{"id":188377,"date":"2025-08-21T12:30:00","date_gmt":"2025-08-21T12:30:00","guid":{"rendered":"https:\/\/entertainment.runfyers.com\/index.php\/2025\/08\/21\/hackers-who-exposed-north-korean-government-hacker-explain-why-they-did-it-techcrunch\/"},"modified":"2025-08-21T12:30:00","modified_gmt":"2025-08-21T12:30:00","slug":"hackers-who-exposed-north-korean-government-hacker-explain-why-they-did-it-techcrunch","status":"publish","type":"post","link":"https:\/\/entertainment.runfyers.com\/index.php\/2025\/08\/21\/hackers-who-exposed-north-korean-government-hacker-explain-why-they-did-it-techcrunch\/","title":{"rendered":"Hackers who exposed North Korean government hacker explain why they did it | TechCrunch"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p id=\"speakable-summary\" class=\"wp-block-paragraph\">Earlier this year, two hackers broke into a computer and soon realized the significance of what this machine was. As it turned out, they had landed on the computer of a hacker who allegedly <a href=\"https:\/\/techcrunch.com\/2025\/08\/12\/hackers-breach-and-expose-a-major-north-korean-spying-operation\/\" target=\"_blank\" rel=\"noopener\">works for the North Korean government<\/a>.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">The two hackers decided to keep digging and found evidence that they say linked the hacker to cyberespionage operations carried out by North Korea, exploits and hacking tools, and infrastructure used in those operations.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Saber, one of the hackers involved, told TechCrunch that they had access to the North Korean government worker\u2019s computer for around four months, but as soon as they understood what data they got access to, they realized they eventually had to leak it and expose what they had discovered.<\/p>\n<p class=\"wp-block-paragraph\">\u201cThese nation-state hackers are hacking for all the wrong reasons. I hope more of them will get exposed; they deserve to be,\u201d said Saber, who spoke to TechCrunch after he and cyb0rg <a href=\"https:\/\/phrack.org\/issues\/72\/7_md#article\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">published an article in the legendary hacking e-zine Phrack<\/a>, disclosing details of their findings.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">There are countless cybersecurity companies and researchers who closely track anything the North Korean government and its many hacking groups are up to, which includes espionage operations, as well as increasingly <a href=\"https:\/\/techcrunch.com\/2025\/02\/24\/researchers-accuse-north-korea-of-1-4-billion-bybit-crypto-heist\/\" target=\"_blank\" rel=\"noopener\">large<\/a> <a href=\"https:\/\/techcrunch.com\/2025\/07\/17\/north-korean-hackers-blamed-for-record-spike-in-crypto-thefts-in-2025\/\" target=\"_blank\" rel=\"noopener\">crypto<\/a> <a href=\"https:\/\/techcrunch.com\/2025\/01\/14\/north-korea-stole-over-659m-in-crypto-heists-during-2024-deploys-fake-job-seekers\/\" target=\"_blank\" rel=\"noopener\">heists<\/a> and wide-ranging operations where North Koreans <a href=\"https:\/\/techcrunch.com\/2025\/06\/30\/us-government-takes-down-major-north-korean-remote-it-workers-operation\/\" target=\"_blank\" rel=\"noopener\">pose as remote IT workers<\/a> to fund the regime\u2019s nuclear weapons program.<\/p>\n<p class=\"wp-block-paragraph\">In this case, Saber and cyb0rg went one step further and actually hacked the hackers, an operation that can give more, or at least different, insights into how these government-backed groups work, as well as \u201cwhat they are doing on a daily basis and so on,\u201d as Saber put it.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">The hackers want to be known only by their handles, Saber and cyb0rg, because they may face retaliation from the North Korean government, and possibly others. Saber said that they consider themselves hacktivists, and he name-dropped legendary hacktivist <a href=\"https:\/\/www.vice.com\/en\/article\/hacking-team-hacker-phineas-fisher-has-gotten-away-with-it\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Phineas Fisher<\/a>, responsible for hacking spyware makers <a href=\"https:\/\/www.vice.com\/en\/article\/a-hacker-claims-to-have-leaked-40gb-of-docs-on-government-spy-tool-finfisher\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">FinFisher<\/a> and <a href=\"https:\/\/www.vice.com\/en\/article\/hacker-claims-responsibility-for-the-hit-on-hacking-team\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Hacking Team<\/a>, as an inspiration.