Young developers They have the time of their lives. They float open bottles of sparkling wine, dinner on the steaks, play football together, and rest in a luxurious private swimming pool, all their activities that were taken in the images that were later revealed online. In one image, a man is presented to the vital size Subordinates Cut the cardboard. But despite the exit, these are not successful as entrepreneurs in the Silicon Valley; They are Workers from the Kingdom of North Korea from the hermitThose who sneak and send their wages to the homeland.
Today, two members of a group of North Korea developers, who were allegedly working outside of Southeast Asian countries before moving to Russia, are identified today by the beginning of 2024. DTEX. It is claimed that the men, who believe DTEX have used “Naoki Murano” and “Jenson Collins”, participated in collecting money for the brutal North Korean system as part of the widespread part of the information technology, as Morano previously claimed Associated with $ 6 million theft At Crypto Deltaprime last year.
For years, Kim Jong Ons north korea One of most sophisticated and Dangerous internet Threats To the western countries and companies, with the theft of infiltrators of the intellectual property needed to develop their own technology, in addition to looting billions in encryption to evade penalties and Create nuclear weapons. In February, the Federal Bureau of Investigation Declare North Korea came out of the largest theft of encryption ever, Theft of $ 1.5 billion From Crypto Exchange bybit. Besides skilled infiltrators, Pyongyang’s IT workers, who are often in China or Russia, deceive their employment companies as a remote and become Increase threat.
“What we do does not work, and if he works, this does not work quickly enough,” says Michael Barney Barnhart, the main researcher in North Korea and the main investigator of DTEX. As well as the identification of Morano and Collins, DTEX, in A. A detailed report on North Korean cyberspace activityIt is also to publish More than 1000 email addresses claim to be identified as the activity of the IT factor in North Korea. This step is one of the biggest disclosure of the North Korean IT activity so far.
Wide electronic operations in North Korea cannot be compared to the operations of other hostile countries, such as Russia and China, as Barnhart explains in the DTEX report, where Pyongyang works like the “state crime union approved” instead of military operations or traditional intelligence. Barnhardt says everything is driven by the funding of the system, the development of weapons and the collection of information. “Everything is linked together in a way, shape or shape.”
Errors
With about 2022 and 2023, DTEX claims that Naoki Murano and Jenson Collins – unknown – were not known in Laos and also traveled between Vladivostok, in Russia. The husband appeared between a broader group of potential North Koreans in Laos, and the temporary storage memory of their photos was presented for the first time in Open the Dropbox folder. The photos were discovered by a group of North Korean researchers who often cooperate with Barnhart and call themselves an “inappropriate” alliance. In recent weeks, they have been published Many alleged pictures North Korea information technology workers connected.
North Korea information workers are prolific in their activities, and they often try to infiltrate many companies simultaneously using stolen identities or create false characters to try to appear legally. Some use independent platforms; Others try Correct international facilitators to run laptop farms. While their online characters may be fake, the country – where millions do not have basic human rights or Internet access– The talented people in the education pipeline will be talented, where they can become developed and skilled. This means that many information technology workers and infiltrators are likely to know each other, perhaps because they were children. Although they are technically skilled, they often leave digital bread crumbs in their wake.
Morano was first linked to the North Korean operations publicly by the encrypted currency investigator ZachbtWhich published the names, details of the cryptocurrency wallet, and email addresses from More than 20 IT workers in North Korea last year. Then Morano was linked to the stealing of Deltabrim in Reporting Coinbase In October .. Misfits Collective members shared pictures of Marano looking Sagged himself while eating meat slices And a picture of The alleged Japanese passport.
https://media.wired.com/photos/68224952d554508a5eaf9167/191:100/w_1280,c_limit/northkorea-dtex-it-sec-1392959472.jpg
Source link