KnowBe4 exposes North Korean hacker disguised as IT staff

July 25, 2024
1 min read

TLDR:

  • A North Korean hacker posed as an IT employee at KnowBe4’s AI team but was caught before gaining access to the company’s network.
  • The hacker used deepfake technology and VPN manipulation to obtain the job and location.

KnowBe4 recently foiled an attempt by a North Korean threat actor to infiltrate the company by posing as an IT employee on the internal AI team. The company detected suspicious activity originating from the new hire’s workstation and quickly identified the individual as a threat. The hacker used deepfake technology and VPN manipulation to secure the job and location. This incident highlights the need for organizations to conduct more thorough background checks and implement stricter vetting processes to prevent such insider threats from compromising their systems.

Full Article:

A North Korean threat actor attempted to infiltrate KnowBe4 by posing as an IT worker on the internal AI team, but the company caught the hacker before any damage could be done. The CEO of KnowBe4, Stu Sjouwerman, revealed in an incident report summary that the company detected suspicious activity emanating from the new hire’s workstation, leading to the discovery of the hacker’s true identity. The threat actor had used deepfake technology and VPN manipulation to obtain the job and location.

Sjouwerman outlined the elaborate scheme the hacker had employed, which included receiving and manipulating equipment through a so-called “IT mule laptop farm”. The fake employee also worked the night shift to make it seem like they were located in the U.S. when, in reality, they were funding illegal programs in North Korea. This incident underscores the seriousness of insider threats and the importance of implementing more thorough vetting processes to protect organizations from advanced persistent threat actors.

KnowBe4’s Chief Information Security Officer, Brian Jack, mentioned that the company will be making changes to its vetting process moving forward, potentially including fingerprint checks for certain roles and increased scrutiny of shipping addresses for remote new hires. These measures aim to prevent similar incidents from occurring in the future.

In conclusion, the incident at KnowBe4 serves as a stark reminder of the sophisticated tactics employed by threat actors to infiltrate organizations. By staying vigilant, conducting thorough background checks, and implementing stricter vetting processes, organizations can better protect themselves from insider threats and prevent potential security breaches.

Latest from Blog

Apache’s OFBiz gets new fix for RCE exploits

TLDR: Apache released a security update for OFBiz to patch vulnerabilities, including a bypass of patches for two exploited flaws. The bypass, tracked as CVE-2024-45195, allows unauthenticated remote attackers to execute code