\u00a0<\/p>\n<div class=\"wp-block-techcrunch-inline-cta\">\n<div class=\"inline-cta__wrapper\">\n<p>Techcrunch event<\/p>\n<div class=\"inline-cta__content\">\n<p>\n\t\t\t\t\t\t\t\t\t<span class=\"inline-cta__location\">San Francisco<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"inline-cta__separator\">|<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"inline-cta__date\">October 27-29, 2025<\/span>\n\t\t\t\t\t\t\t<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/div>\n<p class=\"wp-block-paragraph\">At the same time, the hackers also understand that what they did is illegal, but they thought it was nonetheless important to publicize it.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">\u201cKeeping it for us wouldn\u2019t have been really helpful,\u201d said Saber. \u201cBy leaking it all to the public, hopefully we can give researchers some more ways to detect them.\u201d<\/p>\n<p class=\"wp-block-paragraph\">\u201cHopefully this will also lead to many of their current victims being discovered and so to [the North Korean hackers] losing access,\u201d he said.<\/p>\n<p class=\"wp-block-paragraph\">\u201cIllegal or not, this action has brought concrete artifacts to the community; this is more important,\u201d said cyb0rg in a message sent through Saber.<\/p>\n<p class=\"wp-block-paragraph\">Saber said they are convinced that while the hacker \u2014 who they call \u201cKim\u201d \u2014 works for North Korea\u2019s regime, they may actually be Chinese and work for both governments, based on their findings that Kim did not work during holidays in China, suggesting that the hacker may be based there.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Also, according to Saber, at times Kim translated some Korean documents into simplified Chinese using Google Translate.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Saber said that he never tried to contact Kim. \u201cI don\u2019t think he would even listen; all he does is empower his leaders, the same leaders who enslave his own people,\u201d he said. \u201cI\u2019d probably tell him to use his knowledge in a way that helps people, not hurt them. But he lives in constant propaganda and likely since birth so this is all meaningless to him.\u201d He\u2019s referring to the strict information vacuum that North Koreans live in, as they are largely cut off from the outside world.<\/p>\n<p class=\"wp-block-paragraph\">Saber declined to disclose how he and cyb0rg got access to Kim\u2019s computer, given that the two believe they can use the same techniques to \u201cobtain more access to some other of their systems the same way.\u201d\u00a0<\/p>\n<p class=\"wp-block-paragraph\">During their operation, Saber and cyb0rg found evidence of active hacks carried out by Kim, against South Korean and Taiwanese companies, which they say they contacted and alerted.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">North Korean hackers have a history of targeting people who work in the cybersecurity industry as well. That\u2019s why Saber said he is aware of that risk, but \u201cnot really worried.\u201d\u00a0<\/p>\n<p class=\"wp-block-paragraph\">\u201cNot much can be done about this, definitely being more careful though :),\u201d said Saber.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<p class=\"wp-block-paragraph\"><em>We\u2019re always looking to evolve, and by providing some insight into your perspective and feedback into TechCrunch and our coverage and events, you can help us!\u00a0<\/em><a href=\"https:\/\/survey.researchresults.com\/survey\/selfserve\/53b\/g002\/s0064551?list=tcap\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><em>Fill out this survey to let us know how we\u2019re doing<\/em><\/a>\u00a0a<em>nd get the chance to win a prize in return!<\/em><\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/techcrunch.com\/2025\/08\/21\/hackers-who-exposed-north-korean-government-hacker-explain-why-they-did-it\/\" target=\"_blank\" rel=\"noopener\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Earlier this year, two hackers broke into a computer and soon realized the significance of what this machine was. As it turned out, they had landed on the computer of a hacker who allegedly works for the North Korean government.\u00a0 The two hackers decided to keep digging and found evidence that they say linked the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":188378,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[],"class_list":{"0":"post-188377","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tech"},"_links":{"self":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/188377","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/comments?post=188377"}],"version-history":[{"count":0,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/188377\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media\/188378"}],"wp:attachment":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media?parent=188377"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/categories?post=188377"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/tags?post=188377"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}