News Gist .News

Articles | Politics | Finance | Stocks | Crypto | AI | Technology | Science | Gaming | PC Hardware | Laptops | Smartphones | Archive

North Korean Fake Job Hackers Are Going the Extra Mile to Make Sure Their Scams Seem Legit

Researchers have uncovered a network of fake identities created by North Korean cybercriminals, all looking for software development work in Asia and the West. The goal is to earn money to fund Pyongyang's ballistic missile and nuclear weapons development programs. By creating these fake personas, hackers are able to gain access to companies' back ends, steal sensitive data, or even get paid.

See Also

North Korean Hackers Cash Out Hundreds of Millions From $1.5bn ByBit Hack Δ1.79

Hackers have successfully laundered at least $300m of their record-breaking $1.5bn crypto heist, leaving only unrecoverable funds in the process. The infamous Lazarus Group, thought to be working for the North Korean regime, is believed to be working nearly 24 hours a day to confuse the money trail and convert the digital tokens into usable cash. ByBit has replenished some of the stolen coins with loans from investors but is waging war on Lazarus.

China’s Government Hacks US Organizations for Financial Gain Δ1.76

The Department of Justice has criminally charged 12 Chinese nationals for their involvement in hacking over 100 US organizations, including the Treasury, with the goal of selling stolen data to China's government and other entities. The hackers used various tactics, including exploiting email inboxes and managing software, to gain access to sensitive information. China's government allegedly paid "handsomely" for the stolen data.

Hackers Launder Most of Bybit's Stolen Crypto Worth $1.4B Δ1.76

The hackers who stole around $1.4 billion in cryptocurrency from crypto exchange Bybit have moved nearly all of the robbed proceeds and converted them into Bitcoin, in what experts call the first phase of the money-laundering operation. This digital heist is considered one of the largest in history, with blockchain monitoring firms and researchers accusing the North Korean government of being behind it. The hackers' ability to launder the funds quickly highlights the challenges for investigators trying to track down the stolen cryptocurrency.

Fbi Says North Korean Lazarus Hackers Were Behind $1.5 Billion Bybit Crypto Hack Δ1.75

The FBI has linked the notorious North Korean Lazarus Group to a record-breaking $1.5 billion cryptocurrency theft from Bybit, with the funds currently being laundered to hinder tracing efforts. The cyberattack was carried out by the TraderTraitor actors, who swiftly converted the stolen assets into Bitcoin and other virtual currencies, dispersed across thousands of addresses on multiple blockchains. The largest crypto theft in history has significant implications for the global cryptocurrency market and its security.

US Indictments of Chinese Hackers Raise Global Concerns About Cybersecurity Δ1.75

The U.S. government has indicted a slew of alleged Chinese hackers, sanctioned a Chinese tech company, and offered a $10 million bounty for information on a years-long spy campaign that targeted victims across America and around the world. The indictment accuses 10 people of collaborating to steal data from their targets, including the U.S. Defense Intelligence Agency, foreign ministries, news organizations, and religious groups. The alleged hacking scheme is believed to have generated significant revenue for Chinese intelligence agencies.

US Charges Chinese Hackers Who Targeted Government Dissidents Δ1.74

The Justice Department has indicted 12 Chinese nationals for their involvement in a hacking operation that allegedly sold sensitive data of US-based dissidents to the Chinese government, with payments reportedly ranging from $10,000 to $75,000 per hacked email account. This operation, described as state-sponsored, also extended its reach to US government agencies and foreign ministries in countries such as Taiwan, India, South Korea, and Indonesia. The charges highlight ongoing cybersecurity tensions and the use of cyber mercenaries to conduct operations that undermine both national security and the privacy of individuals critical of the Chinese government.

Fbi Says North Korea 'Responsible' For $1.4 Billion Bybit Heist Δ1.74

The FBI has attributed the recent $1.4 billion hack of the cryptocurrency exchange Bybit to a North Korean hacking group known as TraderTraitor, emphasizing the group's rapid conversion of stolen assets into various cryptocurrencies. This hack, which involved the theft of over 401,000 Ethereum, highlights the ongoing security challenges in the crypto space, as criminals exploit vulnerabilities for massive financial gain. Bybit is actively working to trace the stolen funds and has offered a substantial bounty to aid in the recovery efforts.

