HomeCII/OTSecurity Company Unintentionally Recruits North Korean Cybercriminal, Unaware Before Hiring

Security Company Unintentionally Recruits North Korean Cybercriminal, Unaware Before Hiring

Published on

spot_img

A recent incident involving a security firm’s internal AI team took an unexpected turn when a North Korean threat actor infiltrated the company as a software engineer. The individual, identified as “XXXX” in the company’s post, began loading malware onto his company-issued workstation as soon as he received it.

KnowBe4, a company specializing in security awareness and training, conducted thorough background checks and multiple interviews with the individual before hiring him. Despite passing these checks and appearing credible and qualified, it was later discovered that the individual had used a stolen identity and an AI-enhanced photo.

Suspicious activities were detected on the employee’s workstation, prompting KnowBe4’s security operations center to investigate. The employee, however, tried to pass off the activity as troubleshooting a speed issue with his router. Further examination revealed that he was actually engaged in unauthorized activities, prompting the SOC to quarantine his device.

Upon discovering the true identity of the employee, KnowBe4 shared its findings with cybersecurity firm Mandiant and the FBI. It was revealed that the individual was a fake IT worker from North Korea, highlighting the sophisticated tactics employed by threat actors to infiltrate organizations.

Although no data breach occurred due to the quick actions of the security team, the incident served as a learning moment for KnowBe4. The company emphasized the importance of implementing strict access controls and authentication processes, as well as conducting thorough security awareness training for employees.

In light of this incident, KnowBe4 has implemented several process changes to prevent similar occurrences in the future. These include shipping new employee workstations to a nearby UPS shop for ID verification and strengthening access controls and authentication processes.

Other organizations can also take steps to avoid falling victim to similar schemes by scanning remote devices for suspicious activity, improving vetting processes for inconsistencies, and checking for red flags in employee information. By remaining vigilant and proactive, companies can protect themselves from potential threats posed by malicious actors posing as legitimate employees.

Source link

Latest articles

Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks...

A New Wave of Finance-Themed Scams

 The hyperconnected world has made it easier than ever for businesses and consumers...

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...

Hamas-Linked Hackers Probe Middle Eastern Diplomats

 A cyber threat group affiliated with Hamas has been conducting espionage across the...

More like this

Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks...

A New Wave of Finance-Themed Scams

 The hyperconnected world has made it easier than ever for businesses and consumers...

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...