![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
朝鮮國民因竊取超過90萬美元的虛擬貨幣以資助武器計劃而被起訴。深入了解平壤的非法網絡計劃。
Ever wonder how North Korea keeps its weapons programs afloat? Turns out, they're not just relying on traditional methods. Buckle up, because the U.S. Justice Department just unsealed an indictment that reads like a cyber-thriller.
有沒有想過朝鮮是如何保持其武器計劃的?事實證明,他們不僅依靠傳統方法。扣緊了,因為美國司法部只是宣布了一項像網絡驚悚片一樣的起訴書。
Remote Workers, Real Crimes
遠程工人,真正的犯罪
Four North Korean nationals—Kim Kwang Jin, Kang Tae Bok, Jong Pong Ju, and Chang Nam Il—are in hot water for allegedly posing as remote IT workers to infiltrate U.S. companies. Their mission? Steal virtual currency—over $900,000 worth—and launder it to fund North Korea's weapons and cyber programs. Seriously, who needs banks when you've got blockchain?
四名朝鮮國民 - 金·金·金(Kim Kwang Jin),康·泰·博克(Kang Tae Bok),鄭彭(Jong Pong Ju)和昌南(Chang Nam Il)在熱水中涉嫌冒充偏遠的IT工人來滲透美國公司。他們的使命?竊取虛擬貨幣(價值90萬美元),並洗錢以資助朝鮮的武器和網絡計劃。說真的,當您擁有區塊鏈時,誰需要銀行?
The Modus Operandi
作案手法
These guys weren't exactly amateurs. They used stolen and fabricated personal identities to get hired as IT specialists at blockchain and digital asset companies. Think Catch Me If You Can, but with cryptocurrency. They even traveled to the United Arab Emirates on North Korean passports before setting up shop in the U.S. and abroad.
這些傢伙並不完全是業餘愛好者。他們利用被盜和捏造的個人身份在區塊鍊和數字資產公司的專家中被雇用。如果可以的話,請想抓住我,但是使用加密貨幣。他們甚至在美國和國外開設商店之前,前往朝鮮護照上的阿拉伯聯合酋長國。
Kim Kwang Jin and Jong Pong Ju, using aliases, landed gigs at a blockchain R&D company in Atlanta and a Serbian virtual token company. Classic Trojan horse move. Once inside, they exploited their access to swipe virtual currency. Jong Pong Ju allegedly nabbed $175,000 in February 2022, while Kim Kwang Jin reportedly made off with $740,000 a month later by tweaking smart contracts. Talk about a coding catastrophe for their employers!
金·金·金(Kim Kwang Jin)和鄭彭(Jong Pong Ju)使用別名在亞特蘭大的一家區塊鏈研發公司和塞爾維亞虛擬代幣公司登上演出。經典的特洛伊木馬移動。進入室內後,他們利用了對滑動虛擬貨幣的訪問。據據稱,鐘朱在2022年2月扣押了175,000美元,而金·金·金(Kim Kwang Jin)在一個月後通過調整智能合約以74萬美元的價格賺了74萬美元。談論雇主的編碼災難!
Laundering Like Pros
像專業人士一樣洗錢
To cover their tracks, the stolen funds were laundered through a virtual currency mixer (Tornado Cash, no less!) and then funneled into exchange accounts controlled by Kang Tae Bok and Chang Nam Il. They even used fake Malaysian IDs to open these accounts. It's like a global game of cat and mouse, but with digital dollars.
為了掩蓋他們的賽道,被盜資金通過虛擬貨幣混音器(龍捲風現金,不少!)洗滌,然後將其匯入由Kang Tae Bok和Chang Nam Il控制的交換帳戶。他們甚至使用假的馬來西亞ID來打開這些帳戶。這就像一款全球貓和鼠標遊戲,但具有數字美元。
DPRK RevGen: Domestic Enabler Initiative
DPRK Revgen:國內促進倡議
This isn't just a one-off incident. It's part of the Department of Justice’s DPRK RevGen: Domestic Enabler Initiative, launched in March 2024. The goal? To disrupt North Korea’s global efforts to generate illicit revenue. The program is cracking down on both foreign actors and their U.S.-based enablers.
這不僅僅是一次一次事件。它是司法部DPRK Revgen的一部分:國內促進倡議,於2024年3月發起。目標?破壞朝鮮為產生非法收入的全球努力。該計劃正在打擊外國演員及其基於美國的推動者。
The FBI's Warning
聯邦調查局的警告
The FBI is urging companies to be extra cautious when hiring remote IT workers, especially blockchain developers. These individuals often use fake names, IDs, and social media accounts to get hired. So, if someone seems too good to be true, they probably are.
聯邦調查局(FBI)敦促公司在僱用遠程IT工人(尤其是區塊鏈開發人員)時要特別謹慎。這些人經常使用假名,ID和社交媒體帳戶被錄用。因此,如果某人似乎太好了,那麼他們可能是。
My Take
我的看法
This whole situation is a stark reminder of how sophisticated North Korea's cyber operations have become. They're not just hacking for the heck of it; they're strategically targeting companies to fund their weapons programs. It's a serious threat that requires serious attention from both the public and private sectors. Companies need to beef up their security measures and be vigilant about who they're hiring. The stakes are simply too high to ignore. After all, it appears these remote jobs are nothing more than a front for illicit activities.
整個情況都清楚地提醒了朝鮮的網絡業務。他們不僅僅是為之攻擊。他們在戰略上針對公司來資助其武器計劃。這是一個嚴重的威脅,需要公共部門和私營部門的嚴重關注。公司需要加強安全措施,並對他們僱用的人保持警惕。賭注太高而無法忽略。畢竟,這些遠程工作似乎不過是非法活動的陣線。
So, next time you're interviewing a remote IT candidate, maybe ask for a little more than just a code sample. You know, just to be safe. And remember, stay vigilant, folks! You never know who might be lurking behind that Zoom screen.
因此,下次您採訪遠程IT候選人時,也許不僅要求代碼樣本。你知道,只是為了安全。記住,請保持警惕,伙計們!您永遠不知道誰可能潛伏在縮放屏幕後面。
免責聲明:info@kdj.com
所提供的資訊並非交易建議。 kDJ.com對任何基於本文提供的資訊進行的投資不承擔任何責任。加密貨幣波動性較大,建議您充分研究後謹慎投資!
如果您認為本網站使用的內容侵犯了您的版權,請立即聯絡我們(info@kdj.com),我們將及時刪除。
-
- 比特幣,bitfinex和加速度:解碼加密十字路口
- 2025-07-01 12:50:11
- 探索比特幣的價格動力,Bitfinex分析師的見解以及加密貨幣的加速趨勢,從ETF流入到AI集成。
-
-
- BNB連鎖店的Maxwell升級:次秒塊和整個Lotta速度!
- 2025-07-01 13:10:12
- BNB連鎖店的Maxwell升級是現場直播,削減了塊時間並提高了性能。了解這種技術飛躍如何搖動一切!
-
- 比特幣,以太坊,加密貨幣下降?不,只是紐約!
- 2025-07-01 13:10:12
- 加密貨幣天空落下嗎?比特幣和以太坊搖擺不定,但不要驚慌!我們正在研究導致蘸醬的原因,是該購買蘸醬還是跑去山丘了。
-
- CoinPass:英國企業的金標準加密平台
- 2025-07-01 12:30:12
- CoinPass是由Oanda支持的英國業務的領先加密平台,提供法規合規性,機構服務和未來的解決方案。
-
-
-
-
- 仲裁(ARB)價格預測:Robinhood列出燃料會突破嗎?
- 2025-07-01 12:55:12
- 分析索引的(ARB)最近的價格上漲,這是關於謠言的謠言。深入研究技術分析,市場情緒和潛在上升空間。