Company hacked after hiring North Korean cybercriminal as remote IT worker: full details inside | economy news

New Delhi: A North Korean cybercriminal, posing as a remote IT worker, managed to breach the network of a Western company, according to a BBC report. The company, believed to be based in the UK, US or Australia, allowed cybersecurity firm Secureworks to disclose the incident. This highlights the risk of North Korean cybercriminals targeting international companies.

What happened?

According to Secureworks, North Korean cybercriminals are now using false information to land remote jobs at Western companies. Once hired, they exploit their employees’ access to steal confidential company data. In some cases, they have even used the stolen data to extort money from their employers after leaving work.

According to the BBC, the cybercriminal was hired as a contractor during the summer. Using his employee access, he logged into the company network, downloaded as much sensitive information as possible, and transferred the sensitive data outside the company.

The individual worked for the company for four months before being fired for poor performance. After his dismissal, he sent ransom emails, threatening to leak or sell confidential company data unless he was paid a six-figure sum in cryptocurrency. It is unclear whether the company accepted their demands.

This incident is not an isolated case. Since 2022, there have been multiple reports of North Korean cybercriminals being hired by Western companies. These criminals benefit from high-paying remote jobs and avoid penalties. In September, Mandiant cyber responders revealed that dozens of Fortune 100 companies had unknowingly hired North Koreans. However, it is still rare for these workers to turn against their employers.

Rafe Pilling, Director of Threat Intelligence at Secureworks, explained to the BBC that this case marks a serious escalation in the risks posed by North Korean IT worker schemes. He noted: “They are no longer just looking for a regular paycheck, but are now targeting larger sums through data theft and extortion from within the company’s defenses.”

Source link

Disclaimer:
The information contained in this post is for general information purposes only. We make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability or availability with respect to the website or the information, products, services, or related graphics contained on the post for any purpose.
We respect the intellectual property rights of content creators. If you are the owner of any material featured on our website and have concerns about its use, please contact us. We are committed to addressing any copyright issues promptly and will remove any material within 2 days of receiving a request from the rightful owner.

Leave a Comment