home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 2,022 of 2,445   
   Mike Powell to All   
   North Korean fake worker   
   04 Dec 25 10:25:14   
   
   TZUTC: -0500   
   MSGID: 1779.consprcy@1:2320/105 2d96e4cd   
   PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   FORMAT: flowed   
   North Korean 'fake worker' scheme caught live on camera   
      
   Date:   
   Wed, 03 Dec 2025 20:13:00 +0000   
      
   Description:   
   Researchers trapped Lazarus operators with sandbox environments   
      
   FULL STORY   
      
   An investigation run by BCA Ltd founder, Mauro Eldritch, in partnership with   
   Northscan and ANY.RUN has observed the infamous Lazarus group in one of its   
   most notorious schemes - the malicious interview campaign. Within this    
   scheme, workers from the DPRK aim to trick legitimate recruiters into hiring   
   them for high-profile companies - a position they can use to carry out   
   malicious activities.    
      
   Researchers from this intelligence gathering operation were able to trap the   
   hackers with what hackers believed were real developer laptops - but were   
   actually remotely controlled sandbox environments belonging to ANY.RUN.    
      
   During the most recently observed campaign, hackers recruited genuine   
   engineers to act as a front man for them, offering between 20% and 30% of the   
   salary in return for them attending interviews and meetings.    
      
   Famous Chollima   
      
   By tricking the criminals, who go by the name Famous Chollima, into using the   
   sandbox, researchers were able to expose their tactics - and a limited but   
   powerful set of tools that enable them to take over identities without   
   deploying ransomware.    
      
   The criminals were found to be using; Browser-based OTP generators, AI   
   automation tools, and  Google remote Desktop to bypass 2FA and enable   
   consistent control of the host.    
      
   This isnt particularly surprising, since weve seen plenty of different   
   iterations of these attacks with evolving strategies and tech tools. The FBI   
   recently released a statement warning of efforts from the North Korean   
   hackers,    
      
   North Korean social engineering schemes are complex and elaborate, often   
   compromising victims with sophisticated technical acumen. Given the scale and   
   persistence of this malicious activity, even those well versed in   
   cybersecurity practices can be vulnerable to North Korea's determination to   
   compromise networks connected to cryptocurrency assets.    
      
   With this research, security teams gain a more detailed insight into the   
   workings of these criminal groups - and companies can be more secure in their   
   defenses. Its important for firms to understand the common tools these   
   organizations use, because one compromise could lead to a much more   
   significant infiltration.    
      
    Via: The Hacker News   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/north-korean-fake-worker-scheme-caught-   
   live-on-camera   
      
   $$   
   --- SBBSecho 3.28-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 134 206 300 307 317 400 426 428 470   
   SEEN-BY: 229/664 700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 633/280 712/848 902/26 2320/0 105 304 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca