home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,482 of 2,445   
   Mike Powell to All   
   North Korean fake job sca   
   02 Jul 25 09:02:00   
   
   TZUTC: -0500   
   MSGID: 1216.consprcy@1:2320/105 2cca7861   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   Microsoft warns North Korean hackers are expanding fake job schemes - as Feds   
   announce further crackdown   
      
   Date:   
   Tue, 01 Jul 2025 15:26:00 +0000   
      
   Description:   
   Fake jobs and fake employees are everywhere, and are costing US companies   
   dearly.   
      
   FULL STORY   
      
   North Korean hackers, scamming their way into US-based high-profile tech   
   companies, have lately been ramping up their efforts, security experts have   
   warned.    
      
   In a recent analysis , Microsoft urged its peers to implement stricter   
   pre-employment vetting measures, and create policies to block unapproved IT   
   management tools.    
      
   Further analysis from the US government found these people were working on   
   stealing money for the North Korean government, which then uses it to fund    
   its government apparatus and its weapons program.   
      
   Arresting the suspects    
      
   The US has imposed stiff sanctions on North Korea which, among other things,   
   prevent US companies from hiring North Korean nationals.    
      
   As a result, the adversaries have been creating fake personas and using all   
   sorts of tools (including VPNs), to hide their true identities and location,   
   and thus increase their chances of getting hired.    
      
   Lately, theyve increased their efforts and have started using voice-changing   
   software and AI-enhanced documents to boost their credibility.    
      
   Theyve also managed to use a person living in New Jersey, who opened up shell   
   companies to trick victims into thinking they were paying a local business.   
   That same person allegedly also helped their overseas peers get hired.    
      
   But the gig seems to be up, as the US Department of Justice (DoJ) arrested    
   and accused a US national named Zhenxing Danny Wang of running a years-long   
   scheme. The effort netted more than $5 million. Another eight people were   
   indicted as well - two Taiwanese and six Chinese nationals. They are all now   
   accused of conspiring to commit wire fraud, money laundering, identity theft    
   , hacking, and sanctions violations.    
      
   Besides actually being paid for the work done (which ironically, according to   
   Microsoft, is often stellar), these people also get access to sensitive   
   company data. They sometimes abuse this access by stealing the data and then   
   extorting the company.    
      
   One of the biggest and most destructive hacking collectives in the world is   
   the North Korean state-sponsored group Lazarus, which brought billions of   
   dollars to the government through similar schemes. In fact, the entire   
   operation even has a name - Operation DreamJob.    
      
    Via TechCrunch   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/microsoft-warns-north-korean-hackers-ar   
   e-expanding-fake-job-schemes-as-feds-announce-crackdown   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 111 206 300 307 317 400 426 428 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 304 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca