All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "2398372",
"signature": "Article:2398372",
"url": "https://staging.dailymaverick.co.za/article/2024-10-06-how-to-fund-an-illegal-nuclear-arsenal-by-using-stolen-identities-the-north-korean-way/",
"shorturl": "https://staging.dailymaverick.co.za/article/2398372",
"slug": "how-to-fund-an-illegal-nuclear-arsenal-by-using-stolen-identities-the-north-korean-way",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 2,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "How to fund an illegal nuclear arsenal by using stolen identities – the North Korean way",
"firstPublished": "2024-10-06 21:43:08",
"lastUpdate": "2024-10-06 21:43:12",
"categories": [
{
"id": "9",
"name": "Business Maverick",
"signature": "Category:9",
"slug": "business-maverick",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/business-maverick/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "29",
"name": "South Africa",
"signature": "Category:29",
"slug": "south-africa",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/south-africa/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "Daily Maverick is an independent online news publication and weekly print newspaper in South Africa.\r\n\r\nIt is known for breaking some of the defining stories of South Africa in the past decade, including the Marikana Massacre, in which the South African Police Service killed 34 miners in August 2012.\r\n\r\nIt also investigated the Gupta Leaks, which won the 2019 Global Shining Light Award.\r\n\r\nThat investigation was credited with exposing the Indian-born Gupta family and former President Jacob Zuma for their role in the systemic political corruption referred to as state capture.\r\n\r\nIn 2018, co-founder and editor-in-chief Branislav ‘Branko’ Brkic was awarded the country’s prestigious Nat Nakasa Award, recognised for initiating the investigative collaboration after receiving the hard drive that included the email tranche.\r\n\r\nIn 2021, co-founder and CEO Styli Charalambous also received the award.\r\n\r\nDaily Maverick covers the latest political and news developments in South Africa with breaking news updates, analysis, opinions and more.",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "38",
"name": "World",
"signature": "Category:38",
"slug": "world",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/world/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
}
],
"content_length": 7627,
"contents": "<span style=\"font-weight: 400;\">The institutional world is also awash with digital malevolence. The hacking of IT infrastructures and the subsequent massive ransoms that are demanded to return systems to normal are widely reported, including nasty events at critical institutions like hospitals and courts.</span>\r\n\r\n<span style=\"font-weight: 400;\">An extraordinary piece of investigative </span><a href=\"https://www.coindesk.com/tech/2024/10/02/how-north-korea-infiltrated-the-crypto-industry/\"><span style=\"font-weight: 400;\">reporting</span></a><span style=\"font-weight: 400;\"> came out this week, written by Sam Kessler from CoinDesk. His article exposed a fetid subterranean cavern underneath this nastiness, all of it linked to North Korea.</span>\r\n\r\n<span style=\"font-weight: 400;\">Remote-working has been around for as long as the internet has had sufficient bandwidth, but it was turbocharged during the pandemic when many workers were asked (or chose) to stay at home. This led to the burgeoning practice of hiring remote workers, particularly in the tech sector, where good programmers are highly sought after. Coding is largely a solo activity and physical meetings are not really necessary; Zoom, Teams and Meet work perfectly well for online meetings.</span>\r\n\r\n<span style=\"font-weight: 400;\">More importantly, coders are borderless. Inexpensive software development expertise can be found in far-flung places like Pakistan and Vietnam, and it is cheap when compared with hiring equivalent skills in richer nations like the US or EU. Good software developers are to be found anywhere and everywhere. </span>\r\n\r\n<span style=\"font-weight: 400;\">A tech company or corporate IT department seeking to hire coders puts out an advert on one of many global online recruitment sites, advertising a new position. The advert describes the project and skill prerequisites, and also requests details about an applicant’s programming language expertise, previous projects, education and the like. </span>\r\n\r\n<span style=\"font-weight: 400;\">Here is the startling result of Kessler’s investigation. </span>\r\n\r\n<span style=\"font-weight: 400;\">More than 50% of all applicants for these online software jobs are North Korean, and all 50% hide behind other identities. Non-North Korean identities. There are two reasons for this. </span>\r\n\r\n<span style=\"font-weight: 400;\">Firstly, it is illegal in the US to hire North Korean citizens to work on US-based projects. Secondly, the state of North Korea is not trusted, for good reason. No company with rational governance would want exposure to a state that is reputedly funded by cyber-crime and crypto-crime. Fake identities are, for the job applicants, an absolute necessity.</span>\r\n\r\n<span style=\"font-weight: 400;\">The Kessler investigation followed the money, which provided hard evidence of both the identity scams and the ultimate recipient of the funds generated. The report was replete with blurred out photographs of North Korean scammers and their fake IDs, and dotted-line charts of funds as they skipped from wallet to wallet. But there were some interesting nuances along the way.