Deepfakes Scam YouTube Creators with AI-Generated Videos Δ1.73

YouTube creators have been targeted by scammers using AI-generated deepfake videos to trick them into giving up their login details. The fake videos, including one impersonating CEO Neal Mohan, claim there's a change in the site's monetization policy and urge recipients to click on links that lead to phishing pages designed to steal user credentials. YouTube has warned users about these scams, advising them not to click on unsolicited links or provide sensitive information.

Chinese Hackers-for-Hire Linked to Treasury Breach Charged by Justice Department Δ1.73

The Department of Justice has announced criminal charges against 12 Chinese government-linked hackers who are accused of hacking more than 100 American organizations, including the U.S. Treasury, over the course of a decade. The charged individuals all played a “key role” in China’s hacker-for-hire ecosystem, targeting organizations for the purposes of “suppressing free speech and religious freedoms.” The Justice Department has also confirmed that two of the indicted individuals are linked to the China government-backed hacking group APT27.

Protecting Yourself From Vishing Attacks Surged 442% Last Year Δ1.73

Vishing attacks have skyrocketed, with CrowdStrike tracking at least six campaigns in which attackers pretended to be IT staffers to trick employees into sharing sensitive information. The security firm's 2025 Global Threat Report revealed a 442% increase in vishing attacks during the second half of 2024 compared to the first half. These attacks often use social engineering tactics, such as help desk social engineering and callback phishing, to gain remote access to computer systems.

The Rise of Career Catfishing: A New Trend Among Young Aussies Δ1.73

Gen Z workers are resorting to "career catfishing" by accepting job offers but not showing up on their first day, leaving employers in the dark and potentially damaging their professional reputations. This trend is seen as a response to the widespread ghosting of job seekers, who feel they're being left in the dark during the hiring process. As more young workers adopt this tactic, it could have serious consequences for businesses and the job market as a whole.

Chinese Hackers Who Targeted Key US Infrastructure Charged by Justice Department Δ1.73

The US Department of Justice has announced charges against 12 Chinese hackers accused of targeting over 100 American companies, including the US Treasury. These individuals allegedly played a "key role" in recent cyberattacks and were linked to state-sponsored hacking groups, exploiting vulnerabilities in enterprise software. The DoJ also brought charges against eight individuals from organization Anxum Information Technology Co., Ltd., which was reportedly paid by Chinese authorities for its services.

Microsoft Teams and Other Windows Tools Hijacked to Hack Corporate Networks Δ1.73

Hackers are exploiting Microsoft Teams and other legitimate Windows tools to launch sophisticated attacks on corporate networks, employing social engineering tactics to gain access to remote desktop solutions. Once inside, they sideload flawed .DLL files that enable the installation of BackConnect, a remote access tool that allows persistent control over compromised devices. This emerging threat highlights the urgent need for businesses to enhance their cybersecurity measures, particularly through employee education and the implementation of multi-factor authentication.

Chinese Spies Allegedly Donated to Philippine City and Police Forces Δ1.72

The four detained Chinese nationals allegedly led groups overseen by China's foreign influence network, making donations of cash to a Philippine city and vehicles to two police forces. The men had frequent meetings with China's defense attaché, Senior Col. Li Jianzhong, and were found to have photos and maps of sensitive sites and vessels on their phones. Allegations of espionage carry a prison term of up to 20 years for the detained suspects.

Fake LinkedIn Emails Contain Malware, Warns Security Expert Δ1.72

LinkedIn's InMail notification emails have been spoofed by cybercriminals to distribute malware. The emails are laced with phishing tactics, including fake companies, images, and notifications from legitimate platforms. Researchers at Cofense Intelligence warn that the attackers are using a ConnectWise Remote Access Trojan (RAT) to gain unauthorized control over systems.

Federal Worker Cuts to Hit National Security Hard Δ1.72

Former top U.S. cybersecurity official Rob Joyce warned lawmakers on Wednesday that cuts to federal probationary employees will have a "devastating impact" on U.S. national security. The elimination of these workers, who are responsible for hunting and eradicating cyber threats, will destroy a critical pipeline of talent, according to Joyce. As a result, the U.S. government's ability to protect itself from sophisticated cyber attacks may be severely compromised. The probe into China's hacking campaign by the Chinese Communist Party has significant implications for national security.

