Technophile NewsTechnophile News
  • Home
  • News
  • PC
  • Phones
  • Android
  • Gadgets
  • Games
  • Guides
  • Accessories
  • Reviews
  • Spotlight
  • More
    • Artificial Intelligence
    • Web Stories
    • Press Release
What's On

Microsoft’s new Xbox mode on Windows has leaked for any handheld

17 September 2025

The DOGE Subcommittee Hearing on Weather Modification Was a Nest of Conspiracy Theorizing

17 September 2025

‘Ask Gemini’ AI will tell you what you missed during a Google Meet call

17 September 2025

Save Big on Our Favorite TCL Televisions

17 September 2025

Microsoft Paint is getting its own Photoshop-like project files

17 September 2025
Facebook X (Twitter) Instagram
  • Privacy
  • Terms
  • Advertise
  • Contact Us
Wednesday, September 17
Facebook X (Twitter) Instagram YouTube
Technophile NewsTechnophile News
Demo
  • Home
  • News
  • PC
  • Phones
  • Android
  • Gadgets
  • Games
  • Guides
  • Accessories
  • Reviews
  • Spotlight
  • More
    • Artificial Intelligence
    • Web Stories
    • Press Release
Technophile NewsTechnophile News
Home » Leak Reveals the Workaday Lives of North Korean IT Scammers
News

Leak Reveals the Workaday Lives of North Korean IT Scammers

By News Room7 August 20253 Mins Read
Facebook Twitter Pinterest LinkedIn Telegram Tumblr Reddit WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Email

The tables show the potential target jobs for IT workers. One sheet, which seemingly includes daily updates, lists job descriptions (“need a new react and web3 developer”), the companies advertising them, and their locations. It also links to the vacancies on freelance websites or contact details for those conducting the hiring. One “status” column says whether they are “waiting” or if there has been “contact.”

Screenshots of one spreadsheet seen by WIRED appears to list the potential real-world names of the IT workers themselves. Alongside each name is a register of the make and model of computer they allegedly have, as well as monitors, hard drives, and serial numbers for each device. The “master boss,” who does not have a name listed, is apparently using a 34-inch monitor and two 500GB hard drives.

One “analysis” page in the data seen by SttyK, the security researcher, shows a list of types of work the group of fraudsters are involved in: AI, blockchain, web scraping, bot development, mobile app and web development, trading, CMS development, desktop app development, and “others.” Each category has a potential budget listed and a “total paid” field. A dozen graphs in one spreadsheet claim to track how much they have been paid, the most lucrative regions to make money from, and whether getting paid weekly, monthly, or as a fixed sum is the most successful.

“It’s professionally run,” says Michael “Barni” Barnhart, a leading North Korean hacking and threat researcher who works for insider threat security firm DTEX. “Everyone has to make their quotas. Everything needs to be jotted down. Everything needs to be noted,” he says. The researcher adds that he has seen similar levels of record keeping with North Korea’s sophisticated hacking groups, which have stolen billions in cryptocurrency in recent years, and are largely separate to IT worker schemes. Barnhart has viewed the data obtained by SttyK and says it overlaps with what he and other researchers were tracking.

“I do think this data is very real,” says Evan Gordenker, a consulting senior manager at the Unit 42 threat intelligence team of cybersecurity company Palo Alto Networks, who has also seen the data SttyK obtained. Gordenker says the firm had been tracking multiple accounts in the data and that one of the prominent GitHub accounts was previously exposing the IT workers’ files publicly. None of the DPRK-linked email addresses responded to WIRED’s requests for comment.

GitHub removed three developer accounts after WIRED got in touch, with Raj Laud, the company’s head of cybersecurity and online safety, saying they have been suspended in line with its “spam and inauthentic activity” rules. “The prevalence of such nation-state threat activity is an industry-wide challenge and a complex issue that we take seriously,” Laud says.

Google declined to comment on specific accounts WIRED provided, citing policies around account privacy and security. “We have processes and policies in place to detect these operations and report them to law enforcement,” says Mike Sinno, director of detection and response at Google. “These processes include taking action against fraudulent activity, proactively notifying targeted organizations, and working with public and private partnerships to share threat intelligence that strengthens defenses against these campaigns.”

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related News

Microsoft’s new Xbox mode on Windows has leaked for any handheld

17 September 2025

The DOGE Subcommittee Hearing on Weather Modification Was a Nest of Conspiracy Theorizing

17 September 2025

‘Ask Gemini’ AI will tell you what you missed during a Google Meet call

17 September 2025

Save Big on Our Favorite TCL Televisions

17 September 2025

Microsoft Paint is getting its own Photoshop-like project files

17 September 2025

WIRED’s Guide to Mushroom Supplements (the Functional Kind)

17 September 2025
Top Articles

iPhone 17 Air Colour Options Hinted in New Leak; Could Launch in Four Shades

10 July 202570 Views

Vivo X Fold 5 Colour Options, Specifications Teased Ahead of India Launch

2 July 202553 Views

Vivo X200 FE With 6,500mAh Battery, MediaTek Dimensity 9300+ SoC Launched: Specifications

23 June 202553 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Don't Miss

WIRED’s Guide to Mushroom Supplements (the Functional Kind)

17 September 2025

From ancient remedies to your Amazon cart, mushroom supplements have traveled a circuitous road. They…

Americans want AI to stay out of their personal lives

17 September 2025

Fired CDC Director Says RFK Jr. Pressured Her to Blindly Approve Vaccine Changes

17 September 2025

Logitech’s Pro X2 Superstrike offers haptic clicks and rapid trigger

17 September 2025
Technophile News
Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2025 Technophile News. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.