www.wired.com
Open in
urlscan Pro
2600:9000:2670:ca00:14:11ee:9340:93a1
Public Scan
URL:
https://www.wired.com/story/north-korean-hacker-hired-ecurity-company-malware/
Submission Tags: urlscan
Submission: On August 01 via api from US — Scanned from DE
Submission Tags: urlscan
Submission: On August 01 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Skip to main content Open Navigation Menu Menu Story Saved To revisit this article, visit My Profile, then View saved stories. Close Alert A North Korean Hacker Tricked a US Security Vendor Into Hiring Him—and Immediately Tried to Hack Them * Security * Politics * Gear * The Big Story * Business * Science * Culture * Ideas * Merch Story Saved To revisit this article, visit My Profile, then View saved stories. Close Alert Sign In SUBSCRIBE GET WIRED FOR JUST $30 $5 SUBSCRIBE Search Search * Security * Politics * Gear * The Big Story * Business * Science * Culture * Ideas * Merch * Podcasts * Video * Newsletters * Magazine * Travel * Steven Levy's Plaintext Column * WIRED Classics from the Archive * Events * WIRED Insider * WIRED Consulting * Jobs * Coupons Chevron ON SALE NOWGet WIRED - now only $30 $5This is your last free article. See the future here first with 1 year of unlimited access.SUBSCRIBE NOW Already a member? Sign in Get WIRED - now only $30 $5.SUBSCRIBE NOW Jon Brodkin, Ars Technica Security Jul 26, 2024 8:00 AM A NORTH KOREAN HACKER TRICKED A US SECURITY VENDOR INTO HIRING HIM—AND IMMEDIATELY TRIED TO HACK THEM KnowBe4 detailed the incident in a recent blog post as a warning for other potential targets. Courtesy of Ars Technica Save this storySave Save this storySave KnowBe4, a US-based security vendor, revealed that it unwittingly hired a North Korean hacker who attempted to load malware into the company's network. KnowBe4 CEO and founder Stu Sjouwerman described the incident in a blog post this week, calling it a cautionary tale that was fortunately detected before causing any major problems. "First of all: No illegal access was gained, and no data was lost, compromised, or exfiltrated on any KnowBe4 systems," Sjouwerman wrote. “This is not a data breach notification, there was none. See it as an organizational learning moment I am sharing with you. If it can happen to us, it can happen to almost anyone. Don't let it happen to you.” KnowBe4 said it was looking for a software engineer for its internal IT AI team. The firm hired a person who, it turns out, was from North Korea and was "using a valid but stolen US-based identity" and a photo that was "enhanced" by artificial intelligence. There is now an active FBI investigation amid suspicion that the worker is what KnowBe4's blog post called "an Insider Threat/Nation State Actor." Featured Video Jeremy Renner Answers The Web's Most Searched Questions KnowBe4 operates in 11 countries and is headquartered in Florida. It provides security awareness training, including phishing security tests, to corporate customers. If you occasionally receive a fake phishing email from your employer, you might be working for a company that uses the KnowBe4 service to test its employees' ability to spot scams. PERSON PASSED BACKGROUND CHECK AND VIDEO INTERVIEWS KnowBe4 hired the North Korean hacker through its usual process. "We posted the job, received résumés, conducted interviews, performed background checks, verified references, and hired the person. We sent them their Mac workstation, and the moment it was received, it immediately started to load malware," the company said. Ars Technica This story originally appeared on Ars Technica, a trusted source for technology news, tech policy analysis, reviews, and more. Ars is owned by WIRED's parent company, Condé Nast. Even though the photo provided to HR was fake, the person who was interviewed for the job apparently looked enough like it to pass. KnowBe4's HR team "conducted four video conference based interviews on separate occasions, confirming the individual matched the photo provided on their application," the post said. "Additionally, a background check and all other standard pre-hiring checks were performed and came back clear due to the stolen identity being used. This was a real person using a valid but stolen US-based identity. The picture was AI 'enhanced.'" The two images at the top of this story are a stock photo and what KnowBe4 says is the AI fake based on the stock photo. The stock photo is on the left, and the AI fake is on the right. The employee, referred to as "XXXX" in the blog post, was hired as a principal software engineer. The new hire's suspicious activities were flagged by security software, leading KnowBe4's Security Operations Center (SOC) to investigate: > On July 15, 2024, a series of suspicious activities were detected on the user > beginning at 9:55 pm EST. When these alerts came in KnowBe4's SOC team reached > out to the user to inquire about the anomalous activity and possible cause. > XXXX responded to SOC that he was following steps on his router guide to > troubleshoot a speed issue and that it may have caused a compromise. > > The attacker performed various actions to manipulate session history files, > transfer potentially harmful files, and execute unauthorized software. He used > a Raspberry Pi to download the malware. SOC attempted to get more details from > XXXX including getting him on a call. XXXX stated he was unavailable for a > call and later became unresponsive. At around 10:20 pm EST SOC contained > XXXX's device. “FAKE IT WORKER FROM NORTH KOREA” The SOC analysis indicated that the loading of malware "may have been intentional by the user," and the group "suspected he may be an Insider Threat/Nation State Actor," the blog post said. "We