The infiltrators who revealed the North Korean government explain the reason for doing so

Photo of author

By [email protected]


Earlier this year, two infiltrators stormed a computer and soon realized the importance of what this device is. As it turned out, they fell on the computer that claimed It works in the North Korean government.

The infiltrators decided to continue digging and found evidence that they said to the infiltrators of the electronic expression operations carried out by North Korea, exploitation and penetration tools, and the infrastructure used in these operations.

Saber, one of the infiltrators concerned, told Techcrunch that they were able to reach the computer of the government worker in North Korea for about four months, but as soon as they understood the data they were able to access, they realized that they eventually had to leak and expose what they discovered.

“These infiltrators in the nation -state are infiltrating all the wrong reasons. I hope more of them will be exposed; they deserve to be,” said Saber, who spoke to Techcrunch and Cyb0RG. Publish an article in the legendary piracyReveal the details of their findings.

There are countless cyber security companies and researchers who closely follow the North Korean government and its expected groups, which include espionage, as well as increasingly big Encryption Stole And large -scale operations where the North Koreans Information technology workers are a distance To finance the system’s nuclear weapons program.

In this case, SABER and CYB0RG went one step forward and had already penetrated the infiltrators, a process that can give more, or at least different, insightful visions about how these government -backed groups work, as well as “what they do daily and so on,” said Saber.

The infiltrators do not want to be known only for their handles, Saber and CYB0RG, because they may face revenge on the North Korean government, and perhaps others. Saber said that they consider themselves to be overwhelming, and he did the legendary name called the legendary Fenas FisherResponsible for spyware makers Finfisher and PiracyAs a source of inspiration.

TECHRUNCH event

San Francisco
|
27-29 October, 2025

At the same time, infiltrators also understand that what they did is illegal, but they believed it was important to spread it.

Saber said: “Keeping it for us was not really useful.” “By leaking everything to the public, we hope that we can give researchers some ways to discover them.”

He said: “We hope this will also lead to the discovery of many of their current victims, and so he lost (North Korean infiltrators) arrival.”

CYB0RG said in a message sent via Saber: “illegal or not, this procedure brought concrete pieces to society; this is more important.”

Saber said they are convinced that while the infiltrators – who call Kim – work in the North Korean regime, they may be Chinese and they work in both governments, based on the results they reached that Kim did not work during the holidays in China, indicating that the infiltrator may be based there.

Also, according to Cryer, Kim sometimes translated some Korean documents into a simplified tray using Google Translate.

Saber said he did not try to contact Kim. He said: “I do not think that he will even listen; all he does is to enable his leaders, the same leaders who enslave his people.” “Perhaps he told him to use his knowledge in a way that helps people, not to harm them. But he lives in continuous propaganda and is likely from birth, so all this does not make sense.” It indicates the void of strict information in which the North Koreans live, as they are largely cut off from the outside world.

Saber refused to disclose how to access it and CYB0RG to the Kim computer, given that the two believe that they can use the same technologies “to get more access to some of its systems in the same way.”

During their work, SABER and CYB0RG found evidence of active breakthroughs by Kim, against the South Korean and Taiwanese companies, which they say they called and alerted.

North Korean infiltrators have a history of targeting people working in the cybersecurity industry as well. For this reason, Saber said that he is aware of this danger, but “is not really anxious.”

Saber said: “It is not possible to do much on this topic, certainly being more cautious despite :).”


We are always looking forward to evolution, and by providing an insight into your view and comments in Techcrunch, coverage and events, you can help us! Fill this poll to inform us how to do AGet a chance to win a prize in return!



https://techcrunch.com/wp-content/uploads/2025/08/kim-jong-un-north-korea.jpg?resize=1200,800

Source link

Leave a Comment