Latest news with #WEBOFDECEIT


Scottish Sun
29-07-2025
- Scottish Sun
Spurned woman falsely branded lover a ‘rapist, paedo woman beater' after he dumped her following a one-night stand
WEB OF DECEIT Spurned woman falsely branded lover a 'rapist, paedo woman beater' after he dumped her following a one-night stand Click to share on X/Twitter (Opens in new window) Click to share on Facebook (Opens in new window) A SPURNED woman falsely branded her lover a "rapist, paedophile and woman beater" after he dumped her following a one-night stand. Kirsty White hurled abuse at Andrew Crosby outside his home and stalked him with love messages through bank transfers. Sign up for Scottish Sun newsletter Sign up 3 Kirsty White launched a stgalking campaign against her former lover Credit: Cavendish The 28-year-old failed to accept their fling would not turn into anything more serious and launched a two-month campaign. She called innocent Andrew a "paedophile" and "rapist" and accused him of beating women on his Facebook page. The victim told how he considered taking his own life due to the abuse and now suffers with anxiety. White has been jailed for 43 weeks after she admitted stalking between April and June 2025. Warrington Magistrates' Court was told the pair had a one-night stand in December 2024 after meeting in a pub. Andrew did not want a relationship at the time and in March 2025, he spurned White's advances on a night out in Blackpool. Elizabeth Browne, prosecuting, said: "On April 11, the complainant lent £20 to the defendant but she did not pay it back and he asked her to leave him alone. "The defendant then posted Mr Crosby's personal details on Facebook, accusing him of being a woman beater. ''On April 18, she went to Mr Crosby's address and started shouting towards him, calling him a 'rapist' and a 'paedophile'. These are all untrue allegations. "He called 999, told her to leave him alone and blocked her. But on April 19, he received messages asking to be unblocked and got a call from a number he did not recognise and a text message saying 'Hello. 'Do not ring the police on me again'." White was arrested and later bailed on the condition she did not contact Andrew again. But over a ten-day period sent him small amounts of money via online bank transfers with messages in the reference saying: "Love you always, Kirsty White." White also contacted Andrew on Facebook using different profiles and sent him two parcels. Andrew was forced to flee his home with his parents as a result of the harassment and is now believed to be sofa surfing with friends. He told police how his mum ended up in hospital with stress and his dad, who suffers from epilepsy, also suffered seizures during the stalking campaign. Andrew added: "As a result of this crime, I suffer severe anxiety and I am constantly looking behind my back. ''Kirsty had been stayed with her father over the road from me and this has caused my family a lot of stress and put a stain on our relationship. It caused me to become physically sick due to Kirsty constantly trying to contact me and also trying to get my attention. "Kirsty has been messaging my family and friends asking for my address. I am very wary of other people due to this. It will take a lot to trust anyone. "It has taken over my life. I feel I see Kirsty everywhere I go. I should not have to live like this. I feel very vulnerable. "I have to constantly watch what I am doing, and who I am talking to. I feel she is constantly trying to ruin my life." As well as a jail sentence, White was also ordered to £400 in compensation and slapped with a five-year restraining order. Sentencing, JP Jeffrey Dodd said: "I think everyone is in agreement that this is a really serious offence. "We have been swayed by the victim impact statement. We feel Mr Crosby has had his life significantly impacted by your actions." 3 White failed to accept the fling would not turn into anything more serious Credit: Cavendish


Scottish Sun
26-05-2025
- Scottish Sun
Fears North Korean spies are posing as IT workers to infiltrate Western companies & earn cash for Kim's warped regime
Scroll down to read more about the elaborately planned scams WEB OF DECEIT Fears North Korean spies are posing as IT workers to infiltrate Western companies & earn cash for Kim's warped regime Click to share on X/Twitter (Opens in new window) Click to share on Facebook (Opens in new window) BRITS could be helping North Korean spies pose as IT workers to infiltrate Western companies, an intelligence report has warned. The fake IT workers are hired for fully remote jobs using stolen or fake identities to earn cash for Kim Jong-un's regime. Sign up for Scottish Sun newsletter Sign up 5 North Korean spies are posing as fake IT workers to infiltrate UK companies Credit: Getty 5 The cash from the IT worker scams is being sent straight back to Kim Jong-un's regime Credit: Getty 5 It is thought to be being used to fund North Korea's evil military program Once inside the North Korean fraudsters exploit the companies - stealing funds and information. The scams have had a devastating impact on companies across the country and left them wondering just how North Korea pulled them off. Now, an intelligence report has revealed that Brits could have been helping all along. According to the report from Google Threat Intelligence the North Korean spies use "local facilitators" to help them get jobs and verify their identities. These middlemen use remote desktop software that allows workers from North Korea to log in to a company's internal servers - making it look like they are working from inside the country. Google researchers found that one laptop issued by a US