</span>\r\n\r\n<span style=\"font-weight: 400;\">Kessler and his team traced the movement of money from hiring companies to online “contractors”. Some of the North Koreans using stolen IDs did not steal anything - job done, they were simply paid and many of the companies were satisfied with the work. (North Korea reportedly has vast training facilities for talented software engineers, presumably to press-gang them into precisely this sort of work.) </span>\r\n\r\n<span style=\"font-weight: 400;\">But then, following the money further (most often paid in cryptocurrency which is very easy to trace), Kessler’s team found that the “contractors” were passing the payment back to addresses associated with the North Korean government. This suggests the unsettling possibility that the contractors are in the position of indentured servants, keeping very little of their earnings for themselves (the FBI estimates that the workers keep 10 – 30%). </span>\r\n\r\n<span style=\"font-weight: 400;\">A second group of scammers were discovered, more dangerous by far. They were also North Korean programmers, again hidden behind other identities (like Japanese, Singaporean and Korean – because people speaking differently Asian-accented English all sound roughly the same to Western ears when they are interviewed online). This group deployed ransomware into institutional IT systems or, more profitably, syphoned huge amounts of money from crypto companies holding custody of blockchain-based funds. (Crypto companies are not averse to hiring developers and engineers who are remote, transient and globally scattered.) </span>\r\n\r\n<span style=\"font-weight: 400;\">Here is an example of what happens.</span>\r\n\r\n<span style=\"font-weight: 400;\">A North Korean, blockchain-literate software engineer applies for a job at a crypto company (there are thousands of job openings in this arcane world), hiding behind the stolen identity of a real Japanese programmer (ID theft is not difficult and stolen identities can be openly bought on the dark web). The crypto company, perhaps a little green behind the ears, only cursorily checks the preferred applicant’s ID (forged) and previous work experience (real). He (they are almost always men) is hired. </span>\r\n\r\n<span style=\"font-weight: 400;\">Often the new hire does great work and everything goes swimmingly. Apparently. What the company doesn’t know is that he has used his inside position to access private crypto keys, either by direct hacking or (more simply) befriending and phishing other staff. He quits (he may even finish the job), disappears behind his fake ID, and then proceeds to suck millions out of the blockchain (in some cases hundreds of millions). </span>\r\n\r\n<span style=\"font-weight: 400;\">Some well-known names in crypto - including Injective, ZeroLend, Fantom, Sushi, Yearn Finance, Truflation and Cosmos Hub - have unwittingly hired North Korean developers. Some were later hacked and drained of funds.</span>\r\n\r\n<span style=\"font-weight: 400;\">These payouts are not the paltry hourly rates earned by the earlier group of workers – they are enough to fund North Korea’s nuclear program. All the evidence points in this direction. (North Korea has no export industry at all, if you exclude their recent jackpot of selling munitions to Russia for its war against Ukraine.)</span>\r\n\r\n<span style=\"font-weight: 400;\">How did the investigators discover where the money trail ends? Well, the crypto wallet addresses that were uncovered at the end of the line are officially under sanction by the US Office of Foreign Assets Control because they were found to be fronts for the North Korean regime.</span>\r\n\r\n<span style=\"font-weight: 400;\">What can we learn here? Obviously, a company should make sure that they hire people who are who they say they are, although this is easier said than done. Here in our country, a large part of our national governance machine seems easily duped by fictitious CVs. Internationally, the opportunities for digital fakery are endless – from passports to certificates to photos and voices. </span>\r\n\r\n<span style=\"font-weight: 400;\">There are, of course, companies that specialise in employee authentication, but many employers are too stingy to pay the cost, relying instead on patently risky procedures such as requiring a photo of an applicant holding his passport. As if that would stop anyone with a million-dollar incentive. </span>\r\n\r\n<span style=\"font-weight: 400;\">So what about North Korea, not only a rogue nuclear state but also a harsh prison for its citizens? What can the world do about a country that doesn’t play by the rules? Especially when their main activity is stealing from others without consequence or shame? There is not much anyone can do, I suppose, other than employing extreme vigilance. </span>\r\n\r\n<span style=\"font-weight: 400;\">It is technically difficult to hack a blockchain by finding a software vulnerability and it is technically difficult to penetrate a hardened traditional IT infrastructure. Unless you can get your hands on a private key or (in the case of non-blockchain environments) the system administrator password. Then it is child’s play. </span>\r\n\r\n<span style=\"font-weight: 400;\">And what better way to do it than to land a job at the target company and be invited in through the front door? <strong>DM</strong></span>\r\n\r\n<i><span style=\"font-weight: 400;\">Steven Boykey Sidley is a professor of practice at JBS, University of Johannesburg. His new book It’s Mine: How the Crypto Industry is Redefining Ownership is published by </span></i><a href=\"https://shop.dailymaverick.co.za/product/its-mine-how-the-crypto-industry-is-redefining-ownership/\"><i><span style=\"font-weight: 400;\">Maverick451</span></i></a><i><span style=\"font-weight: 400;\"> in SA and Legend Times Group in UK/EU, available now.</span></i>",
