Smart Business Tips
Sign In
  • Home
  • Business
    • Business Coaching
    • Business Growth
    • Business Tools & Apps
  • Entrepreneurship
    • Entrepreneurs
    • Crypto
    • Innovation
    • Investing
    • Leadership
    • Productivity
  • Contact US
    • Blog
  • Branding
    • Content Marketing
    • Digital Marketing
    • E-commerce
    • Marketing Strategies
    • Personal Finance
  • Sales
    • Small Business Tips
    • Social Media
    • Startups
    • Tech Trends
    • Investing
  • Shop
Notification
6 Red Flags That Keep Good Candidates from Getting Hired
Leadership

6 Red Flags That Keep Good Candidates from Getting Hired

New Insights Suggest Posting Frequency Is Key to LinkedIn Success
Social Media

New Insights Suggest Posting Frequency Is Key to LinkedIn Success

How Enterprise Search And AI Intelligence Reveal Market Pulse in 2025
Content Marketing

How Enterprise Search And AI Intelligence Reveal Market Pulse in 2025

6 Unconventional Habits That Actually Help Entrepreneurs Find Work-Life Sanity
Entrepreneurship

6 Unconventional Habits That Actually Help Entrepreneurs Find Work-Life Sanity

Font ResizerAa
Smart Business TipsSmart Business Tips
  • Home
  • Business
  • Entrepreneurship
  • Contact US
  • Branding
  • Sales
  • Shop
Search
  • Home
  • Business
    • Business Coaching
    • Business Growth
    • Business Tools & Apps
  • Entrepreneurship
    • Entrepreneurs
    • Crypto
    • Innovation
    • Investing
    • Leadership
    • Productivity
  • Contact US
    • Blog
  • Branding
    • Content Marketing
    • Digital Marketing
    • E-commerce
    • Marketing Strategies
    • Personal Finance
  • Sales
    • Small Business Tips
    • Social Media
    • Startups
    • Tech Trends
    • Investing
  • Shop
Sign In Sign In
Follow US
Made by ThemeRuby using the Foxiz theme. Powered by WordPress
Smart Business Tips > Blog > Tech Trends > Hackers breach and expose a major North Korean spying operation
Tech Trends

Hackers breach and expose a major North Korean spying operation

Admin45
Last updated: August 12, 2025 6:43 pm
By
Admin45
4 Min Read
Hackers breach and expose a major North Korean spying operation
SHARE


Hackers claim to have compromised the computer of a North Korean government hacker and leaked its contents online, offering a rare window into a hacking operation by the notoriously secretive nation. 

The two hackers, who go by Saber and cyb0rg, published a report about the breach in the latest issue of Phrack magazine, a legendary cybersecurity e-zine that was first published in 1985. The latest issue was distributed at the Def Con hackers conference in Las Vegas last week.

In the article, the two hackers wrote that they were able to compromise a workstation containing a virtual machine and a virtual private server belonging to the hacker, whom they call “Kim.” The hackers claim Kim works for the North Korean government espionage group known as Kimsuky, also known as APT43 and Thallium. The hackers leaked the stolen data to DDoSecrets, a nonprofit collective that stores leaked datasets in the public interest.

Kimsuky is a prolific advanced persistent threat (APT) group widely believed to be working inside North Korea’s government, targeting journalists and government agencies in South Korea and elsewhere, and other targets that could be of interest for North Korea’s intelligence apparatus. 

As is usual with North Korea, Kimsuky also conducts operations more akin to a cybercriminal group — for example, stealing and laundering cryptocurrencies to fund North Korea’s nuclear weapons program. 

This hack gives an almost-unprecedented look inside the operation of Kimsuky, given that the two hackers compromised one of the group’s members, rather than investigating a data breach as cybersecurity researchers and companies typically have to rely on.

“It shows a glimpse how openly ‘Kimsuky’ cooperates with Chinese [government hackers] and shares their tools and techniques,” the hackers wrote.

An illustration of North Korean dictator Kim Jong-un, which was included in the phrack article.Image Credits:Saber and cyb0rg/Phrack

Obviously, what Saber and cyb0rg did is technically a crime, although they will likely never be prosecuted for it, considering North Korea is sanctioned up to its eyeballs. The two hackers clearly believe Kimsuky members deserve to be exposed and embarrassed.

“Kimsuky, you’re not a hacker. You are driven by financial greed, to enrich your leaders, and to fulfill their political agenda. You steal from others and favour your own. You value yourself above the others: You are morally perverted,” the two wrote in Phrack. “You hack for all the wrong reasons.”

Saber and cyb0rg claim to have found evidence of Kimsuky compromising several South Korean government networks and companies, email addresses, and hacking tools used by the Kimsuky group, internal manuals, passwords, and more data. 

Emails sent to the addresses allegedly belonging to the hackers, which were listed in the research, went unanswered. 

The hackers wrote that they were able to identify Kim as a North Korean government hacker, thanks to “artifacts and hints” that pointed in that direction, including files configurations and domains previously attributed to the North Korean hacking group Kimsuky. 

The hackers also noted Kim’s “strict office hours, always connecting at around 09:00 and disconnecting by 17:00 Pyongyang time.”



Source link

Join Our Newsletter
Subscribe to our newsletter to get our newest articles instantly!
Share This Article
Facebook Email Copy Link
Leave a Comment Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recipe Rating




Follow US

Find US on Social Medias
FacebookLike
XFollow
YoutubeSubscribe
TelegramFollow
Ad image

You Might Also Like

WIRED Tested Dozens of Blenders. These Are Our 9 Favorites (2025)
Tech Trends

WIRED Tested Dozens of Blenders. These Are Our 9 Favorites (2025)

By
Admin45
August 8, 2025
In just 3 months, CoreWeave CEO, once a crypto-mining bro, becomes a deca-billionaire
Tech Trends

In just 3 months, CoreWeave CEO, once a crypto-mining bro, becomes a deca-billionaire

By
Admin45
June 26, 2025
Best Wireless Headphones (2025): Tested Over Many Hours
Tech Trends

Best Wireless Headphones (2025): Tested Over Many Hours

By
Admin45
August 8, 2025
Hackers are trying to steal passwords and sensitive data from users of Signal clone
Tech Trends

Hackers are trying to steal passwords and sensitive data from users of Signal clone

By
Admin45
July 17, 2025
X is piloting a program that lets AI chatbots generate Community Notes
Tech Trends

X is piloting a program that lets AI chatbots generate Community Notes

By
Admin45
July 1, 2025
Anthropic settles AI book-training lawsuit with authors
Tech Trends

Anthropic settles AI book-training lawsuit with authors

By
Admin45
August 26, 2025

SmartBusinessTips

  • Business Tools & Apps
  • Marketing Strategies
  • Social Media
  • Tech Trends
  • Branding
  • Business
  • Crypto
  • Sales
  • About Us
  • Privacy Policy
  • Member Login
  • Contact Us
  • Business Coaching
  • Business Growth
  • Content Marketing
  • Branding

@Smartbusinesstips Copyright-2025-2027 Content.

Don't not sell my personal information
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?

Not a member? Sign Up