company was being hosted in London, sparking fears that Brits may be part of the shady network. Principal i3 Insider Investigator at DTEX Systems, Michael Barnhart, told The Sun: "The London-based facilitator previously acted as the primary 'farmer' and enterprise representative in the operation, having established a front company in collaboration with another facilitator who was the main North Korean IT worker." Barnhart said that all evidence of the operation has now been removed. This follows a wider trend across the US where American citizens have been accused of helping the fake IT workers remain undetected. Matthew Knoot, 38, was arrested for allegedly helping North Korean workers in Nashville, Tennessee last year. Kim Jong Un blows up the ground in North Korea as part of a building project Knoot allegedly helped the workers use stolen identities to pose as US citizens and hosted company laptops at his home. From there he ran a "laptop farm" - allowing the North Korean actors to log in to the computers from China. Knoot is also believed to have helped launder money from the remote IT jobs to accounts tied to North Korean and Chinese actors. United States Attorney Henry Leventis said at the time that Knoot helped funnel hundreds of thousands of dollars to the North Korean government through the scheme. HOW DO THE SCAMS WORK? The North Korean spies reportedly use stolen or fake identities to set up accounts on remote job sites - including LinkedIn, Upwork and Freelancer - to apply for work. And to make sure they're not detected they use "aliases, false or fraudulent personae and proxies," according to the HM Treasury's Office of Financial Sanctions Implementations. Once they make it to interview stage, they often use AI-generated deepfakes to look and sound like the person they are claiming to be. These AI deep-fakes are becoming increasingly easy to purchase, with a full identity complete with an ID doc and proof of address available from as little as $200 on the dark web. Head of National Security Intelligence at Chainanalysis Andrew Fierman told The Sun: 'All you need are a few photos and a very small clip of voice of the person you're attempting to be and you can effectively be that person' 5 A fake passport belonging to a North Korean worker posing as an Estonian Credit: DTEX Systems 5 An identity card belonging to a North Korean worker posing as a Pole Credit: DTEX systems After being recruited the North Korean workers use their stolen credentials to breeze through the onboarding process. And they often ask their employers to send their work laptops to front addresses - run by "local facilitators" - which allows them to remain undetected. Once fully onboarded the fraudsters work hard to establish themselves within the company, gaining its trust before they pounce. Companies often allow high-performing workers to refer future employees - allowing them to slowly amass an army of cyber warriors. They then set about hatching plans to 'exploit and steal funds from the organisations'. Fierman explained that there are a number of cunning tactics that the North Korean workers use. Fierman said: 'It's all about getting someone within an organisation to give you an access point unknowingly.' He added: 'For example, if it's bonus season and North Korea knows it's bonus season at your organisation, they might send out an email saying here's the details of your upcoming bonus. 'Somebody is going to get excited and click the link and then they've given North Korea access to the entire infrastructure of their organisation." These sly tactics allow the North Korean workers to access sensitive information as well as money. They reportedly use this information as a bargaining chip if needed - dishing out threats of sharing it with competitors. UK sanctions on North Korea DPRK targets are on OFSI's consolidated list of financial sanctions and are subject to an asset freeze. This regime also includes sectoral financial sanctions, which contain both restrictions and requirements. These include those placed on: The sale or purchase of bonds DPRK credit and financial institutions including branches, subsidiaries and representative offices) UK credit and financial institutions from dealing with DPRK credit and financial institutions (including branches, subsidiaries and representative offices) Representative offices belonging to designated persons Business arrangements with designated persons Financial support for trade Investment and commercial activities Bank accounts for DPRK diplomats and diplomatic missions Leasing or, otherwise making available, real property Source: HM Treasury's Office of Financial Sanctions Implementations (OFSI) KIM'S CASH-STARVED REGIME North Korea has been hit by many sanctions over the years forcing Kim Jong-un to think outside the box. The tyrant has long relied on cyber activity to fund his cash-starved regime and the fake IT worker scams are the latest in a string of shady tactics. Fierman told The Sun: 'None of these North Korean workers are operating of their own will or fruition, they're doing it on behalf of the North Korean government.' And it's thought that the money is going straight into the country's weapons programmes. A UN investigation in 2022 confirmed these suspicions and said that cyber attacks were an "important revenue source" for Pyongyang's nuclear and ballistic missile programme The recent worker scams come after a shocking crypto heist saw North Korea's Lazarus Group accused of stealing $1.2billion back in February. Hackers were able to gain control of an Ethereum wallet and rip all of its contents, in what has been dubbed the largest heist in crypto's history.