North Korean hacker got hired by US security vendor, immediately loaded malware

Nathan

SF VIP
https://arstechnica.com/tech-policy...pparent-nation-state-hacker-from-north-korea/

KnowBe4, a US-based security vendor, revealed that it unwittingly hired a North Korean hacker who attempted to load malware into the company's network. KnowBe4 CEO and founder Stu Sjouwerman described the incident in a blog post yesterday, calling it a cautionary tale that was fortunately detected before causing any major problems.


"First of all: No illegal access was gained, and no data was lost, compromised, or exfiltrated on any KnowBe4 systems," Sjouwerman wrote. "This is not a data breach notification, there was none. See it as an organizational learning moment I am sharing with you. If it can happen to us, it can happen to almost anyone. Don't let it happen to you."


KnowBe4 said it was looking for a software engineer for its internal IT AI team. The firm hired a person who, it turns out, was from North Korea and was "using a valid but stolen US-based identity" and a photo that was "enhanced" by artificial intelligence. There is now an active FBI investigation amid suspicion that the worker is what KnowBe4's blog post called "an Insider Threat/Nation State Actor."


KnowBe4 operates in 11 countries and is headquartered in Florida. It provides security awareness training, including phishing security tests, to corporate customers. If you occasionally receive a fake phishing email from your employer, you might be working for a company that uses the KnowBe4 service to test its employees' ability to spot scams.

Person passed background check and video interviews

KnowBe4 hired the North Korean hacker through its usual process. "We posted the job, received resumes, conducted interviews, performed background checks, verified references, and hired the person. We sent them their Mac workstation, and the moment it was received, it immediately started to load malware," the company said.


Even though the photo provided to HR was fake, the person who was interviewed for the job apparently looked enough like it to pass. KnowBe4's HR team "conducted four video conference based interviews on separate occasions, confirming the individual matched the photo provided on their application," the post said. "Additionally, a background check and all other standard pre-hiring checks were performed and came back clear due to the stolen identity being used. This was a real person using a valid but stolen US-based identity. The picture was AI 'enhanced.'"
 

KnowBe4 should change their name to KnowAftr. They don't require an in-person interview? Fingerprints? Drug test?--not that they might have done any better, but at least they wouldn't have been influenced by AI.
 
KnowBe4 should change their name to KnowAftr. They don't require an in-person interview? Fingerprints? Drug test?--not that they might have done any better, but at least they wouldn't have been influenced by AI.
I think that global tech enterprises rely on 'modern' hiring practices too much, and under-value the "old school" tried & true vetting processes. In this case, they did a video interview(Zoom, or ?) and since the threat actor resembled the stolen/fake credentials nobody questioned it.
 


Back
Top