Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

NVIDIA and Qualcomm partner with US and Indian VCs to help build India's next deep tech startup

November 5, 2025

Sequoia names Alfred Lin and Pat Grady new co-stewards following Roelof Botha's resignation

November 4, 2025

Report finds mobile phone location data of EU officials being sold

November 4, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Google brings Pixel 6 and new devices to Material3 Expressive, along with other features, to the Pixel 6 and new devices

    September 3, 2025

    Google's NoteBookLM now allows you to customize the tone of your AI podcasts

    September 3, 2025

    Roblox expands the use of age estimation techniques and introduces standardized assessments

    September 3, 2025

    Instagram finally launches the iPad app

    September 3, 2025

    Complete the 2025 Confusion Builder Stage Agenda with the Maximum Scaling Voice

    September 3, 2025
  • Crypto

    Coinbase CEO Brian Armstrong trolls prediction markets

    November 1, 2025

    Solana co-founder Anatoly Yakovenko is a big fan of agent coding

    October 29, 2025

    Disrupt 2025: Day 3 | Tech Crunch

    October 29, 2025

    MoviePass releases fantasy league game Mogul to the public

    October 29, 2025

    Disrupt 2025: Day 2 | Tech Crunch

    October 28, 2025
  • Security

    Report finds mobile phone location data of EU officials being sold

    November 4, 2025

    Lawmakers claim police login information was stolen and Flock's surveillance cameras were exposed to hackers

    November 3, 2025

    How L3 Harris Trentent's former boss stole a cyber exploit and sold it to Russia

    November 3, 2025

    Justice Department accuses US ransomware negotiators of launching their own ransomware attacks

    November 3, 2025

    Hacker breaks into University of Pennsylvania, sends mass email, threatens to leak data

    October 31, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    NVIDIA and Qualcomm partner with US and Indian VCs to help build India's next deep tech startup

    November 5, 2025

    Sequoia names Alfred Lin and Pat Grady new co-stewards following Roelof Botha's resignation

    November 4, 2025

    a16z suspends popular TxO fund for underserved founders, lays off staff

    November 4, 2025

    Elad Gil Who are the winners in the AI ​​market and which ones are still open?

    November 3, 2025

    Alphabet is increasingly launching 'moonshot' projects as an independent company — here's why

    November 3, 2025
TechBrunchTechBrunch

Explain why hackers who exposed the North Korean government did that

TechBrunchBy TechBrunchAugust 21, 20254 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


Earlier this year, two hackers broke into a computer and quickly realized the importance of what this machine is. After all, they landed on the computers of hackers who are allegedly working for the North Korean government.

The two hackers decided to continue digging and found evidence that they linked the hackers to the cyberspion operations carried out by North Korea, exploits and hacking tools, and the infrastructure used in their operations.

Saber, one of the hackers involved, told TechCrunch that he could access the computers of North Korean workers for about four months, but as soon as he understood the data he could access, he realized he had to finally leak it and reveal what he discovered.

“These nation-state hackers are hacking for all the wrong reasons, and I hope many of them get exposed.

There are countless cybersecurity companies and researchers who closely track the North Korean government. Many of its hacking groups include not only spying but increasingly larger crypto robberies, but also the broader operations North Koreans bring as remote workers to fund the administration's nuclear weapons programme.

In this case, Saber and Cyb0RG went a step further and actually hacked the hackers. This could give insight into how these government-backed groups work, or at least a different operation, and as Saber said, “what they do every day, etc.”

Hackers hope to be known only by Handle, Saber and Cyb0RG as they could face retaliation from the North Korean government. Saber says they consider themselves a hacktivist, and he nominated the legendary Hacktivist Phineas Fisher, who was in charge of spyware maker Finfisher and hacking the hacking team as inspiration.

TechCrunch Events

San Francisco | October 27-29, 2025

At the same time, the hackers also understood that what they did was illegal, but they still thought it was important to make it public.

“It would have really not been helpful to keep it for us,” Saber said. “We hope that by letting everything go to the public, we can give researchers some ways to detect them.”

“Hopefully this will lead to the discovery of many of their current victims. [the North Korean hackers] Loss of access,” he said.

“The action brought concrete artifacts to the community, whether illegal or not, and this is even more important,” Cyb0RG said in a message sent through Saber.

Saber said he is confident that the hacker, known as “Kim,” works in the North Korean regime, is actually Chinese and may work for both governments based on the findings that Kim did not work during his Chinese holidays, suggesting that the hackers will be based there.

Also, according to Saber, Kim used Google Translation to translate some Korean documents into simplified Chinese.

Saber said he didn't try to contact Kim. “I don't think he even hears. All he does is empower his leaders, the same leaders who enslaved his people,” he said. “Perhaps he will tell him to use his knowledge in a way that helps people, rather than hurting them. But he lives in constant propaganda and is probably meaningless to him from birth,” refers to the harsh information vacuum that North Korea lives in.

Saber refused to disclose how he and Cyb0RG have access to Kim's computer. The two believe that using the same technique can “get access to several systems on other systems in the same way.”

During their surgery, Saber and Cyb0RG discovered evidence of the aggressive hacking Kim had done against companies in Korea and Taiwan.

North Korean hackers have a history of targeting people who also work in the cybersecurity industry. That's why Saber said he was aware of the risk, but he said he “is not really worried.”

“I can't do much about this, definitely take more attention :),” Saber said.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Report finds mobile phone location data of EU officials being sold

November 4, 2025

Lawmakers claim police login information was stolen and Flock's surveillance cameras were exposed to hackers

November 3, 2025

How L3 Harris Trentent's former boss stole a cyber exploit and sold it to Russia

November 3, 2025

Justice Department accuses US ransomware negotiators of launching their own ransomware attacks

November 3, 2025

Hacker breaks into University of Pennsylvania, sends mass email, threatens to leak data

October 31, 2025

Government hackers infiltrated telecommunications giant Ribbon for months before being arrested

October 31, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

NVIDIA and Qualcomm partner with US and Indian VCs to help build India's next deep tech startup

November 5, 2025

Sequoia names Alfred Lin and Pat Grady new co-stewards following Roelof Botha's resignation

November 4, 2025

Report finds mobile phone location data of EU officials being sold

November 4, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.