Close Menu
Beverly Hills Examiner

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Babies start showing empathy even before they can speak

    May 18, 2025

    Inside The Hollywood Reporter’s ‘Die, My Love’ Cannes Premiere Party

    May 18, 2025

    ‘Pioneer Woman’ Ree Drummond’s Daughter Paige Is Married

    May 18, 2025
    Facebook X (Twitter) Instagram
    Beverly Hills Examiner
    • Home
    • US News
    • Politics
    • Business
    • Science
    • Technology
    • Lifestyle
    • Music
    • Television
    • Film
    • Books
    • Contact
      • About
      • Amazon Disclaimer
      • DMCA / Copyrights Disclaimer
      • Terms and Conditions
      • Privacy Policy
    Beverly Hills Examiner
    Home»Technology»North Korean IT Workers Are Infiltrating Tech Companies
    Technology

    North Korean IT Workers Are Infiltrating Tech Companies

    By AdminMay 21, 2022
    Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    North Korean IT Workers Are Infiltrating Tech Companies


    As Russia’s full-scale war in Ukraine heads towards its hundredth day, opposition from Ukrainian forces is as strong as ever. At the same time, hacktivists all around the world continue to breach Russian institutions and publish their files and emails. This week one hacktivist collective took a different—and slightly peculiar—approach: launching a service to prank-call Russian government officials. The new website uses leaked details to put two random Russian officials on a call with each other. It obviously won’t make any difference to the outcome of the war, but the group that created it hopes the tool will cause some confusion and annoy those in Moscow.

    New research from Google’s Threat Analysis Group has delved into the surveillance-for-hire industry and found that spyware vendors are targeting Android devices with zero-day exploits. State-sponsored actors in Egypt, Armenia, Greece, Madagascar, Côte d’Ivoire, Serbia, Spain, and Indonesia have all purchased hacking tools from the North Macedonian firm Cytrox, the Google team says. The malware has used five previously unknown Android exploits, alongside unpatched vulnerabilities. Overall, Google’s researchers say they’re tracking more than 30 surveillance-for-hire firms around the world.

    In other malware news, academics at Germany’s Technical University of Darmstadt have figured out a way to track an iPhone’s location even when it is turned off. When you switch your iPhone off it doesn’t fully power down—instead chips inside run in a low-power mode. The researchers were able to run malware that can track the phone in this low-power mode. They believe their work is the first of its kind, but the method is unlikely to be much of a threat in the real world, as it first requires jailbreaking the targeted iPhone, which has generally become harder to do in recent years.

    But wait, there’s more. We’ve rounded up all the news that we didn’t break or cover in depth this week. Click on the headlines to read the full stories. And stay safe out there.

    International sanctions imposed against North Korea, for its continued development of nuclear weapons and ballistic missiles, mean the nation can’t trade with other countries or bring outside money within its borders. To get around this, in recent years Pyongyang has allowed its state-affiliated hackers to raid cryptocurrency platforms and rob banks. Now the FBI, the US Department of State, and the US Treasury have warned that thousands of North Korea’s IT workers—including app and software developers—have been freelancing at businesses around the world and sending money home. Many of them are based in China or Russia, the officials say. The risks of hiring North Korean workers range from “theft of intellectual property, data, and funds to reputational harm and legal consequences, including sanctions under both US and United Nations authorities.”

    In a significant public move, the US Department of Justice says it will stop prosecuting security researchers under the Computer Fraud and Abuse Act. “Computer security research is a key driver of improved cybersecurity,” deputy attorney general Lisa Monaco said in a statement. For years the anti-hacking CFFA law has been criticized for its broad scope and its potential to be abused by prosecutors. While the DOJ’s explicit shift in policy will be welcomed by researchers, as Motherboard reports, the policy doesn’t go far enough and still can put legitimate researchers at risk.

    The mostly Russia-based Conti ransomware gang has had a dreadful few months. After backing Vladimir Putin’s war in Ukraine, thousands of its internal messages and innermost secrets were published online. While the gang has continued to target victims, including Costa Rica’s government, researchers now say Conti has officially shut down its operations. Conti’s Tor admin panels have been taken offline, and the group’s members are splintering off into other ransomware groups, according to security firm Advanced Intel. The shutdown comes after the US government offered a $15 million reward for information about Conti’s members.

