{"id":19110,"date":"2022-05-21T10:45:07","date_gmt":"2022-05-21T18:45:07","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/05\/21\/news-12843\/"},"modified":"2022-05-21T10:45:07","modified_gmt":"2022-05-21T18:45:07","slug":"news-12843","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/05\/21\/news-12843\/","title":{"rendered":"North Korean IT Workers Are Infiltrating Tech Companies"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/628829eccd28289a2bae9d47\/master\/pass\/NKOREA_ru_sec_GettyImages-153340012.jpg\"\/><\/p>\n<p><strong>Credit to Author: Matt Burgess| Date: Sat, 21 May 2022 13:00:00 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/matt-burgess\">Matt Burgess<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">As Russia\u2019s full-scale<\/span> war in <a href=\"https:\/\/www.wired.com\/tag\/ukraine\">Ukraine<\/a> heads towards its hundredth day, <a href=\"https:\/\/www.wired.com\/story\/drones-russia-ukraine-war\/\">opposition from Ukrainian forces<\/a> is as strong as ever. At the same time, hacktivists all around the world continue to breach Russian institutions and <a href=\"https:\/\/www.wired.com\/story\/russia-ukraine-data\/\">publish their files and emails<\/a>. This week one hacktivist collective took a different\u2014and slightly peculiar\u2014approach: launching a service to prank-call Russian government officials. The <a href=\"https:\/\/www.wired.com\/story\/robo-prank-call-russian-officials-website\/\">new website<\/a> uses leaked details to put two random Russian officials on a call with each other. It obviously won&#x27;t make any difference to the outcome of the war, but the group that created it hopes the tool will cause some confusion and annoy those in Moscow.<\/p>\n<p class=\"paywall\">New research from Google\u2019s Threat Analysis Group has delved into the surveillance-for-hire industry and found that spyware vendors are <a href=\"https:\/\/www.wired.com\/story\/android-spyware-cytrox-predator-google-tag\/\">targeting Android devices with zero-day exploits<\/a>. State-sponsored actors in Egypt, Armenia, Greece, Madagascar, C\u00f4te d\u2019Ivoire, Serbia, Spain, and Indonesia have all purchased hacking tools from the North Macedonian firm Cytrox, the Google team says. The malware has used five previously unknown Android exploits, alongside unpatched vulnerabilities. Overall, Google\u2019s researchers say they\u2019re tracking more than 30 surveillance-for-hire firms around the world.<\/p>\n<p class=\"paywall\">In other malware news, academics at Germany\u2019s Technical University of Darmstadt have figured out a way to <a href=\"https:\/\/www.wired.com\/story\/iphone-find-my-malware-attack-vulnerability\/\">track an iPhone\u2019s location even when it is turned off<\/a>. When you switch your iPhone off it doesn\u2019t fully power down\u2014instead chips inside run in a low-power mode. The researchers were able to run malware that can track the phone in this low-power mode. They believe their work is the first of its kind, but the method is unlikely to be much of a threat in the real world, as it first requires jailbreaking the targeted iPhone, which has generally become harder to do in recent years.<\/p>\n<p class=\"paywall\">But wait, there&#x27;s more. We\u2019ve rounded up all the news that we didn\u2019t break or cover in depth this week. Click on the headlines to read the full stories. And stay safe out there.<\/p>\n<p class=\"paywall\">International sanctions imposed against North Korea, for its continued development of nuclear weapons and ballistic missiles, mean the nation can\u2019t trade with other countries or bring outside money within its borders. To get around this, in recent years Pyongyang has allowed its state-affiliated hackers to <a href=\"https:\/\/www.wired.com\/story\/north-korea-cryptocurrency-theft-ethereum\/\">raid cryptocurrency platforms<\/a> and <a href=\"https:\/\/www.wired.com\/story\/how-north-korea-robs-banks-around-world\/\">rob banks<\/a>. Now the FBI, the US Department of State, and the US Treasury <a data-offer-url=\"https:\/\/www.theguardian.com\/world\/2022\/may\/17\/dont-accidentally-hire-a-north-korean-hacker-fbi-warns\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.theguardian.com\/world\/2022\/may\/17\/dont-accidentally-hire-a-north-korean-hacker-fbi-warns&quot;}\" href=\"https:\/\/www.theguardian.com\/world\/2022\/may\/17\/dont-accidentally-hire-a-north-korean-hacker-fbi-warns\" rel=\"nofollow noopener\" target=\"_blank\">have warned<\/a> that thousands of North Korea\u2019s IT workers\u2014including app and software developers\u2014have been freelancing at businesses around the world and sending money home. Many of them are based in China or Russia, <a data-offer-url=\"https:\/\/home.treasury.gov\/system\/files\/126\/20220516_dprk_it_worker_advisory.pdf\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/home.treasury.gov\/system\/files\/126\/20220516_dprk_it_worker_advisory.pdf&quot;}\" href=\"https:\/\/home.treasury.gov\/system\/files\/126\/20220516_dprk_it_worker_advisory.pdf\" rel=\"nofollow noopener\" target=\"_blank\">the officials say<\/a>. The risks of hiring North Korean workers range from \u201ctheft of intellectual property, data, and funds to reputational harm and legal consequences, including sanctions under both US and United Nations authorities.\u201d<\/p>\n<p class=\"paywall\">In a significant public move, the US Department of Justice says it will stop prosecuting security researchers under the <a href=\"https:\/\/www.wired.com\/2014\/11\/hacker-lexicon-computer-fraud-abuse-act\/\">Computer Fraud and Abuse Act<\/a>. \u201cComputer security research is a key driver of improved cybersecurity,\u201d deputy attorney general Lisa Monaco <a data-offer-url=\"https:\/\/www.justice.gov\/opa\/pr\/department-justice-announces-new-policy-charging-cases-under-computer-fraud-and-abuse-act\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.justice.gov\/opa\/pr\/department-justice-announces-new-policy-charging-cases-under-computer-fraud-and-abuse-act&quot;}\" href=\"https:\/\/www.justice.gov\/opa\/pr\/department-justice-announces-new-policy-charging-cases-under-computer-fraud-and-abuse-act\" rel=\"nofollow noopener\" target=\"_blank\">said in a statement<\/a>. For years the anti-hacking CFFA law has been criticized for its broad scope and its potential to be abused by prosecutors. While the DOJ\u2019s explicit shift in policy will be welcomed by researchers, <a data-offer-url=\"https:\/\/www.vice.com\/en\/article\/v7d9nb\/department-of-justice-security-researchers-new-cfaa-policy\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.vice.com\/en\/article\/v7d9nb\/department-of-justice-security-researchers-new-cfaa-policy&quot;}\" href=\"https:\/\/www.vice.com\/en\/article\/v7d9nb\/department-of-justice-security-researchers-new-cfaa-policy\" rel=\"nofollow noopener\" target=\"_blank\">as <em>Motherboard<\/em> reports<\/a>, the policy doesn\u2019t go far enough and still can put legitimate researchers at risk.<\/p>\n<p class=\"paywall\">The mostly Russia-based Conti ransomware gang has had a dreadful few months. After backing Vladimir Putin\u2019s war in Ukraine, thousands of its <a href=\"https:\/\/www.wired.com\/story\/conti-leaks-ransomware-work-life\/\">internal messages and innermost secrets were published online<\/a>. While the gang has continued to target victims, <a data-offer-url=\"https:\/\/www.theverge.com\/2022\/5\/18\/23125958\/costa-rica-president-says-country-at-war-conti-ransomware-cybercrime\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.theverge.com\/2022\/5\/18\/23125958\/costa-rica-president-says-country-at-war-conti-ransomware-cybercrime&quot;}\" href=\"https:\/\/www.theverge.com\/2022\/5\/18\/23125958\/costa-rica-president-says-country-at-war-conti-ransomware-cybercrime\" rel=\"nofollow noopener\" target=\"_blank\">including Costa Rica\u2019s government<\/a>, researchers now say Conti has officially shut down its operations. Conti\u2019s Tor admin panels have been taken offline, and the group\u2019s members are splintering off into other ransomware groups, <a data-offer-url=\"https:\/\/www.bleepingcomputer.com\/news\/security\/conti-ransomware-shuts-down-operation-rebrands-into-smaller-units\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.bleepingcomputer.com\/news\/security\/conti-ransomware-shuts-down-operation-rebrands-into-smaller-units\/&quot;}\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/conti-ransomware-shuts-down-operation-rebrands-into-smaller-units\/\" rel=\"nofollow noopener\" target=\"_blank\">according to security firm Advanced Intel<\/a>. The shutdown comes after the US government offered a <a data-offer-url=\"https:\/\/www.reuters.com\/world\/us-offers-15-mln-reward-information-conti-ransomware-group-2022-05-06\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.reuters.com\/world\/us-offers-15-mln-reward-information-conti-ransomware-group-2022-05-06\/&quot;}\" href=\"https:\/\/www.reuters.com\/world\/us-offers-15-mln-reward-information-conti-ransomware-group-2022-05-06\/\" rel=\"nofollow noopener\" target=\"_blank\">$15 million reward<\/a> for information about Conti&#x27;s members.<\/p>\n<p class=\"paywall\">Canada has become the final country in the Five Eyes intelligence group\u2014which also includes the US, UK, Australia, and New Zealand\u2014to <a data-offer-url=\"https:\/\/www.theverge.com\/2022\/5\/20\/23132125\/canada-bans-huawei-5g-network-equipment-telcos-reoval-2024\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.theverge.com\/2022\/5\/20\/23132125\/canada-bans-huawei-5g-network-equipment-telcos-reoval-2024&quot;}\" href=\"https:\/\/www.theverge.com\/2022\/5\/20\/23132125\/canada-bans-huawei-5g-network-equipment-telcos-reoval-2024\" rel=\"nofollow noopener\" target=\"_blank\">ban the use of Huawei\u2019s telecoms equipment<\/a> in its 5G networks. Fellow Chinese telecom firm ZTE is also included in the ban. The Canadian government, in an announcement, cited national security concerns and the fact that companies could be forced to comply with orders from \u201cforeign governments.\u201d Starting in September, Canadian firms will be banned from buying new 4G and 5G equipment from the Chinese companies. They must remove all existing 5G equipment by the summer of 2024, and 4G equipment must be removed by the end of 2027.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/north-korea-it-workers-security-roundup\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/628829eccd28289a2bae9d47\/master\/pass\/NKOREA_ru_sec_GettyImages-153340012.jpg\"\/><\/p>\n<p><strong>Credit to Author: Matt Burgess| Date: Sat, 21 May 2022 13:00:00 +0000<\/strong><\/p>\n<p>Plus: The Conti ransomware gang shuts down, Canada bans Huawei and ZTE, and more of the week\u2019s top security news.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-19110","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19110","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19110"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19110\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19110"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19110"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}