Microsoft Warns of Chinese Hackers Targeting Cloud Apps to Steal Business Data Δ1.72

Microsoft's Threat Intelligence has identified a new tactic from Chinese threat actor Silk Typhoon towards targeting "common IT solutions" such as cloud applications and remote management tools in order to gain access to victim systems. The group has been observed attacking a wide range of sectors, including IT services and infrastructure, healthcare, legal services, defense, government agencies, and many more. By exploiting zero-day vulnerabilities in edge devices, Silk Typhoon has established itself as one of the Chinese threat actors with the "largest targeting footprints".

Protecting Yourself From Tax-Related Scams in 2025: 10 Expert Tips Δ1.72

Almost half of people polled by McAfee say they or someone they know has received a text or phone call from a scammer pretending to be from the IRS or a state tax agency, highlighting the growing threat of tax-related scams. The scammers use various tactics, including social media posts, emails, text messages, and phone calls, to target potential victims, often with promising fake refunds. To protect themselves, individuals can take steps such as filing their taxes early, monitoring their credit reports, watching out for phishing attacks, and being cautious of spoofed websites.

Russia Sees Tech Boom Amid Sanctions — Microelectronics Industry Sees Massive Hiring Surge and Increase Δ1.71

Despite sanctions, Russian electronics and computer hardware manufacturers expanded their workforce in 2024 by an average of 13%, reports Vedomosti. Engineers were the most sought-after professionals, which indicates that companies in the country are adapting to sanctions and developing various workaround ways to keep Russia's economy (and the war machine) going. Perhaps more importantly, Russia's Mikron, the leading chipmaker in the country, is hiring R&D personnel, which may lead to breakthroughs.

Philippines to Scrutinize Donations by Suspected Chinese Spies Δ1.71

The Philippine government will scrutinize donations made by Chinese Communist Party-affiliated groups led by four Chinese nationals accused of espionage to determine if they were done in good faith, amid concerns about foreign influence and ulterior motives. The government has already arrested at least eight suspected Chinese spies, including the four accused of espionage, which has strained relations between the two countries. Presidential Communications Undersecretary Claire Castro emphasized the need for transparency and accountability in receiving donations from foreign sources.

Ransomware Dominates Cybersecurity Threats in 2024 Δ1.71

The modern-day cyber threat landscape has become increasingly crowded, with Advanced Persistent Threats (APTs) becoming a major concern for cybersecurity teams worldwide. Group-IB's recent research points to 2024 as a 'year of cybercriminal escalation', with a 10% rise in ransomware compared to the previous year, and a 22% rise in phishing attacks. The "Game-changing" role of AI is being used by both security teams and cybercriminals, but its maturity level is still not there yet.

Deepfake Scam Calls Are Costing British Victims Hundreds Each Time - Here's How to Stay Safe Δ1.71

The average scam cost the victim £595, report claims. Deepfakes are claiming thousands of victims, with a new report from Hiya detailing the rising risk and deepfake voice scams in the UK and abroad, noting how the rise of generative AI means deepfakes are more convincing than ever, and attackers can leverage them more frequently too. AI lowers the barriers for criminals to commit fraud, and makes scamming victims easier, faster, and more effective.

Hackers Stole Engineer's Password Manager Database: A Nightmare Scenario Δ1.71

A software engineer for the Disney Company unwittingly downloaded malware on his computer that turned his life upside down. The malware gave outside attackers full access to his 1Password database and session cookies, allowing them to compromise his online accounts, including his employer's Slack channel. As a result, he lost his job after Disney's forensic examination reportedly showed that he had accessed pornographic material on his work laptop in violation of company policy.

Huge Cyberattack Found Hitting Vulnerable Microsoft-Signed Legacy Drivers to Get Past Security Δ1.70

A massive cybercriminal campaign has been discovered utilizing outdated and vulnerable Windows drivers to deploy malware against hundreds of thousands of devices. The attackers leveraged a signed driver, allowing them to disable antivirus programs and gain control over infected machines. This campaign is believed to be linked to the financially motivated group Silver Fox, which is known for its use of Chinese public cloud servers.