    Canada has become the final country in the Five Eyes intelligence group—which also includes the US, UK, Australia, and New Zealand—to ban the use of Huawei’s telecoms equipment in its 5G networks. Fellow Chinese telecom firm ZTE is also included in the ban. The Canadian government, in an announcement, cited national security concerns and the fact that companies could be forced to comply with orders from “foreign governments.” Starting in September, Canadian firms will be banned from buying new 4G and 5G equipment from the Chinese companies. They must remove all existing 5G equipment by the summer of 2024, and 4G equipment must be removed by the end of 2027.



    Original Source Link

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Previous ArticleCause of Covid’s mysterious bloody symptom found
    Next Article Are your table manners up to snuff? Etiquette expert calls out 12 tacky habits

    RELATED POSTS

    5 Best Folding Phones (2025), Tested and Reviewed

    May 18, 2025

    Epic Games asks judge to force Apple to approve Fortnite

    May 17, 2025

    ‘Fortnite’ Players Are Already Making AI Darth Vader Swear

    May 17, 2025

    TechCrunch and VivaTech partner for the VivaTech Innovation of the Year

    May 16, 2025

    The Middle East Has Entered the AI Group Chat

    May 16, 2025

    Google rolls out new AI and accessibility features to Android and Chrome

    May 15, 2025
    latest posts

    Babies start showing empathy even before they can speak

    Children can display empathy before they are old enough to talkMStudioImages/Getty Images Children between 9…

    Inside The Hollywood Reporter’s ‘Die, My Love’ Cannes Premiere Party

    May 18, 2025

    ‘Pioneer Woman’ Ree Drummond’s Daughter Paige Is Married

    May 18, 2025

    U.S. Bans Travel to North Korea Again—Here’s Why Americans Still Can’t Visit

    May 18, 2025

    Book Riot’s Deals of the Day for May 18, 2025

    May 18, 2025

    Foo Fighters and Drummer Josh Freese Part Ways

    May 18, 2025

    New York Republican floats higher tax rate to pay for SALT

    May 18, 2025
    Categories
    • Books (523)
    • Business (5,426)
    • Film (5,364)
    • Lifestyle (3,469)
    • Music (5,417)
    • Politics (5,412)
    • Science (4,775)
    • Technology (5,360)
    • Television (5,037)
    • Uncategorized (1)
    • US News (5,414)
    popular posts

    The New Gods of Weather Can Make Rain on Demand—or So They Want You to Believe

    It was questionable how much credit they could take. They had arrived in Texas right…

    This Ancient Sea Cow Was Killed by a Croc and Eaten by a Shark

    August 29, 2024

    ABBA Voyage’s creators on how it was made – and what’s next

    May 28, 2022

    Benefits Of Working With Study Abroad UK Consultants

    November 5, 2022
    Archives
    Browse By Category
    • Books (523)
    • Business (5,426)
    • Film (5,364)
    • Lifestyle (3,469)
    • Music (5,417)
    • Politics (5,412)
    • Science (4,775)
    • Technology (5,360)
    • Television (5,037)
    • Uncategorized (1)
    • US News (5,414)
    About Us

    We are a creativity led international team with a digital soul. Our work is a custom built by the storytellers and strategists with a flair for exploiting the latest advancements in media and technology.

    Most of all, we stand behind our ideas and believe in creativity as the most powerful force in business.

    What makes us Different

    We care. We collaborate. We do great work. And we do it with a smile, because we’re pretty damn excited to do what we do. If you would like details on what else we can do visit out Contact page.

    Our Picks

    Foo Fighters and Drummer Josh Freese Part Ways

    May 18, 2025

    New York Republican floats higher tax rate to pay for SALT

    May 18, 2025

    Border Patrol Applications Hit Record High – Everyone Wants To Be A Border Agent Now!

    May 18, 2025
    © 2025 Beverly Hills Examiner. All rights reserved. All articles, images, product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Terms & Conditions and Privacy Policy.

    Type above and press Enter to search. Press Esc to cancel.

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
    CookieDurationDescription
    cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
    cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
    cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
    cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
    cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
    viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
    Functional
    Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
    Performance
    Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
    Analytics
    Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
    Advertisement
    Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
    Others
    Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
    SAVE & ACCEPT