Microsoft is suspended 3000 Hotmail accounts and accounts created by North Korea IT workers

Photo of author

By [email protected]



Microsoft oscillated against the complex North Korean IT factor plotComment 3000 known accounts in Outlook and Hotmail created by workers as part of his sweeping moves to disable the process.

The intelligence arm threat to giant technology is worth $ 3.7 trillion, which indicates the IT plan for “Jasper Salt”, detailed Her efforts To search for fraudsters in a lengthy post this week. The Ministry of Justice also Declare Coordinator Labor schemeSeize hundreds of laptops, 29 financial accounts, and close nearly twenty websites. law Enforcement I also searched for 29 “laptops” all over the United States, laptop farms are the sites that the complicit people – including Americans – are carried out to take care of laptops that are shipped by companies that unintentionally rented North Koreans for remote jobs. They install programs so that IT workers can log in from abroad or charge laptops to other sites, including Russia and China.

Some Americans also rented their identities for information technology workers for use to apply for jobs. A Nail Isson employee In Maryland, he will be sentenced to August after it was found that he had occupied 13 jobs that have been dealt with remotely by North Korea IT workers in China. Its jobs paid approximately one million dollars.

north korea Worker The plan is Global conspiracy Where trained workers are sent from the Democratic Republic of Korea (DPRK) all over the world for technology jobs using fabricated or stolen identities. The workers are legitimate. Microsoft noted that some companies that were victims of the plan stated that information technology workers were “one of the most talented employees”.

The scheme generates up to $ 600 million annually, according to the United Nations EstimatesInformation technology workers exchange information with more malicious cyber attacking attackers Billions In encryption. The revenues resulting from the chart and illegal encryption are used to finance the nuclear weapons program in Kim Jong Un, the authoritarian ruler. Federal Bureau of Investigation and Ministry of Justice.

According to Microsoft, workers are increasingly improving their tactics through the use of artificial intelligence-which raises grammatical errors, polishing images, and experimenting with variable sound programs.

JASPER SLEET constantly changes and developed its profiles through a wide range of consumers e -mail account luck In a statement.

behind Dalman said: “The 3000 -consumable email account has been recently lowered, in our efforts to disrupt the activity of the actor and protect our customers from this threat, Microsoft continued to remove personality accounts when identifying them and tracking the actor’s use of artificial intelligence.”

At this stage, Microsoft has not seen IT workers using a vote and videos combined so far, the company said in its warning.

Microsoft warned: “We realize that the combination of these technologies can allow the future threat representative campaigns to deceive interviews to believe that they are not communicating with the IT factor in North Korea,” Microsoft warned. “If it succeeds, this tactic can allow the North Korea information technology workers to conduct interviews directly and no longer depend on the facilitators who stand on them in interviews or sell them to reach the account.”

IT workers often use the same names and email addresses over and over again to formulate their fake characters, using fraudulent profiles on job work sites and open source coding platforms. Microsoft stated that IT workers have also started using artificial intelligence tools such as FaceSWAP “to transfer their photos to employment and stolen identity documents” and to overcome their personal files in general.

Besides the accounts of the account, Microsoft said it launched a set of ways to reveal the activity of the IT factor by protecting identity and other tools. The company has also developed a dedicated automatic learning solution that uses “discovering the risk of traveling for the impossible time, and the most common between the Western nation and China or Russia” to determine the suspected accounts.



https://fortune.com/img-assets/wp-content/uploads/2025/07/GettyImages-2207863787-e1751570436445.jpg?resize=1200,600

Source link

Leave a Comment