"teaser": "How to fund an illegal nuclear arsenal by using stolen identities – the North Korean way",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "981",
"name": "Steven Boykey Sidley",
"image": "https://www.dailymaverick.co.za/wp-content/uploads/2022/12/Essay-Sidley-TechTW_10.jpg",
"url": "https://staging.dailymaverick.co.za/author/stevenboykeysidley/",
"editorialName": "stevenboykeysidley",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "6721",
"name": "North Korea",
"url": "https://staging.dailymaverick.co.za/keyword/north-korea/",
"slug": "north-korea",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "North Korea",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "20017",
"name": "Hacking",
"url": "https://staging.dailymaverick.co.za/keyword/hacking/",
"slug": "hacking",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Hacking",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "55969",
"name": "Crypto",
"url": "https://staging.dailymaverick.co.za/keyword/crypto/",
"slug": "crypto",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Crypto",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "372046",
"name": "Steven Boykey Sidley",
"url": "https://staging.dailymaverick.co.za/keyword/steven-boykey-sidley/",
"slug": "steven-boykey-sidley",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Steven Boykey Sidley",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "425054",
"name": "digital scammers",
"url": "https://staging.dailymaverick.co.za/keyword/digital-scammers/",
"slug": "digital-scammers",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "digital scammers",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "425055",
"name": "Sam Kessler",
"url": "https://staging.dailymaverick.co.za/keyword/sam-kessler/",
"slug": "sam-kessler",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Sam Kessler",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "425056",
"name": "ID theft",
"url": "https://staging.dailymaverick.co.za/keyword/id-theft/",
"slug": "id-theft",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "ID theft",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"attachments": [
{
"id": "31120",
"name": "",
"description": "",
"focal": "50% 50%",
"width": 0,
"height": 0,
"url": "https://dmcdn.whitebeard.net/dailymaverick/wp-content/uploads/2024/10/image1.jpg",
"transforms": [
{
"x": "200",
"y": "100",
"url": "https://dmcdn.whitebeard.net/i/Ffdoom735ySsBtc5rXo5KL-oVNQ=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/10/image1.jpg"
},
{
"x": "450",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/9PBAIqUvtJ7gmJ6xxoDZTlJLip0=/450x0/smart/file/dailymaverick/wp-content/uploads/2024/10/image1.jpg"
},
{
"x": "800",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/rZUJLJUx0-KRkcIDrVBkEpl-ey0=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/10/image1.jpg"
},
{
"x": "1200",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/TtHrX02_kL7aPS3OV5I6H_SB0HE=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/10/image1.jpg"
},
{
"x": "1600",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/fXQfI0S2H6ty3cPI_5_A-kD17to=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/10/image1.jpg"
}
],
"url_thumbnail": "https://dmcdn.whitebeard.net/i/Ffdoom735ySsBtc5rXo5KL-oVNQ=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/10/image1.jpg",
"url_medium": "https://dmcdn.whitebeard.net/i/9PBAIqUvtJ7gmJ6xxoDZTlJLip0=/450x0/smart/file/dailymaverick/wp-content/uploads/2024/10/image1.jpg",
"url_large": "https://dmcdn.whitebeard.net/i/rZUJLJUx0-KRkcIDrVBkEpl-ey0=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/10/image1.jpg",
"url_xl": "https://dmcdn.whitebeard.net/i/TtHrX02_kL7aPS3OV5I6H_SB0HE=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/10/image1.jpg",
"url_xxl": "https://dmcdn.whitebeard.net/i/fXQfI0S2H6ty3cPI_5_A-kD17to=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/10/image1.jpg",
"type": "image"
}
],
"summary": "By now most of us are not under any illusion about the highwaymen lurking online waiting to break into our digital lives to steal our money and our good humour. I, along with many people I know, am prodded and poked by hopeful and canny digital scammers often enough for it to have become a continual mosquito-like annoyance. Until one falls for it (which I have) and then it is more than that, and sometimes, much more than that. \r\n",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "How to fund an illegal nuclear arsenal by using stolen identities – the North Korean way",
"search_description": "<span style=\"font-weight: 400;\">The institutional world is also awash with digital malevolence. The hacking of IT infrastructures and the subsequent massive ransoms that are demanded to return systems",
"social_title": "How to fund an illegal nuclear arsenal by using stolen identities – the North Korean way",
"social_description": "<span style=\"font-weight: 400;\">The institutional world is also awash with digital malevolence. The hacking of IT infrastructures and the subsequent massive ransoms that are demanded to return systems",
"social_image": ""
},
"cached": true,
"access_allowed": true
}