US security vendor hires North Korean hacker, who swiftly deploys malware

Admin

US security vendor hires North Korean hacker, who swiftly deploys malware

hired, loaded malware, North Korean hacker, US security vendor



KnowBe4, a US-based security vendor, recently revealed a shocking incident where they inadvertently hired a North Korean hacker who attempted to load malware into the company’s network. KnowBe4 CEO and founder, Stu Sjouwerman, shared the incident in a blog post, emphasizing the importance of being cautious and constantly updating security measures to prevent such attacks.

This incident serves as a cautionary tale for organizations worldwide that are constantly at risk of cybersecurity threats. It highlights the need for robust security measures, including thorough background checks and strict hiring protocols, to protect sensitive data.

KnowBe4 was seeking a software engineer for its internal IT AI team and hired an individual from North Korea who, unbeknownst to them, was using a stolen US-based identity. The hacker also used an artificially enhanced photo during the application process. The AI-enhanced image looked convincing enough to pass KnowBe4’s HR team’s scrutiny during the video interviews.

KnowBe4 followed its typical hiring process, which included posting the job, conducting interviews, verifying references, and performing background checks. Unfortunately, the stolen identity was not detected during the screening process, leading to the hiring of the North Korean hacker.

It’s worth noting that the hacker did not gain illegal access to KnowBe4’s systems, nor did they compromise or exfiltrate any data. Sjouwerman made it clear that this incident was a learning opportunity for the organization and a reminder to others about the potential risks they face.

The suspicious activities of the newly hired employee, referred to as “XXXX,” were identified by KnowBe4’s security software, prompting their Security Operations Center (SOC) to investigate. These activities included manipulating session history files, transferring potentially harmful files, and executing unauthorized software. Additionally, the hacker used a Raspberry Pi device to download malware onto the company’s network.

Upon discovering these activities, the SOC team reached out to XXXX, who claimed that they were troubleshooting a speed issue on their router, which may have resulted in a compromise. However, when the SOC team attempted to gather more information and schedule a call, XXXX became unresponsive.

The subsequent analysis conducted by KnowBe4’s SOC team suggested that the loading of malware may have been intentional. They suspected that XXXX was an Insider Threat or a Nation State Actor from North Korea. To corroborate their findings, KnowBe4 shared their collected data with Mandiant, a leading global cybersecurity expert, and the FBI.

Further investigation indicated that XXXX was indeed a fake IT worker from North Korea. The hacker was remotely logging into the company’s computer from North Korea or possibly across the border in China. By working the night shift, they attempted to give the impression that they were working during US daytime hours. The underlying motive behind this scheme was to extract valuable company information and fund illegal activities in North Korea.

KnowBe4 stressed the importance of having strict controls in place, particularly when dealing with new employees in highly sensitive areas. They implemented measures to ensure that new hires have limited access to production systems and are closely monitored. In this case, their controls successfully detected the fraudulent activities, preventing any significant damage.

The incident serves as a reminder to organizations to remain vigilant and stay updated on the latest cybersecurity threats. Implementing robust security measures, conducting thorough background checks, and regularly educating employees about potential phishing attacks and social engineering tactics are essential steps to protect sensitive data.

Additionally, it highlights the global nature of cybersecurity threats. Hackers, regardless of their location, can exploit vulnerabilities in organizations’ systems and launch attacks remotely. This incident underscores the need for organizations to prioritize cybersecurity and establish effective protocols to detect and prevent such incidents.

While the details of the incident were limited due to the ongoing FBI investigation, KnowBe4’s openness in sharing their experience emphasizes their commitment to transparency and the importance of collective learning in the cybersecurity community. By sharing this cautionary tale, they hope to raise awareness and encourage organizations to prioritize cybersecurity measures.

In conclusion, the incident faced by KnowBe4 highlights the evolving and persistent nature of cybersecurity threats. It reinforces the need for organizations to establish robust security measures, conduct thorough background checks, and maintain constant vigilance against potential attacks. By learning from incidents like these and sharing valuable insights, organizations can better protect themselves against cyber threats and keep sensitive data secure.



Source link

Leave a Comment