/
Navigation
Chronicles
Browse all articles
Explore
Semantic exploration
Research
Entity momentum
Nexus
Correlations & relationships
Story Arc
Topic evolution
Drift Map
Semantic trajectory animation
Posts
Analysis & commentary
Pulse API
Tech news intelligence API
Browse
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
Concept Search
Semantic similarity search
High Impact Stories
Top coverage by position
Sentiment Analysis
Positive/negative coverage
Anomaly Detection
Unusual coverage patterns
Analysis
Rivalry Report
Compare two entities head-to-head
Semantic Pivots
Narrative discontinuities
Crisis Response
Event recovery patterns
Connected
Search: /
Command: ⌘K
Embeddings: large
TEXXR

Chronicles

The story behind the story

days · browse · Enter similar · o open

US-based security vendor KnowBe4 says it unwittingly hired a North Korean hacker who then unsuccessfully attempted to load malware into the company's network

KnowBe4, which provides security awareness training, was fooled by stolen ID.  —  KnowBe4, a US-based security vendor …

Ars Technica Jon Brodkin

Discussion

  • @waldoj@mastodon.social Waldo Jaquith on mastodon
    My takeaway from this story: remote identity proofing is, indeed, well and truly busted. https://arstechnica.com/...
  • @gcluley@mastodon.green Graham Cluley on mastodon
    US-based KnowBe4 thought they were hiring a Western software engineer.  Turned out he was actually a North Korean hacker, using a valid but stolen identity and an AI-enhanced mugshot.  —  Kudos to KnowBe4 for talking about it, and a warning to others.  —  https://blog.knowbe4.com…
  • @jsrailton John Scott-Railton on x
    WILD: Security awareness training firm @KnowBe4 was tricked into hiring a North Korean. Passed all employment checks & video interviews. Used AI-manipulated photo. Company says: caught early when someone started loading malware onto work issued laptop. Says no data lost or [image…
  • @malwarejake Jake Williams on x
    The wildest thing about the KnowBe4 “we accidentally hired a North Korean threat actor as an engineer” story is that the SOC immediately caught it, followed their instincts, and escalated immediately. In post mortems for most serious incidents, there's an ignored alert.
  • @vxunderground @vxunderground on x
    Yesterday KnowBe4 disclosed a cyber-security-incident where a North Korean national successfully infiltrated KnowBe4 ... by applying for a job there, interviewing, and getting hired. Their blog post highlights North Korean identity fraud techniques. https://blog.knowbe4.com/...
  • @joetidy Joe Tidy on x
    Wow. This is amazing from @KnowBe4 - How a North Korean Fake IT Worker Tried to Infiltrate Us. “We sent them their Mac workstation, and the moment it was received, it immediately started to load malware.” https://blog.knowbe4.com/...
  • @knowbe4 @knowbe4 on x
    Want to know how a North Korean Fake IT Worker tried to infiltrate us? Learn all about this new story on the blog: https://blog.knowbe4.com/...
  • @racheltobac Rachel Tobac on x
    Whoa — a North Korean attacker attempted to hack KnowBe4 and gain access through their employment process. I talked about my employment based social engineering attacks in @DarknetDiaries in case you want to hear more about that attack vector below! https://blog.knowbe4.com/...
  • r/cybersecurity r on reddit
    North Korean hacker got hired by US security vendor, immediately loaded malware |  Ars Technica
  • r/cybersecurity r on reddit
    Breaking: KnowBe4 North Korean IT Worker Infiltration
  • r/nottheonion r on reddit
    North Korean hacker got hired by US security vendor, immediately loaded malware
  • r/technology r on reddit
    North Korean hacker got hired by US security vendor, immediately loaded malware
  • r/nottheonion r on reddit
    North Korean hacker got hired by US security vendor, immediately loaded malware