secretary of State Marco Rubio said on X. "With the Dominican Republic and our regional partners, we will continue to counteract any scheme to evade U.S. sanctions The first Trump administration applied a so-called maximum pressure campaign on Venezuela that heavily relied on sanctions in a failed effort to unseat Marduo, following his widely discredited 2018 election.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store