KnowBe4 stellt irrtümlich nordkoreanischen Hacker ein und sieht sich einem Infostealer-Angriff ausgesetzt

Teilen:

American cybersecurity company KnowBe4 says a person it recently hired as a Principal Software Engineer turned out to be a North Korean state actor who attempted to install information-stealing on its devices.

The firm detected and stopped the malicious actions in time, so no data breach occurred. However, the case highlights the continued threat posed by North Korean threat actors posing as IT staff, something that the FBI has warned about repeatedly since 2023.

The DPRK maintains a highly organized army of IT workers who obscure their true identities to get hired by hundreds of American firms.

Revenue generated by these workers are used to fund the country’s weapons programs and cyber operations, as well as to collect intelligence.

AI-assisted masking

Before hiring the threat actor, KnowBe4 performed background checks, verified the provided references, and conducted four video interviews to ensure they were a real person and that his face matched the one on his CV.

However, it was later determined that the person had submitted a U.S. person’s stolen identity to dodge the preliminary checks, and also used AI tools to create a profile picture and match that face during the video conference calls.

KnowBe4, which specializes in security awareness training and phishing simulations, suspected something was off on July 15, 2024, when its EDR product reported an attempt to load malware from the Mac workstation that had just been sent to the new hire.

A KnowBe4 spokesperson told BleepingComputer the malware was an infostealer targeting data stored on web browsers, and that the rogue employee was likely hoping to extract information left on the computer before it was commissioned to him.

“The attacker may [have used] this to find any credentials left over from previous browser sessions as a result of an IT department’s initial provisioning process or to extract information leftover from an incomplete or improperly wiped laptop previously issued to a different employee.” the KnowBe4 spokesperson told BleepingComputer.

When confronted by the firm’s IT staff about the activity, the state actor initially projected excuses but soon stopped all communication.

“When these alerts came in KnowBe4’s SOC team reached out to the user to inquire about the anomalous activity and possible cause. XXXX (the threat actor) responded to SOC that he was following steps on his router guide to troubleshoot a speed issue and that it may have caused a compromise.

The attacker performed various actions to manipulate session history files, transfer potentially harmful files, and execute unauthorized software. He used a Raspberry Pi to download the malware. SOC attempted to get more details from XXXX including getting him on a call. XXXX stated he was unavailable for a call and later became unresponsive.”

❖ KnowBe4

A post by KnowBe4 CEO Stu Sjouwerman explains that the scheme involves tricking the employer into sending the workstation to an “IT mule laptop farm” based near the location the fraudster declared as their home address on their application.

Then they use VPN to connect to that device during the nighttime, so it appears as if they’re working U.S. times, and perform the tasks given to them as normal.

To mitigate this risk, KnowBe4 suggests that firms maintain a sandbox for new hires isolated from their most critical network parts.

The company also says to ensure that new hire’s external devices aren’t used remotely and treat shipping address inconsistencies as a red flag.

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
11:42 am, Juni 20, 2025
Wetter-Symbol 26°C
L: 25° | H: 27°
overcast clouds
Luftfeuchtigkeit: 54 %
Druck: 1023 mb
Wind: 5 mph E
Windböe: 8 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 100%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:42 am
Sonnenuntergang: 9:21 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
25° | 27°°C 0 mm 0% 11 mph 56 % 1023 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
18° | 32°°C 0.43 mm 43% 11 mph 62 % 1020 mb 0 mm/h
So. Juni 22 10:00 pm
Wetter-Symbol
17° | 26°°C 0.86 mm 86% 15 mph 87 % 1014 mb 0 mm/h
Mo. Juni 23 10:00 pm
Wetter-Symbol
14° | 23°°C 0.2 mm 20% 14 mph 80 % 1017 mb 0 mm/h
Di. Juni 24 10:00 pm
Wetter-Symbol
14° | 25°°C 0 mm 0% 16 mph 76 % 1017 mb 0 mm/h
Today 1:00 pm
Wetter-Symbol
26° | 26°°C 0 mm 0% 9 mph 54 % 1023 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
26° | 26°°C 0 mm 0% 11 mph 48 % 1023 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
22° | 23°°C 0 mm 0% 11 mph 46 % 1022 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
20° | 20°°C 0 mm 0% 8 mph 56 % 1022 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
18° | 18°°C 0 mm 0% 5 mph 62 % 1020 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
18° | 18°°C 0 mm 0% 5 mph 60 % 1019 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
21° | 21°°C 0 mm 0% 6 mph 54 % 1019 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
28° | 28°°C 0 mm 0% 9 mph 34 % 1018 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€92,212.21
0.95%
Ethereum(ETH)
€2,221.05
0.48%
Fesseln(USDT)
€0.87
-0.01%
XRP(XRP)
€1.89
0.29%
Solana(SOL)
€128.91
1.33%
USDC(USDC)
€0.87
0.01%
Dogecoin(DOGE)
€0.148233
0.00%
Shiba Inu(SHIB)
€0.000010
0.82%
Pepe(PEPE)
€0.000009
-0.72%
Nach oben scrollen