Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot
    Honor’s Robot Phone is a bad robot, an interesting camera, and maybe your friend

    Honor’s Robot Phone is a bad robot, an interesting camera, and maybe your friend

    March 4, 2026
    Tim Sweeney signed away his right to criticize Google until 2032

    Tim Sweeney signed away his right to criticize Google until 2032

    March 4, 2026
    Seven tech giants signed Trump’s pledge to keep electricity costs from spiking around data centers 

    Seven tech giants signed Trump’s pledge to keep electricity costs from spiking around data centers 

    March 4, 2026
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Leak Reveals the Workaday Lives of North Korean IT Scammers
    Security

    Leak Reveals the Workaday Lives of North Korean IT Scammers

    News RoomBy News RoomAugust 11, 20253 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
    Leak Reveals the Workaday Lives of North Korean IT Scammers

    The tables show the potential target jobs for IT workers. One sheet, which seemingly includes daily updates, lists job descriptions (“need a new react and web3 developer”), the companies advertising them, and their locations. It also links to the vacancies on freelance websites or contact details for those conducting the hiring. One “status” column says whether they are “waiting” or if there has been “contact.”

    Screenshots of one spreadsheet seen by WIRED appears to list the potential real-world names of the IT workers themselves. Alongside each name is a register of the make and model of computer they allegedly have, as well as monitors, hard drives, and serial numbers for each device. The “master boss,” who does not have a name listed, is apparently using a 34-inch monitor and two 500GB hard drives.

    One “analysis” page in the data seen by SttyK, the security researcher, shows a list of types of work the group of fraudsters are involved in: AI, blockchain, web scraping, bot development, mobile app and web development, trading, CMS development, desktop app development, and “others.” Each category has a potential budget listed and a “total paid” field. A dozen graphs in one spreadsheet claim to track how much they have been paid, the most lucrative regions to make money from, and whether getting paid weekly, monthly, or as a fixed sum is the most successful.

    “It’s professionally run,” says Michael “Barni” Barnhart, a leading North Korean hacking and threat researcher who works for insider threat security firm DTEX. “Everyone has to make their quotas. Everything needs to be jotted down. Everything needs to be noted,” he says. The researcher adds that he has seen similar levels of record keeping with North Korea’s sophisticated hacking groups, which have stolen billions in cryptocurrency in recent years, and are largely separate to IT worker schemes. Barnhart has viewed the data obtained by SttyK and says it overlaps with what he and other researchers were tracking.

    “I do think this data is very real,” says Evan Gordenker, a consulting senior manager at the Unit 42 threat intelligence team of cybersecurity company Palo Alto Networks, who has also seen the data SttyK obtained. Gordenker says the firm had been tracking multiple accounts in the data and that one of the prominent GitHub accounts was previously exposing the IT workers’ files publicly. None of the DPRK-linked email addresses responded to WIRED’s requests for comment.

    GitHub removed three developer accounts after WIRED got in touch, with Raj Laud, the company’s head of cybersecurity and online safety, saying they have been suspended in line with its “spam and inauthentic activity” rules. “The prevalence of such nation-state threat activity is an industry-wide challenge and a complex issue that we take seriously,” Laud says.

    Google declined to comment on specific accounts WIRED provided, citing policies around account privacy and security. “We have processes and policies in place to detect these operations and report them to law enforcement,” says Mike Sinno, director of detection and response at Google. “These processes include taking action against fraudulent activity, proactively notifying targeted organizations, and working with public and private partnerships to share threat intelligence that strengthens defenses against these campaigns.”

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleJoin Our Next Livestream: What GPT-5 Means for ChatGPT Users
    Next Article Matter’s latest update doubles down on stability and pushes the platforms to play better together

    Related Posts

    Cloudflare Has Blocked 416 Billion AI Bot Requests Since July 1

    Cloudflare Has Blocked 416 Billion AI Bot Requests Since July 1

    December 6, 2025
    The Louisiana Department of Wildlife and Fisheries Is Detaining People for ICE

    The Louisiana Department of Wildlife and Fisheries Is Detaining People for ICE

    December 5, 2025
    Your Data Might Determine How Much You Pay for Eggs

    Your Data Might Determine How Much You Pay for Eggs

    December 4, 2025
    Russia Wants This Mega Missile to Intimidate the West, but It Keeps Crashing

    Russia Wants This Mega Missile to Intimidate the West, but It Keeps Crashing

    December 4, 2025
    This Hacker Conference Installed a Literal Antivirus Monitoring System

    This Hacker Conference Installed a Literal Antivirus Monitoring System

    December 4, 2025
    Flock Uses Overseas Gig Workers to Build Its Surveillance AI

    Flock Uses Overseas Gig Workers to Build Its Surveillance AI

    December 4, 2025
    Our Picks
    Tim Sweeney signed away his right to criticize Google until 2032

    Tim Sweeney signed away his right to criticize Google until 2032

    March 4, 2026
    Seven tech giants signed Trump’s pledge to keep electricity costs from spiking around data centers 

    Seven tech giants signed Trump’s pledge to keep electricity costs from spiking around data centers 

    March 4, 2026
    Epic and Google have signed a special deal for a new class of ‘metaverse’ apps

    Epic and Google have signed a special deal for a new class of ‘metaverse’ apps

    March 4, 2026
    Here’s how Google describes its fee-reducing Apps Experience and Games Level Up programs

    Here’s how Google describes its fee-reducing Apps Experience and Games Level Up programs

    March 4, 2026
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    The new MacBook Air debuts with a  gift card as the M4 model hits its best price News

    The new MacBook Air debuts with a $50 gift card as the M4 model hits its best price

    By News RoomMarch 4, 2026

    Powered by the new M5 chip, Apple’s latest MacBook Airs are more powerful than ever…

    NotebookLM can now summarize research in ‘cinematic’ video overviews

    NotebookLM can now summarize research in ‘cinematic’ video overviews

    March 4, 2026
    Google’s AI-powered workspace is now available to more users in Search

    Google’s AI-powered workspace is now available to more users in Search

    March 4, 2026
    Google isn’t waiting for a settlement — the 30 percent Android app store fee is dead

    Google isn’t waiting for a settlement — the 30 percent Android app store fee is dead

    March 4, 2026
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2026 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.