Identity of more than 80 Americans for scampered by North Korean IT worker


Years, The North Korean government has found a source of sanctions and sanctions by hiding its citizens with secret use of telecommunications in the West. A newly revealed operation by US law enforcement precisely determines how much the infrastructure used to pull these plans has been deployed in the United States – and precisely how many Americans have been stolen by North Korean fans to do them.

On Monday, the Ministry of Justice announced a widespread operation to suppress elements based in the United States of North Korea’s IT project, including an indictment against two Americans who said the government has participated in the operation-one of them arrested FBI. Officials also searched 29 “Laptop Farms” in 16 states, which is said to have used and hosted the PCs that North Korean workers had access to remotely, gaining about 200 of these computers, as well as 21 web areas and 29 financial accounts that received income. The Ministry of Justice’s announcement and indictments also show how the North Koreans did not simply create fake IDs for their invasion of Western technology companies, but it is said to have stolen the identity of more than 80 American people to turn them into more than 100 US companies and money.

“This is a lot,” says Michael Barnert, a researcher focusing on North Korean hacking and spy on DTEX, a security company focusing on his own threats. “Whenever you have a laptop farm like this, this is a soft armpit. Closing them in many states, this is huge. “

Overall, the Ministry of Justice says it has identified six Americans who believe that it is involved in a plan to activate North Korean technology workers, though only two have been named and criminally criminally charged with criminal charges – Kangia Wang and Jonoxing Wang, both in Wang. The prosecutor accuses the two men of helping North Korea to steal the identity of American scores, receiving laptops sent by their employers, remote access to North Korea to control those cars from around the world-which can be remote access using a hardware “Keyboard-Video” And receives KVM, KVM Coverys, KVM and KVM. They are said to have made money. The two American men were also named after charging documents as well as two Taiwanese nationals with six Chinese concentrates.

In order to create identity of coverage for North Korean workers, prosecutors say the two have access to more than 700 American information in search of private records. But for those who have forged North Korea, they are said to have gone far beyond the scanning of drivers’ licenses for the robbery and social security cards to enable North Korea to request a job under their name.

It is unclear how these personal documents were obtained from charging documents. But Barnhart DTEX says North Korea’s identity counterfeit operations typically obtained American identification documents from the dark web criminal associations or data leak sites. In fact, he says the identities of 80 stolen by the Ministry of Justice represent a small example of thousands of American IDs, in some cases derived from North Korea’s Hacking operation infrastructure.

Leave a Reply

Your email address will not be published. Required fields are marked *