logo
#

Latest news with #Knoot

Fears North Korean spies are posing as IT workers to infiltrate Western companies & earn cash for Kim's warped regime
Fears North Korean spies are posing as IT workers to infiltrate Western companies & earn cash for Kim's warped regime

Scottish Sun

time26-05-2025

  • Scottish Sun

Fears North Korean spies are posing as IT workers to infiltrate Western companies & earn cash for Kim's warped regime

Scroll down to read more about the elaborately planned scams WEB OF DECEIT Fears North Korean spies are posing as IT workers to infiltrate Western companies & earn cash for Kim's warped regime Click to share on X/Twitter (Opens in new window) Click to share on Facebook (Opens in new window) BRITS could be helping North Korean spies pose as IT workers to infiltrate Western companies, an intelligence report has warned. The fake IT workers are hired for fully remote jobs using stolen or fake identities to earn cash for Kim Jong-un's regime. Sign up for Scottish Sun newsletter Sign up 5 North Korean spies are posing as fake IT workers to infiltrate UK companies Credit: Getty 5 The cash from the IT worker scams is being sent straight back to Kim Jong-un's regime Credit: Getty 5 It is thought to be being used to fund North Korea's evil military program Once inside the North Korean fraudsters exploit the companies - stealing funds and information. The scams have had a devastating impact on companies across the country and left them wondering just how North Korea pulled them off. Now, an intelligence report has revealed that Brits could have been helping all along. According to the report from Google Threat Intelligence the North Korean spies use "local facilitators" to help them get jobs and verify their identities. These middlemen use remote desktop software that allows workers from North Korea to log in to a company's internal servers - making it look like they are working from inside the country. Google researchers found that one laptop issued by a US company was being hosted in London, sparking fears that Brits may be part of the shady network. Principal i3 Insider Investigator at DTEX Systems, Michael Barnhart, told The Sun: "The London-based facilitator previously acted as the primary 'farmer' and enterprise representative in the operation, having established a front company in collaboration with another facilitator who was the main North Korean IT worker." Barnhart said that all evidence of the operation has now been removed. This follows a wider trend across the US where American citizens have been accused of helping the fake IT workers remain undetected. Matthew Knoot, 38, was arrested for allegedly helping North Korean workers in Nashville, Tennessee last year. Kim Jong Un blows up the ground in North Korea as part of a building project Knoot allegedly helped the workers use stolen identities to pose as US citizens and hosted company laptops at his home. From there he ran a "laptop farm" - allowing the North Korean actors to log in to the computers from China. Knoot is also believed to have helped launder money from the remote IT jobs to accounts tied to North Korean and Chinese actors. United States Attorney Henry Leventis said at the time that Knoot helped funnel hundreds of thousands of dollars to the North Korean government through the scheme. HOW DO THE SCAMS WORK? The North Korean spies reportedly use stolen or fake identities to set up accounts on remote job sites - including LinkedIn, Upwork and Freelancer - to apply for work. And to make sure they're not detected they use "aliases, false or fraudulent personae and proxies," according to the HM Treasury's Office of Financial Sanctions Implementations. Once they make it to interview stage, they often use AI-generated deepfakes to look and sound like the person they are claiming to be. These AI deep-fakes are becoming increasingly easy to purchase, with a full identity complete with an ID doc and proof of address available from as little as $200 on the dark web. Head of National Security Intelligence at Chainanalysis Andrew Fierman told The Sun: 'All you need are a few photos and a very small clip of voice of the person you're attempting to be and you can effectively be that person' 5 A fake passport belonging to a North Korean worker posing as an Estonian Credit: DTEX Systems 5 An identity card belonging to a North Korean worker posing as a Pole Credit: DTEX systems After being recruited the North Korean workers use their stolen credentials to breeze through the onboarding process. And they often ask their employers to send their work laptops to front addresses - run by "local facilitators" - which allows them to remain undetected. Once fully onboarded the fraudsters work hard to establish themselves within the company, gaining its trust before they pounce. Companies often allow high-performing workers to refer future employees - allowing them to slowly amass an army of cyber warriors. They then set about hatching plans to 'exploit and steal funds from the organisations'. Fierman explained that there are a number of cunning tactics that the North Korean workers use. Fierman said: 'It's all about getting someone within an organisation to give you an access point unknowingly.' He added: 'For example, if it's bonus season and North Korea knows it's bonus season at your organisation, they might send out an email saying here's the details of your upcoming bonus. 'Somebody is going to get excited and click the link and then they've given North Korea access to the entire infrastructure of their organisation." These sly tactics allow the North Korean workers to access sensitive information as well as money. They reportedly use this information as a bargaining chip if needed - dishing out threats of sharing it with competitors. UK sanctions on North Korea DPRK targets are on OFSI's consolidated list of financial sanctions and are subject to an asset freeze. This regime also includes sectoral financial sanctions, which contain both restrictions and requirements. These include those placed on: The sale or purchase of bonds DPRK credit and financial institutions including branches, subsidiaries and representative offices) UK credit and financial institutions from dealing with DPRK credit and financial institutions (including branches, subsidiaries and representative offices) Representative offices belonging to designated persons Business arrangements with designated persons Financial support for trade Investment and commercial activities Bank accounts for DPRK diplomats and diplomatic missions Leasing or, otherwise making available, real property Source: HM Treasury's Office of Financial Sanctions Implementations (OFSI) KIM'S CASH-STARVED REGIME North Korea has been hit by many sanctions over the years forcing Kim Jong-un to think outside the box. The tyrant has long relied on cyber activity to fund his cash-starved regime and the fake IT worker scams are the latest in a string of shady tactics. Fierman told The Sun: 'None of these North Korean workers are operating of their own will or fruition, they're doing it on behalf of the North Korean government.' And it's thought that the money is going straight into the country's weapons programmes. A UN investigation in 2022 confirmed these suspicions and said that cyber attacks were an "important revenue source" for Pyongyang's nuclear and ballistic missile programme The recent worker scams come after a shocking crypto heist saw North Korea's Lazarus Group accused of stealing $1.2billion back in February. Hackers were able to gain control of an Ethereum wallet and rip all of its contents, in what has been dubbed the largest heist in crypto's history.

Fears North Korean spies are posing as IT workers to infiltrate Western companies & earn cash for Kim's warped regime
Fears North Korean spies are posing as IT workers to infiltrate Western companies & earn cash for Kim's warped regime

The Irish Sun

time26-05-2025

  • The Irish Sun

Fears North Korean spies are posing as IT workers to infiltrate Western companies & earn cash for Kim's warped regime

BRITS could be helping North Korean spies pose as IT workers to infiltrate Western companies, an intelligence report has warned. The jobs using stolen or fake identities to earn cash for Kim Jong-un's regime. 5 North Korean spies are posing as fake IT workers to infiltrate UK companies Credit: Getty 5 The cash from the IT worker scams is being sent straight back to Kim Jong-un's regime Credit: Getty 5 It is thought to be being used to fund North Korea's evil military program Once inside the North Korean fraudsters exploit the companies - stealing funds and information. The scams have had a devastating impact on companies across the country and left them wondering just how North Korea pulled them off. Now, an intelligence report has revealed that Brits could have been helping all along. According to the report from Google Threat Intelligence the North Korean spies use "local facilitators" to help them get jobs and verify their identities. read more on north korea These middlemen use remote desktop software that allows workers from North Korea to log in to a company's internal servers - making it look like they are working from inside the country. Google researchers found that one laptop issued by a US company was being hosted in London, sparking fears that Brits may be part of the shady network. Principal i3 Insider Investigator at DTEX Systems, Michael Barnhart, told The Sun: "The London-based facilitator previously acted as the primary 'farmer' and enterprise representative in the operation, having established a front company in collaboration with another facilitator who was the main North Korean IT worker." Barnhart said that all evidence of the operation has now been removed. Most read in The Sun This follows a wider trend across the US where American citizens have been accused of helping the fake IT workers remain undetected. Matthew Knoot, 38, was arrested for allegedly helping North Korean workers in Nashville, Tennessee last year. Kim Jong Un blows up the ground in North Korea as part of a building project Knoot allegedly helped the workers use stolen identities to pose as US citizens and hosted company laptops at his home. From there he ran a "laptop farm" - allowing the North Korean actors to log in to the computers from China. Knoot is also believed to have helped launder money from the remote IT jobs to accounts tied to North Korean and Chinese actors. United States Attorney Henry Leventis said at the time that Knoot helped funnel hundreds of thousands of dollars to the North Korean government through the scheme. HOW DO THE SCAMS WORK? The North Korean spies reportedly use stolen or fake identities to set up accounts on remote job sites - including LinkedIn, Upwork and Freelancer - to apply for work. And to make sure they're not detected they use "aliases, false or fraudulent personae and proxies, " according to the HM Treasury's Office of Financial Sanctions Implementations . Once they make it to interview stage, they often use AI-generated deepfakes to look and sound like the person they are claiming to be. These AI deep-fakes are becoming increasingly easy to purchase, with a full identity complete with an ID doc and proof of address available from as little as $200 on the dark web. Head of National Security Intelligence at Chainanalysis Andrew Fierman told The Sun: 'All you need are a few photos and a very small clip of voice of the person you're attempting to be and you can effectively be that person' 5 A fake passport belonging to a North Korean worker posing as an Estonian Credit: DTEX Systems 5 An identity card belonging to a North Korean worker posing as a Pole Credit: DTEX systems After being recruited the North Korean workers use their stolen credentials to breeze through the onboarding process. And they often ask their employers to send their work laptops to front addresses - run by "local facilitators" - which allows them to remain undetected. Once fully onboarded the fraudsters work hard to establish themselves within the company, gaining its trust before they pounce. Companies often allow high-performing workers to refer future employees - allowing them to slowly amass an army of cyber warriors. They then set about hatching plans to 'exploit and steal funds from the organisations'. Fierman explained that there are a number of cunning tactics that the North Korean workers use. Fierman said: 'It's all about getting someone within an organisation to give you an access point unknowingly.' He added: 'For example, if it's bonus season and North Korea knows it's bonus season at your organisation, they might send out an email saying here's the details of your upcoming bonus. 'Somebody is going to get excited and click the link and then they've given North Korea access to the entire infrastructure of their organisation." These sly tactics allow the North Korean workers to access sensitive information as well as money. They reportedly use this information as a bargaining chip if needed - dishing out threats of sharing it with competitors. UK sanctions on North Korea DPRK targets are on OFSI's consolidated list of financial sanctions and are subject to an asset freeze. This regime also includes sectoral financial sanctions, which contain both restrictions and requirements. These include those placed on: The sale or purchase of bonds DPRK credit and financial institutions including branches, subsidiaries and representative offices) UK credit and financial institutions from dealing with DPRK credit and financial institutions (including branches, subsidiaries and representative offices) Representative offices belonging to designated persons Business arrangements with designated persons Financial support for trade Investment and commercial activities Bank accounts for DPRK diplomats and diplomatic missions Leasing or, otherwise making available, real property Source: HM Treasury's Office of Financial Sanctions Implementations (OFSI) KIM'S CASH-STARVED REGIME North Korea has been hit by many sanctions over the years forcing Kim Jong-un to think outside the box. The tyrant has long relied on cyber activity to fund his cash-starved regime and the fake IT worker scams are the latest in a string of shady tactics. Fierman told The Sun: 'None of these North Korean workers are operating of their own will or fruition, they're doing it on behalf of the North Korean government.' And it's thought that the money is going straight into the country's weapons programmes. A UN investigation in 2022 confirmed these suspicions and said that cyber attacks were an "important revenue source" for Pyongyang's nuclear and ballistic missile programme The recent worker scams come after a shocking crypto heist saw Hackers were able to gain control of an Ethereum wallet and rip all of its contents, in what has been dubbed the largest heist in crypto's history.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store