• Business
  • Markets
  • Politics
  • Crypto
  • Finance
  • Intelligence
    • Policy Intelligence
    • Security Intelligence
    • Economic Intelligence
    • Fashion Intelligence
  • Energy
  • Technology
  • Taxes
  • Creator Economy
  • Wealth Management
  • LBNN Blueprints
  • Business
  • Markets
  • Politics
  • Crypto
  • Finance
  • Intelligence
    • Policy Intelligence
    • Security Intelligence
    • Economic Intelligence
    • Fashion Intelligence
  • Energy
  • Technology
  • Taxes
  • Creator Economy
  • Wealth Management
  • LBNN Blueprints

Hackers breach and expose a major North Korean spying operation

Simon Osuji by Simon Osuji
August 12, 2025
in Creator Economy
0
Hackers breach and expose a major North Korean spying operation
0
SHARES
3
VIEWS
Share on FacebookShare on Twitter

Hackers claim to have compromised the computer of a North Korean government hacker and leaked its contents online, offering a rare window into a hacking operation by the notoriously secretive nation. 

The two hackers, who go by Saber and cyb0rg, published a report about the breach in the latest issue of Phrack magazine, a legendary cybersecurity e-zine that was first published in 1985. The latest issue was distributed at the Def Con hackers conference in Las Vegas last week.

In the article, the two hackers wrote that they were able to compromise a workstation containing a virtual machine and a virtual private server belonging to the hacker, whom they call “Kim.” The hackers claim Kim works for the North Korean government espionage group known as Kimsuky, also known as APT43 and Thallium. The hackers leaked the stolen data to DDoSecrets, a nonprofit collective that stores leaked datasets in the public interest.

Kimsuky is a prolific advanced persistent threat (APT) group widely believed to be working inside North Korea’s government, targeting journalists and government agencies in South Korea and elsewhere, and other targets that could be of interest for North Korea’s intelligence apparatus. 

As is usual with North Korea, Kimsuky also conducts operations more akin to a cybercriminal group — for example, stealing and laundering cryptocurrencies to fund North Korea’s nuclear weapons program. 

This hack gives an almost-unprecedented look inside the operation of Kimsuky, given that the two hackers compromised one of the group’s members, rather than investigating a data breach as cybersecurity researchers and companies typically have to rely on.

“It shows a glimpse how openly ‘Kimsuky’ cooperates with Chinese [government hackers] and shares their tools and techniques,” the hackers wrote.

An illustration of North Korean dictator Kim Jong-un, which was included in the phrack article.Image Credits:Saber and cyb0rg/Phrack

Obviously, what Saber and cyb0rg did is technically a crime, although they will likely never be prosecuted for it, considering North Korea is sanctioned up to its eyeballs. The two hackers clearly believe Kimsuky members deserve to be exposed and embarrassed.

“Kimsuky, you’re not a hacker. You are driven by financial greed, to enrich your leaders, and to fulfill their political agenda. You steal from others and favour your own. You value yourself above the others: You are morally perverted,” the two wrote in Phrack. “You hack for all the wrong reasons.”

Saber and cyb0rg claim to have found evidence of Kimsuky compromising several South Korean government networks and companies, email addresses, and hacking tools used by the Kimsuky group, internal manuals, passwords, and more data. 

Emails sent to the addresses allegedly belonging to the hackers, which were listed in the research, went unanswered. 

The hackers wrote that they were able to identify Kim as a North Korean government hacker, thanks to “artifacts and hints” that pointed in that direction, including files configurations and domains previously attributed to the North Korean hacking group Kimsuky. 

The hackers also noted Kim’s “strict office hours, always connecting at around 09:00 and disconnecting by 17:00 Pyongyang time.”

Source link

Related posts

India’s AI boom pushes firms to trade near-term revenue for users

India’s AI boom pushes firms to trade near-term revenue for users

February 25, 2026
Google adds a way to create automated workflows to Opal

Google adds a way to create automated workflows to Opal

February 24, 2026
Previous Post

More cameras, more problems? Why deep learning still struggles with 3D human sensing

Next Post

Character.AI Gave Up on AGI. Now It’s Selling Stories

Next Post
Character.AI Gave Up on AGI. Now It’s Selling Stories

Character.AI Gave Up on AGI. Now It’s Selling Stories

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

RECOMMENDED NEWS

Housing Market Caught In A Trap Of High Prices, Expensive Mortgages And Low Inventory

Nigeria Immigration Service Clears Nearly 60,000 Passport Backlog In 4 Days Following Minister’s Directive

2 years ago
Lincoln marks a successful 2024 with strong sales growth in the middle east

Lincoln marks a successful 2024 with strong sales growth in the middle east

1 year ago
Just a small number of malicious files can corrupt LLMs of any size

Just a small number of malicious files can corrupt LLMs of any size

5 months ago
Fans Call on Taylor Swift to ‘Do Better’ After Accusations of Using AI for Promo Videos

Fans Call on Taylor Swift to ‘Do Better’ After Accusations of Using AI for Promo Videos

5 months ago

POPULAR NEWS

  • Ghana to build three oil refineries, five petrochemical plants in energy sector overhaul

    Ghana to build three oil refineries, five petrochemical plants in energy sector overhaul

    0 shares
    Share 0 Tweet 0
  • The world’s top 10 most valuable car brands in 2025

    0 shares
    Share 0 Tweet 0
  • Top 10 African countries with the highest GDP per capita in 2025

    0 shares
    Share 0 Tweet 0
  • Global ranking of Top 5 smartphone brands in Q3, 2024

    0 shares
    Share 0 Tweet 0
  • When Will SHIB Reach $1? Here’s What ChatGPT Says

    0 shares
    Share 0 Tweet 0

Get strategic intelligence you won’t find anywhere else. Subscribe to the Limitless Beliefs Newsletter for monthly insights on overlooked business opportunities across Africa.

Subscription Form

© 2026 LBNN – All rights reserved.

Privacy Policy | About Us | Contact

Tiktok Youtube Telegram Instagram Linkedin X-twitter
No Result
View All Result
  • Home
  • Business
  • Politics
  • Markets
  • Crypto
  • Economics
    • Manufacturing
    • Real Estate
    • Infrastructure
  • Finance
  • Energy
  • Creator Economy
  • Wealth Management
  • Taxes
  • Telecoms
  • Military & Defense
  • Careers
  • Technology
  • Artificial Intelligence
  • Investigative journalism
  • Art & Culture
  • LBNN Blueprints
  • Quizzes
    • Enneagram quiz
  • Fashion Intelligence

© 2023 LBNN - All rights reserved.