HomeCII/OTSecurity Company Unintentionally Recruits North Korean Cybercriminal, Unaware Before Hiring

Security Company Unintentionally Recruits North Korean Cybercriminal, Unaware Before Hiring

Published on

spot_img

A recent incident involving a security firm’s internal AI team took an unexpected turn when a North Korean threat actor infiltrated the company as a software engineer. The individual, identified as “XXXX” in the company’s post, began loading malware onto his company-issued workstation as soon as he received it.

KnowBe4, a company specializing in security awareness and training, conducted thorough background checks and multiple interviews with the individual before hiring him. Despite passing these checks and appearing credible and qualified, it was later discovered that the individual had used a stolen identity and an AI-enhanced photo.

Suspicious activities were detected on the employee’s workstation, prompting KnowBe4’s security operations center to investigate. The employee, however, tried to pass off the activity as troubleshooting a speed issue with his router. Further examination revealed that he was actually engaged in unauthorized activities, prompting the SOC to quarantine his device.

Upon discovering the true identity of the employee, KnowBe4 shared its findings with cybersecurity firm Mandiant and the FBI. It was revealed that the individual was a fake IT worker from North Korea, highlighting the sophisticated tactics employed by threat actors to infiltrate organizations.

Although no data breach occurred due to the quick actions of the security team, the incident served as a learning moment for KnowBe4. The company emphasized the importance of implementing strict access controls and authentication processes, as well as conducting thorough security awareness training for employees.

In light of this incident, KnowBe4 has implemented several process changes to prevent similar occurrences in the future. These include shipping new employee workstations to a nearby UPS shop for ID verification and strengthening access controls and authentication processes.

Other organizations can also take steps to avoid falling victim to similar schemes by scanning remote devices for suspicious activity, improving vetting processes for inconsistencies, and checking for red flags in employee information. By remaining vigilant and proactive, companies can protect themselves from potential threats posed by malicious actors posing as legitimate employees.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...