Odaily星球日报讯 据 ZachXBT 披露,一名消息人士入侵朝鲜 IT 人员设备,发现其小团队通过 30 多个虚假身份获取开发者职位,使用政府 ID 购买 Upwork 和 LinkedIn 账户,并通过 AnyDesk 开展工作。相关数据包括 Google Drive 导出、Chrome 配置文件及截图。
钱包地址 0 x 78 e 1 与 2025 年 6 月的 Favrr 平台 68 万美元攻击密切相关,更多朝鲜 IT 人员也被识别。团队利用 Google 产品安排任务,购买 SSN、AI 订阅及 VPN 等。部分浏览记录显示频繁使用 Google Translate 翻译韩语,IP 地址为俄罗斯。招聘方的忽视及服务间缺乏协作成为打击此类行为的主要挑战。
Disclaimer: Investing carries risk. This is not financial advice. The above content should not be regarded as an offer, recommendation, or solicitation on acquiring or disposing of any financial products, any associated discussions, comments, or posts by author or other users should not be considered as such either. It is solely for general information purpose only, which does not consider your own investment objectives, financial situations or needs. TTM assumes no responsibility or warranty for the accuracy and completeness of the information, investors should do their own research and may seek professional advice before investing.