Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Leaked: North Korea's Meticulous Plans for Global IT Worker Schemes



A new leak reveals the meticulous job-planning and targeting strategies employed by North Korean IT workers who have infiltrated companies worldwide, exposing their workaday lives and the constant surveillance they're under. The data, obtained by a cybersecurity researcher, sheds light on how these individuals track potential jobs, log their ongoing applications, and record earnings with painstaking attention to detail.


  • The leak exposes intricate plans and methods employed by North Korean IT workers who have infiltrated companies worldwide.
  • The data reveals sophisticated tracking methods, logging systems, and precision budgeting used by these individuals.
  • The IT workers appear to be part of a larger organization, possibly linked to Kim Chaek University of Technology or Korea Ryonbong General Corporation.
  • They rely on US-based tech services such as Google, Slack, and GitHub for job applications and tracking earnings.
  • The leaked data also highlights the lighter side of their workday, including celebrations and inspirational memes.
  • The threat posed by North Korean IT workers raises serious concerns about national security due to their involvement in WMD and ballistic missile programs.
  • Companies must remain vigilant in protecting themselves against potential malicious activity, as the digital landscape is increasingly controlled by nation-state threats.



  • In an unprecedented revelation, a trove of data has been unearthed by a cybersecurity researcher, exposing the intricate plans and methods employed by North Korean IT workers who have infiltrated companies worldwide. The leak, obtained through a confidential source, provides a unique glimpse into the workaday lives of these individuals, revealing their meticulous job-planning strategies and targeting approaches.

    The data, which spans dozens of gigabytes and thousands of emails, offers a comprehensive look at how these North Korean IT workers operate. It is clear that they have developed sophisticated methods for tracking potential jobs, logging their ongoing applications, and recording earnings with great precision. The spreadsheets used by these individuals are meticulously organized, with rows and columns neatly filled out to track progress and update budgets.

    One of the most striking aspects of the data is its level of detail. Screenshots show that the IT workers have a keen eye for monitoring their performance, tracking metrics such as idle time and productivity rates. They also appear to be skilled at manipulating language, with many communications conducted entirely in English. This could be seen as an attempt to blend into legitimate activity or improve their English skills for job applications.

    Furthermore, the data suggests that these North Korean IT workers are not isolated individuals but rather part of a larger organization. The "KUT" unit listed on several spreadsheets appears to be a potential abbreviation for Kim Chaek University of Technology, which has been cited in US government warnings about DPRK-linked IT workers. Additionally, some accounts mention an "ownership" linked to Korea Ryonbong General Corporation, a sanctioned defense company.

    The leaked data also reveals the IT workers' reliance on US-based tech services such as Google, Slack, and GitHub. These platforms are used not only for job applications but also for creating online accounts, tracking earnings, and recording expenses. The fact that these companies have taken swift action against suspected malicious activity suggests that there is growing recognition of this threat.

    The data obtained by the cybersecurity researcher also provides insight into the IT workers' daily lives. They appear to celebrate birthdays and share inspirational memes from popular social media platforms. A volleyball tournament even features in one spreadsheet, highlighting the lighter side of these individuals' workday.

    However, it's essential to note that while this leak offers a unique window into the world of North Korean IT workers, it also raises serious concerns about national security. The leaked data suggests that these individuals are working on behalf of entities directly involved in DPRK's UN-prohibited WMD and ballistic missile programs, as well as advanced conventional weapons development and trade sectors.

    The implications of this leak extend beyond the realm of cybersecurity. It highlights the need for increased awareness about the tactics employed by North Korean IT workers and the importance of vigilance when it comes to protecting sensitive information.

    In conclusion, the leaked data provides a fascinating glimpse into the meticulous plans and methods employed by North Korean IT workers. While the details of their workday are certainly intriguing, they also underscore the need for greater awareness about this threat. As cybersecurity experts continue to monitor these activities, it's essential that companies worldwide remain vigilant in protecting themselves against potential malicious activity.

    The leaked data serves as a stark reminder that the digital landscape is no longer solely controlled by legitimate actors. Instead, nation-state threats like North Korea are increasingly employing sophisticated tactics to infiltrate and exploit vulnerable systems. It is crucial that cybersecurity professionals, policymakers, and individuals alike stay informed about these evolving threats to protect themselves and their organizations.

    Ultimately, this leak serves as a testament to the dedication of cybersecurity researchers like SttyK who risked everything to uncover the truth behind North Korea's IT worker schemes. Their findings have shed new light on an often-overlooked aspect of global cybersecurity and will undoubtedly contribute to ongoing efforts to combat these threats.

    The leaked data also highlights the importance of cooperation between governments, companies, and cybersecurity experts in combating this threat. By working together and sharing knowledge, we can improve our collective ability to detect and disrupt such activities.

    In a rapidly evolving digital landscape, it is more crucial than ever that we prioritize cybersecurity awareness and vigilance. The leaked data from North Korea's IT worker schemes serves as a stark reminder of the importance of staying informed about this growing threat and taking proactive steps to protect ourselves and our organizations.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Leaked-North-Koreas-Meticulous-Plans-for-Global-IT-Worker-Schemes-ehn.shtml

  • https://www.wired.com/story/leaked-data-reveals-the-workaday-lives-of-north-korean-it-scammers/


  • Published: Thu Aug 7 23:46:51 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us