Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    How to Advocate for Trans Rights in Your Community

    June 8, 2025

    Gears of War: E-Day is coming in 2026

    June 8, 2025

    The Best Home Treadmills to Maintain Your Mileage

    June 8, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » North Korean IT Workers Are Being Exposed on a Massive Scale
    Security

    North Korean IT Workers Are Being Exposed on a Massive Scale

    News RoomBy News RoomMay 17, 20254 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    The young developers are having the time of their lives. They pop open bottles of sparkling wine, eat steak dinners, play soccer together, and lounge around in a luxurious private swimming pool, all of their activity captured in photos that were later exposed online. In one picture, a man poses in front of a life-size Minions cardboard cutout. But despite their exuberance, these are not successful Silicon Valley entrepreneurs; they’re IT workers from the Hermit Kingdom of North Korea, who infiltrate Western companies and send their wages back home.

    Two members of a cluster of North Korean developers, who allegedly operated out of Southeast Asian country Laos before being relocated to Russia by the beginning of 2024, are today being identified by researchers at cybersecurity company DTEX. The men, who DTEX believes have used the personas “Naoki Murano” and “Jenson Collins,” are alleged to have been involved in raising money for the brutal North Korean regime as part of the widespread IT worker epidemic, with Murano alleged to have previously been linked to a $6 million heist at crypto firm DeltaPrime last year.

    For years, Kim Jong Un’s North Korea has posed one of the most sophisticated and dangerous cyber threats to Western countries and businesses, with its hackers stealing the intellectual property needed to develop its own technology, plus looting billions in crypto to evade sanctions and create nuclear weapons. In February, the FBI announced that North Korea had pulled off the biggest ever crypto heist, stealing $1.5 billion from crypto exchange Bybit. Alongside its skilled hackers, Pyongyang’s IT workers, who often are based in China or Russia, trick companies into employing them as remote workers and have become an increasing menace.

    “What we’re doing isn’t working, and if it is working, it’s not working fast enough,” says Michael “Barni” Barnhart, a leading North Korean cyber researcher and principal investigator at DTEX. As well as identifying Murano and Collins, DTEX, in a detailed report about North Korean cyber activity, is also publishing more than 1,000 email addresses that it alleges to have been identified as linked to North Korean IT worker activity. The move is one of the largest disclosures of North Korean IT worker activity to date.

    North Korea’s broad cyber operations can’t be compared with those of other hostile nations, such as Russia and China, Barnhart explains in the DTEX report, as Pyongyang operates like a “state-sanctioned crime syndicate” rather than more traditional military or intelligence operations. Everything is driven by funding the regime, developing weaponry, and gathering information, Barnhart says. “Everything is tied together in some way, shape, or form.”

    The Misfits Move In

    Around 2022 and 2023, DTEX claims both Naoki Murano and Jenson Collins—their real names are not known—were based in Laos and also travelled between Vladivostok, in Russia. The pair appeared among a wider group of possible North Koreans in Laos, and a cache of their photos were first exposed in an open Dropbox folder. The photos were discovered by a collective of North Korean researchers who often collaborate with Barnhart and call themselves a “Misfit” alliance. In recent weeks, they’ve posted numerous images of purported North Korean IT workers online.

    North Korea’s IT workers are prolific in their activities, often trying to infiltrate multiple companies simultaneously by using stolen identities or creating false personas to try to appear legitimate. Some use freelance platforms; others try to recruit international facilitators to run laptop farms. While their online personas may be fake, the country—where millions do not have basic human rights or access to the internet—steers talented children into its education pipeline where they can become skilled developers and hackers. That means many of the IT workers and hackers are likely to know each other, potentially since they were children. Despite being technically adept, they often leave a trail of digital breadcrumbs in their wake.

    Murano was first linked to North Korean operations publicly by cryptocurrency investigator ZachXBT, who published the names, cryptocurrency wallet details, and email addresses of more than 20 North Korean IT workers last year. Murano was then linked to the DeltaPrime heist in reporting by Coinbase in October. Members of the Misfits collective have shared photos of Murano looking pleased with himself while eating steak and a picture of an alleged Japanese passport.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleI Scanned My Skin Before and After Using Shark’s CryoGlow for 8 Weeks. I Was Surprised
    Next Article Google I/O will be an AI show

    Related Posts

    What Really Happened in the Aftermath of the Lizard Squad Hacks

    June 7, 2025

    How the Farm Industry Spied on Animal Rights Activists and Pushed the FBI to Treat Them as Bioterrorists

    June 5, 2025

    The Rise of ‘Vibe Hacking’ Is the Next AI Nightmare

    June 5, 2025

    A GPS Blackout Would Shut Down the World

    June 4, 2025

    You’re Not Ready

    June 4, 2025

    A Hacker May Have Deepfaked Trump’s Chief of Staff in a Phishing Campaign

    June 4, 2025
    Our Picks

    Gears of War: E-Day is coming in 2026

    June 8, 2025

    The Best Home Treadmills to Maintain Your Mileage

    June 8, 2025

    This is how Microsoft is combining Windows and Xbox for handheld PCs

    June 8, 2025

    How to Buy a Bike Helmet

    June 8, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    News

    Vivo’s telephoto extender makes the world’s best phone camera better

    By News RoomJune 8, 2025

    When Xiaomi and Realme both rocked up to February’s Mobile World Congress with concept smartphones…

    Tech Up Your Sourdough With These Upper-Crust Baking Gadgets

    June 8, 2025

    The Verge’s favorite summer gear for 2025

    June 8, 2025

    The Best Read-It-Later Apps for Curating Your Longreads

    June 8, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.