Posted on 07/26/2024 9:41:53 AM PDT by EBH
A digital security firm got the shock of a lifetime when it came to light that one of its remote workers was actually a North Korean hacker after he infected his new company laptop with malware.
"The moment it was received, it immediately started to load malware," security firm KnowBe4 wrote in a blog post about the incident. The company stressed that "no illegal access was gained, and no data was lost, compromised or exfiltrated on any KnowBe4 systems."
"KnowBe4 needed a software engineer for our internal IT AI team," the company explained. "We posted the job, received resumes, conducted interviews, performed background checks, verified references and hired the person. We sent them their Mac workstation, and the moment it was received, it immediately started to load malware."
KnowBe4 hired the unnamed employee and noticed "a series of suspicious activities" on July 15 after sending a Mac laptop to the employee for work purposes. The company reached out to the user, but the employee responded that he was troubleshooting a "speed issue" and may have "caused a compromise."
(Excerpt) Read more at foxbusiness.com ...
KnowBe4 is another very strong and widely-utilized security utility, as is CrowdStrike.
They didn’t hesitate to share this incident with the public because they detected and prevented this individual’s malicious activities very quickly.
Insider threats occur constantly, even from domestic employee who spend their work hours in physical company offices.
A security firm that didn’t KnowBe4 they hired him.
Diversity is grand ain’t it?...
I remember when proof of US citizenship was part of getting hired. Now companies seem to prefer to hire foreigners, whether H1-B or otherwise.
They sent the remote employee a computer. Was it addressed to North Korea? Wouldn’t that been a clue?
There’s remote and there’s.......way out remote. 🌏🥡🥡🍚🍵
That’s it.
The guy was from Communist China, or more likely, a government 3-letter agency contractor who screwed something up while installing or updating a government spyware application.
His remote account is set to look like it's coming from North Korea because they can't be so obvious and have it show that his account is from northern Virginia and directly connected to a server.
My brother was in Viet Nam and remembers the time when it was discovered that the man who ran the cyclo stand outside the compound where he worked in Saigon was the head of a North Vietnam spy ring.
More success from DEI employees?
These people may be good at writing code but their security protocols for hiring are abysmal.
This is unintentionally hilarious. My employer assigns KnowBe4 security training to us. Each mini episode is about a hacker gaining inside access as an employee, and the whole series is called The Inside Man.
The whole point is not to let it happen to us.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.