![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
司法部正在加大努力,以打擊正在竊取加密貨幣為政權資助的朝鮮網絡犯罪分子。這是最新的。
Hold onto your hats, folks! The DOJ is on the case, cracking down on North Korea's sneaky crypto heists. These cyber crooks are using every trick in the book to steal digital dough, and Uncle Sam isn't having it.
抓住你的帽子,伙計們!司法部正在案件中,打擊了朝鮮的偷偷摸摸的加密搶劫。這些網絡騙子正在使用書中的所有技巧來竊取數字麵團,而Sam叔叔沒有。
The Scheme: Fake IDs and Stolen Crypto
該方案:假ID和被盜的加密貨幣
So, here's the deal: North Korean nationals are posing as remote IT workers, infiltrating blockchain companies, and draining crypto wallets faster than you can say 'Bitcoin.' They're using fake identities and stolen personal info to land these gigs, all to fund the North Korean regime.
因此,這就是交易:朝鮮國民作為遠程IT工人,滲透區塊鏈公司的擺姿勢,並耗盡加密錢包的速度比您說的“比特幣”更快。他們使用虛假身份並偷走了個人信息來召集這些演出,所有這些都為朝鮮政權提供資金。
Take the case of Kim Kwang Jin, Kang Tae Bok, Jong Pong Ju, and Chang Nam Il. These guys allegedly stole nearly $1 million in crypto from American and international blockchain companies. They got jobs at an Atlanta-based blockchain startup and a Serbian virtual token company, then used their access to siphon off the funds. Jong swiped $175,000 in February 2022, and Kim followed up with another $740,000 a month later.
以金·金·金(Kim Kwang Jin),Kang Tae Bok,Jong Pong Ju和Chang Nam Il為例。據稱,這些傢伙從美國和國際區塊鏈公司那裡偷走了將近100萬美元的加密貨幣。他們在亞特蘭大的一家區塊鏈創業公司和一家塞爾維亞虛擬代幣公司找到了工作,然後利用他們從資金中獲得Siphon的訪問權限。鐘在2022年2月刷了175,000美元,而金在一個月後又又賺了74萬美元。
Laundering the Loot
洗牌
But wait, it gets better. The stolen funds were laundered through crypto mixers and sent through exchange accounts opened with fake Malaysian IDs. These guys are practically writing the playbook for cybercrime.
但是等等,它會變得更好。被盜的資金通過加密混音器洗錢,並通過帶有假馬來西亞ID的交換帳戶發送。這些傢伙實際上是在編寫網絡犯罪的劇本。
Microsoft Steps In
Microsoft步驟
It's not just the DOJ fighting back. Microsoft has suspended 3,000 consumer-grade Outlook and Hotmail accounts linked to suspected North Korean IT worker schemes. They're even alerting customers to these incidents, tracking the activity under names like Jasper Sleet and Moonstone Sleet.
不僅是司法部戰鬥。微軟已暫停了3,000個消費級展望和與可疑朝鮮IT工人計劃相關的Hotmail帳戶。他們甚至會警告顧客發生這些事件,以賈斯珀雨夾雪和月球雨夾雪之類的名字跟踪活動。
The DOJ's Response: DPRK RevGen
司法部的回答:dprk revgen
The DOJ isn't sitting idly by. They've launched the DPRK RevGen: Domestic Enabler Initiative, targeting North Korea’s illicit revenue streams. Federal agents have conducted raids across 16 states, seizing financial accounts, fraudulent websites, and computers used by North Korean operatives posing as US citizens. They were funneling millions to Pyongyang and even accessing sensitive military data. Yikes!
司法部並沒有閒著。他們發起了DPRK Revgen:國內促進倡議,針對朝鮮的非法收入來源。聯邦代理商在16個州進行了突襲,奪取了朝鮮特工使用的美國公民的財務賬戶,欺詐性網站和計算機。他們正在向平壤匯集數百萬美元,甚至訪問敏感的軍事數據。是的!
AI to the Rescue (for the Bad Guys)
AI進行營救(對於壞人)
And get this: these fraudsters are using AI to polish fake resumes, manipulate images, and even experiment with voice-changing software. Talk about high-tech crime!
並得到這個:這些欺詐者正在使用AI來拋光偽造簡歷,操縱圖像,甚至可以嘗試改變語音的軟件。談論高科技犯罪!
The Big Picture
大局
This isn't just about a few bad apples. It's a systemic effort by North Korea to exploit the crypto industry for financial gain. These IT contractors sometimes act as front-line operators for state-sponsored hacking units like the Lazarus Group, which was behind the $600 million Ronin Bridge hack in 2022.
這不僅僅是一些壞蘋果。這是朝鮮的系統性努力,以利用加密貨幣行業以獲取經濟利益。這些IT承包商有時充當國家贊助的黑客黑客部隊等前線運營商,例如Lazarus Group,該部門落後於2022年6億美元的Ronin Bridge Hack。
What Can You Do?
你能做什麼?
Microsoft has published a lengthy list of tips for companies to investigate, monitor, and remediate these threats. The key is to be vigilant and implement robust verification processes.
微軟已經發布了一份冗長的技巧清單,以調查,監視和補救這些威脅。關鍵是要保持警惕並實施強大的驗證過程。
The Takeaway
外賣
The DOJ is sending a clear message: cybercrime won't be tolerated. As FBI special agent Paul Brown put it, "North Korean operatives used false identities to infiltrate companies and steal digital assets to fund their regime. The FBI is committed to exposing these threats.”
司法部正在發送明確的消息:網絡犯罪將無法容忍。正如聯邦調查局特工保羅·布朗(Paul Brown)所說:“朝鮮特工使用虛假身份滲透公司並竊取數字資產來資助其政權。聯邦調查局致力於暴露這些威脅。”
So, stay sharp, folks! Keep an eye on your crypto wallets, and let's hope the DOJ continues to keep these cyber crooks on their toes. After all, nobody wants their digital treasures funding nefarious activities. Until next time, stay safe and keep your crypto locked down!
所以,保持敏銳,伙計們!請密切關注您的加密錢包,並希望司法部能繼續將這些網絡騙子保持在腳趾上。畢竟,沒有人希望他們的數字寶藏為邪惡的活動提供資金。直到下一次,請保持安全並保持加密貨幣鎖定!
免責聲明:info@kdj.com
所提供的資訊並非交易建議。 kDJ.com對任何基於本文提供的資訊進行的投資不承擔任何責任。加密貨幣波動性較大,建議您充分研究後謹慎投資!
如果您認為本網站使用的內容侵犯了您的版權,請立即聯絡我們(info@kdj.com),我們將及時刪除。
-
-
-
-
-
-
- Pi Coin的艱難之旅:支持水平,恢復時間表以及專家所說的話
- 2025-07-02 01:10:12
- PI硬幣是籃板的嗎?專家們權衡了關鍵支持水平,潛在的恢復時間表以及USD1的驚人影響。
-
- XRP,SOL和ETF發射嗡嗡聲:紐約有什麼交易?
- 2025-07-02 02:35:12
- XRP和Solana正在通過潛在的ETF啟動和關鍵集成進行波浪。獲取最新進展及其對您意味著什麼的內部獨家新聞。
-
-