shared the collected data with our friends at Mandiant, a leading global cybersecurity expert, and the FBI, to corroborate our initial findings. It turns out this was a fake IT worker from North Korea," Sjouwerman wrote. KnowBe4 said it can't provide much detail because of the active FBI investigation. But the person hired for the job may have logged into the company computer remotely from North Korea, Sjouwerman explained: > How this works is that the fake worker asks to get their workstation sent to > an address that is basically an "IT mule laptop farm." They then VPN in from > where they really physically are (North Korea or over the border in China) and > work the night shift so that they seem to be working in US daytime. The scam > is that they are actually doing the work, getting paid well, and give a large > amount to North Korea to fund their illegal programs. I don't have to tell you > about the severe risk of this. It's good we have new employees in a highly > restricted area when they start, and have no access to production systems. Our > controls caught it, but that was sure a learning moment that I am happy to > share with everyone. This story originally appeared on Ars Technica. Most Popular * The Big Story How Soon Might the Atlantic Ocean Break? Two Sibling Scientists Found an Answer—and Shook the World By Sandra Upson * Gear Wear This AI Friend Around Your Neck By Boone Ashworth * Security J.D. Vance Left His Venmo Public. Here’s What It Shows By Dhruv Mehrotra * Gear The Best Barefoot Shoes for Walking or Running By Scott Gilbertson * YOU MIGHT ALSO LIKE … * Politics Lab: Get the newsletter and listen to the podcast * What happens when you give people free money * Not everyone loses weight on Ozempic * The Pentagon wants to spend $141 billion on a doomsday machine * Event: Join us for the Energy Tech Summit on October 10 in Berlin Jon Brodkin is Senior IT Reporter at Ars Technica. * X * X TopicsArs Technicacybersecurityhacksnorth korea Read More J.D. Vance Left His Venmo Public. Here’s What It Shows The Republican VP nominee's Venmo network reveals connections ranging from the architects of Project 2025 to enemies of Donald Trump—and the populist's close ties to the very elites he rails against. Dhruv Mehrotra Saboteurs Cut Internet Cables in Latest Disruption During Paris Olympics Long-distance cables were severed across France in a move that disrupted internet connectivity. Matt Burgess How Infostealers Pillaged the World’s Passwords Infostealer malware is swiping millions of passwords, cookies, and search histories. It’s a gold mine for hackers—and a disaster for anyone who becomes a target. Lily Hay Newman This Machine Exposes Privacy Violations A former Google engineer has built a search engine, webXray, that aims to find illicit online data collection and tracking—with the goal of becoming “the Henry Ford of tech lawsuits.” Brian Merchant How One Bad CrowdStrike Update Crashed the World’s Computers A defective CrowdStrike update sent computers around the globe into a reboot death spiral, taking down air travel, hospitals, banks, and more with it. Here’s how that’s possible. Lily Hay Newman At the Olympics, AI Is Watching You A controversial new surveillance system in Paris foreshadows a future where there are too many CCTV cameras for humans to physically watch. Morgan Meaker The Pentagon Wants to Spend $141 Billion on a Doomsday Machine The DOD wants to refurbish ICBM silos that give it the ability to end civilization. But these missiles are useless as weapons, and their other main purpose—attracting an enemy’s nuclear strikes—serves no end. Matthew Gault GET 1 YEAR FOR $30 $5 SUBSCRIBE WIRED is where tomorrow is realized. It is the essential source of information and ideas that make sense of a world in constant transformation. The WIRED conversation illuminates how technology is changing every aspect of our lives—from culture to business, science to design. The breakthroughs and innovations that we uncover lead to new ways of thinking, new connections, and new industries. More From WIRED * Subscribe * Newsletters * FAQ * WIRED Staff * Editorial Standards * Archive * RSS * Accessibility Help Reviews and Guides * Reviews * Buying Guides * Mattresses * Electric Bikes * Fitness Trackers * Streaming Guides * Coupons * Submit an Offer * Become a Partner * Coupons Contact * Code Guarantee * Advertise * Contact Us * Customer Care * Jobs * Press Center * Condé Nast Store * User Agreement * Privacy Policy * Your California Privacy Rights © 2024 Condé Nast. All rights reserved. WIRED may earn a portion of sales from products that are purchased through our site as part of our Affiliate Partnerships with retailers. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Condé Nast. Ad Choices SELECT INTERNATIONAL SITE United StatesLargeChevron * Italia * Japón * Czech Republic & Slovakia * Facebook * X * Pinterest * YouTube * Instagram * Tiktok Manage Preferences WE CARE ABOUT YOUR PRIVACY We and our 177 partners store and/or access information on a device, such as unique IDs in cookies to process personal data. You may accept or manage your choices by clicking below, including your right to object where legitimate interest is used, or at any time in the privacy policy page. These choices will be signaled to our partners and will not affect browsing data.More Information WE AND OUR PARTNERS PROCESS DATA TO PROVIDE: Use precise geolocation data. Actively scan device characteristics for identification. Store and/or access information on a device. Personalised advertising and content, advertising and content measurement, audience research and services development. List of Partners (vendors) I Accept Your Privacy Choices