North Korean perpetrators use fake identities for IT jobs and captured over $ 900,000 in cryptocurrency

Cyberkriminalität: DPRK-verbundene Täter stehlen und waschen über 900.000 Dollar in Kryptowährung In den letzten Jahren hat die Cyberkriminalität weltweit zugenommen, und ein besonders besorgniserregender Trend zeigt sich im Zusammenhang mit Nordkorea. DPRK-verbundene Täter haben es geschafft, in abgelegene IT-Jobs einzusteigen, indem sie gefälschte und gestohlene Identitäten verwendeten. Diese Art der Täuschung ermöglicht es ihnen, ihre …
Cybercrime: DPK-connected perpetrators steal and wash over $ 900,000 in cryptocurrency in recent years has increased cybercrime worldwide, and a particularly worrying trend is shown in connection with North Korea. DPR-connected perpetrators managed to enter remote IT jobs by using fake and stolen identities. This type of deception enables you to ... (Symbolbild/KNAT)

North Korean perpetrators use fake identities for IT jobs and captured over $ 900,000 in cryptocurrency

Cybercrime: steal the DPR-connected perpetrator and wash over $ 900,000 in cryptocurrency

In recent years, cybercrime has increased worldwide, and a particularly worrying trend is shown in connection with North Korea. DPR-connected perpetrators managed to enter remote IT jobs by using fake and stolen identities. This type of deception enables you to carry out your illegal activities undiscovered and to steal and wash considerable sums.

Overall, it is estimated that these criminals have captured over $ 900,000 in cryptocurrency. Crypto transactions are often difficult to track, which makes it easier to blur their traces and wash the stolen money. The use of fake identities for IT positions opens up a number of ways to access different systems and networks, often without the companies thoroughly checking the background of the new employees.

This incident throws a light on the challenges with which companies are confronted when it comes to cyber security and identity examination. While many companies try to improve their security measures, cybercriminals continue to use innovative methods to take advantage of weaknesses.

The situation illustrates the need for companies to deal more intensively with the review of identities and the security of their digital infrastructures. This could be done, for example, by implementing multi -stage identification methods or regular security checks.

In view of these developments, both companies and individuals should be vigilant and inform themselves about the latest trends in cybercrime in order to be better armed against such attacks.