Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Russian government hackers are said to be behind a US federal court filed system hack: Report

The Next Frontier: NYC Island Becomes Epicenter for Climate Solutions

Researchers find XZ Utils backdoors in dozens of Docker hub images to drive supply chain risk

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers violate North Korea’s spy operations and reveal
Startups

Hackers violate North Korea’s spy operations and reveal

userBy userAugust 12, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

The hackers claim they compromised the North Korean government’s hacker’s computers, leaked its contents online, and provided an unusual window into hacking operations by the infamous, secret nation.

Two hackers who Saber and Cyb0rg go to have released a report on violations in the latest issue of Phrack Magazine, the legendary cybersecurity e-zine first released in 1985.

In the article, the two hackers wrote that they were able to compromise on workstations that contain virtual machines and virtual private servers belonging to the hacker. Hackers claim that Kim works for a North Korean government spy group known as Kimsky, also known as APT43 and Thallium. The hacker leaked the stolen data to Ddosecrets. This is a non-commercial group that stores leaked datasets for the public interest.

Kimsky is a prolific, highly enduring threat (APT) group believed to work widely within North Korean government and is widely considered to target interesting targets for journalists and government agencies in South Korea and other regions, as well as North Korean intelligence reporting agencies.

Like North Korea and normal, Kimsky also conducts operations similar to cybercrime groups. For example, they steal or wash cryptocurrencies to fund North Korea’s nuclear weapons program.

This hack gives it a nearly existing look inside Kimsky’s operation, given that two hackers have violated one of the group’s members, as cybersecurity researchers and businesses usually have to rely on.

“It shows a glimpse into how ‘Kimsky’ openly cooperates with the Chinese. [government hackers] The hacker wrote.

Illustrations of North Korean dictator Kim Jong-un. This was included in a Phrack article.Image credits: Saber and cyb0rg/Flack

Clearly, what Saber and Cyb0RG did is technically a crime, but given that North Korea is approved as its eyeball, they probably won’t be prosecuted. The two hackers clearly believe that Kimsky members are exposed and deserve embarrassing.

“Kimsky, you are not a hacker. You are driven by financial greed, enrich your leaders and fulfill your political agenda. You steal from others and support yourself. “Hack for the wrong reasons.”

Saber and Cyb0RG claim they have found Kimsuky’s evidence that violates several South Korean government networks and businesses that Kimsuky Group uses, email addresses, and data such as hacking tools, internal manuals, and passwords.

The emails sent to an address that allegedly belong to a hacker were listed in the study, but were unable to answer.

The hacker wrote that “artifacts and hints” including file structure and domains caused by North Korean hacking group Kimsky allowed him to identify Kim as a North Korean government hacker.

The hacker also said Kim’s “strict opening hours are always connected around 09:00 and have been disconnected by 5:00 Pyongyang time.”


Source link

#Aceleradoras #CapitalRiesgo #EcosistemaStartup #Emprendimiento #InnovaciónEmpresarial #Startups
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGoogle Vet is raising $8 million for Continua to bring AI agents to group chat
Next Article AI companion app on track to attract $120 million in 2025
user
  • Website

Related Posts

Russian government hackers are said to be behind a US federal court filed system hack: Report

August 12, 2025

The Next Frontier: NYC Island Becomes Epicenter for Climate Solutions

August 12, 2025

AI companion app on track to attract $120 million in 2025

August 12, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Russian government hackers are said to be behind a US federal court filed system hack: Report

The Next Frontier: NYC Island Becomes Epicenter for Climate Solutions

Researchers find XZ Utils backdoors in dozens of Docker hub images to drive supply chain risk

AI companion app on track to attract $120 million in 2025

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Next Frontier: NYC Island Becomes Epicenter for Climate Solutions

The AI-Powered Career Path: How TwinH by FySelf Evolves Your Digital Professional Identity

Web 3.0 Gets Personal: FySelf’s TwinH Paves the Way for User-Controlled Digital Identity

Google’s Genie 3: The Dawn of General AI?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.