Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Hackers highlighted and revealed a major North Korean espionage operation
    Security

    Hackers highlighted and revealed a major North Korean espionage operation

    PineapplesUpdateBy PineapplesUpdateAugust 12, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Hackers highlighted and revealed a major North Korean espionage operation
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Hackers have claimed that a North Korean government has compromised on the hacker computer and leaked its content online, which offers a rare window in the hacking operation by the notorious secret nation.

    Two hackers, who go by saber and Cyb0RG, Published a report about Violation in the latest issue of Fract The magazine, a famous cyber security e-zeen which was first published in 1985. Latest issue Was distributed Last week at the DEF Con Hacker Conference in Las Vegas.

    In the article, two hackers wrote that they were able to compromise a workstation, with a virtual machine and a virtual private server related to hackers, which they call “Kim”. Hackers claim that Kim works for the North Korean government’s detective group, known as Kimsuki, also known APT43 and Thallium. Hackers leaked the stolen data to DDOSECRETS, a non -profit collective stores leaked in public interest.

    Kimsuky is a huge advanced constant threat (APT) group that is widely working inside the North Korean government, targets journalists and government agencies In South Korea and other places, and other goals that may be of interest to North Korea’s intelligence mechanisms.

    As common with North Korea, Kimsuky also conducts more operations for a cyber criminal group – for example, Theft and laundering cryptocurrency To fund North Korea’s nuclear weapon program.

    It gives almost one-impact appearance inside the operation of hack kimsuky, given that both hackers compromised one of the group members, rather than examining a data breech, as cyber security researchers and companies usually have to rely.

    Hackers wrote, “This is a glimpse of how ‘Kimsuki’ openly collaborates with Chinese (government hackers) and shares its equipment and techniques.”

    Hackers highlighted and revealed a major North Korean espionage operation
    A depiction by North Korean dictator Kim Jong-un, which was included in the Fract article.Image Credit:Kirpan and cyb0rg/phrack

    Obviously, what did the saber and CyB0RG do technically a crime, although they will probably never be prosecuted for it, given that North Korea has been approved for its eyeball. Two hackers clearly believe that Kimsuki members are exposed and embarrassed.

    “Kimsuki, you are not a hacker. You are inspired by financial greed, to enrich your leaders, and to fulfill their political agenda. You steal from others and are in your own favor. You give importance to others on others: You are morally distorted,” both have written in Fract. “You hack all for wrong reasons.”

    Kirpan and CYB0RG have claimed that many south Korean government networks and companies, email addresses, and hacking tools of Kimsuky have found evidence of compromising with Kimsuky Group, Internal Manual, Password and more data.

    The emails, who were reportedly sent to the address related to hackers, were listed in research, became unanswered.

    Hackers wrote that he was able to identify Kim as a North Korean government’s hacker, thanks to “artifacts and signs”, which was indicated in the direction, including the file configuration and domains, which were first responsible for North Korean Hacking Group Kimsuki.

    Hackers “strict office time, always connecting from 09:00 am and disconnected to 17:00 Pyongyang Time.”

    espionage hackers highlighted Korean major North Operation revealed
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleEVM front, backward Starknet
    Next Article Google Vet AI increases $ 8m for contua to bring agents into group chat
    PineapplesUpdate
    • Website

    Related Posts

    Startups

    How a simple link allowed hackers to bypass Copilot’s security guardrails – and what Microsoft did about it

    January 19, 2026
    Startups

    Want a Samsung Frame TV? A major competitor has just announced its own version

    December 30, 2025
    Startups

    How Microsoft’s new security agent helps businesses stay one step ahead of AI-enabled hackers

    November 21, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2026 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.