市值: $3.3108T -0.840%
體積(24小時): $101.8321B 28.100%
  • 市值: $3.3108T -0.840%
  • 體積(24小時): $101.8321B 28.100%
  • 恐懼與貪婪指數:
  • 市值: $3.3108T -0.840%
加密
主題
加密植物
資訊
加密術
影片
頭號新聞
加密
主題
加密植物
資訊
加密術
影片
bitcoin
bitcoin

$107167.915651 USD

-1.23%

ethereum
ethereum

$2484.735224 USD

-0.65%

tether
tether

$1.000551 USD

0.03%

xrp
xrp

$2.227485 USD

1.25%

bnb
bnb

$657.234657 USD

0.38%

solana
solana

$153.359085 USD

0.76%

usd-coin
usd-coin

$1.000234 USD

0.03%

tron
tron

$0.279694 USD

1.12%

dogecoin
dogecoin

$0.164283 USD

-2.04%

cardano
cardano

$0.566559 USD

-0.46%

hyperliquid
hyperliquid

$39.355826 USD

-3.77%

bitcoin-cash
bitcoin-cash

$520.939018 USD

3.97%

sui
sui

$2.773602 USD

-2.77%

chainlink
chainlink

$13.247285 USD

-2.04%

unus-sed-leo
unus-sed-leo

$9.098882 USD

-0.71%

加密貨幣新聞文章

朝鮮的網絡情節:通過虛擬搶劫案為武器開發提供資金

2025/07/01 09:23

朝鮮國民因竊取超過90萬美元的虛擬貨幣以資助武器計劃而被起訴。深入了解平壤的非法網絡計劃。

朝鮮的網絡情節:通過虛擬搶劫案為武器開發提供資金

Ever wonder how North Korea keeps its weapons programs afloat? Turns out, they're not just relying on traditional methods. Buckle up, because the U.S. Justice Department just unsealed an indictment that reads like a cyber-thriller.

有沒有想過朝鮮是如何保持其武器計劃的?事實證明,他們不僅依靠傳統方法。扣緊了,因為美國司法部只是宣布了一項像網絡驚悚片一樣的起訴書。

Remote Workers, Real Crimes

遠程工人,真正的犯罪

Four North Korean nationals—Kim Kwang Jin, Kang Tae Bok, Jong Pong Ju, and Chang Nam Il—are in hot water for allegedly posing as remote IT workers to infiltrate U.S. companies. Their mission? Steal virtual currency—over $900,000 worth—and launder it to fund North Korea's weapons and cyber programs. Seriously, who needs banks when you've got blockchain?

四名朝鮮國民 - 金·金·金(Kim Kwang Jin),康·泰·博克(Kang Tae Bok),鄭彭(Jong Pong Ju)和昌南(Chang Nam Il)在熱水中涉嫌冒充偏遠的IT工人來滲透美國公司。他們的使命?竊取虛擬貨幣(價值90萬美元),並洗錢以資助朝鮮的武器和網絡計劃。說真的,當您擁有區塊鏈時,誰需要銀行?

The Modus Operandi

作案手法

These guys weren't exactly amateurs. They used stolen and fabricated personal identities to get hired as IT specialists at blockchain and digital asset companies. Think Catch Me If You Can, but with cryptocurrency. They even traveled to the United Arab Emirates on North Korean passports before setting up shop in the U.S. and abroad.

這些傢伙並不完全是業餘愛好者。他們利用被盜和捏造的個人身份在區塊鍊和數字資產公司的專家中被雇用。如果可以的話,請想抓住我,但是使用加密貨幣。他們甚至在美國和國外開設商店之前,前往朝鮮護照上的阿拉伯聯合酋長國。

Kim Kwang Jin and Jong Pong Ju, using aliases, landed gigs at a blockchain R&D company in Atlanta and a Serbian virtual token company. Classic Trojan horse move. Once inside, they exploited their access to swipe virtual currency. Jong Pong Ju allegedly nabbed $175,000 in February 2022, while Kim Kwang Jin reportedly made off with $740,000 a month later by tweaking smart contracts. Talk about a coding catastrophe for their employers!

金·金·金(Kim Kwang Jin)和鄭彭(Jong Pong Ju)使用別名在亞特蘭大的一家區塊鏈研發公司和塞爾維亞虛擬代幣公司登上演出。經典的特洛伊木馬移動。進入室內後,他們利用了對滑動虛擬貨幣的訪問。據據稱,鐘朱在2022年2月扣押了175,000美元,而金·金·金(Kim Kwang Jin)在一個月後通過調整智能合約以74萬美元的價格賺了74萬美元。談論雇主的編碼災難!

Laundering Like Pros

像專業人士一樣洗錢

To cover their tracks, the stolen funds were laundered through a virtual currency mixer (Tornado Cash, no less!) and then funneled into exchange accounts controlled by Kang Tae Bok and Chang Nam Il. They even used fake Malaysian IDs to open these accounts. It's like a global game of cat and mouse, but with digital dollars.

為了掩蓋他們的賽道,被盜資金通過虛擬貨幣混音器(龍捲風現金,不少!)洗滌,然後將其匯入由Kang Tae Bok和Chang Nam Il控制的交換帳戶。他們甚至使用假的馬來西亞ID來打開這些帳戶。這就像一款全球貓和鼠標遊戲,但具有數字美元。

DPRK RevGen: Domestic Enabler Initiative

DPRK Revgen:國內促進倡議

This isn't just a one-off incident. It's part of the Department of Justice’s DPRK RevGen: Domestic Enabler Initiative, launched in March 2024. The goal? To disrupt North Korea’s global efforts to generate illicit revenue. The program is cracking down on both foreign actors and their U.S.-based enablers.

這不僅僅是一次一次事件。它是司法部DPRK Revgen的一部分:國內促進倡議,於2024年3月發起。目標?破壞朝鮮為產生非法收入的全球努力。該計劃正在打擊外國演員及其基於美國的推動者。

The FBI's Warning

聯邦調查局的警告

The FBI is urging companies to be extra cautious when hiring remote IT workers, especially blockchain developers. These individuals often use fake names, IDs, and social media accounts to get hired. So, if someone seems too good to be true, they probably are.

聯邦調查局(FBI)敦促公司在僱用遠程IT工人(尤其是區塊鏈開發人員)時要特別謹慎。這些人經常使用假名,ID和社交媒體帳戶被錄用。因此,如果某人似乎太好了,那麼他們可能是。

My Take

我的看法

This whole situation is a stark reminder of how sophisticated North Korea's cyber operations have become. They're not just hacking for the heck of it; they're strategically targeting companies to fund their weapons programs. It's a serious threat that requires serious attention from both the public and private sectors. Companies need to beef up their security measures and be vigilant about who they're hiring. The stakes are simply too high to ignore. After all, it appears these remote jobs are nothing more than a front for illicit activities.

整個情況都清楚地提醒了朝鮮的網絡業務。他們不僅僅是為之攻擊。他們在戰略上針對公司來資助其武器計劃。這是一個嚴重的威脅,需要公共部門和私營部門的嚴重關注。公司需要加強安全措施,並對他們僱用的人保持警惕。賭注太高而無法忽略。畢竟,這些遠程工作似乎不過是非法活動的陣線。

So, next time you're interviewing a remote IT candidate, maybe ask for a little more than just a code sample. You know, just to be safe. And remember, stay vigilant, folks! You never know who might be lurking behind that Zoom screen.

因此,下次您採訪遠程IT候選人時,也許不僅要求代碼樣本。你知道,只是為了安全。記住,請保持警惕,伙計們!您永遠不知道誰可能潛伏在縮放屏幕後面。

免責聲明:info@kdj.com

所提供的資訊並非交易建議。 kDJ.com對任何基於本文提供的資訊進行的投資不承擔任何責任。加密貨幣波動性較大,建議您充分研究後謹慎投資!

如果您認為本網站使用的內容侵犯了您的版權,請立即聯絡我們(info@kdj.com),我們將及時刪除。

2025年07月01日 其他文章發表於