Top related persons:
Top related locs:
Top related orgs:

Search resuls for: "Constella Intelligence"


3 mentions found


[1/3] A redacted online resume of a North Korean IT worker is shown in this screenshot of a report obtained by Reuters on November 20, 2023. The documents contain dozens of fraudulent resumes, online profiles, interview notes, and forged identities that North Korean workers used to apply for jobs in software development. Some of the scripts, designed to prepare the workers for interview questions, contain excuses for the need to work remotely. North Korean developers working at U.S. companies had hidden behind pseudonymous email and social media accounts and generated millions of dollars a year on behalf of sanctioned North Korean entities through the scheme, the DOJ said. The researchers, part of Palo Alto's Unit 42 cyber research division, made the discovery when examining a campaign by North Korean hackers that targeted software developers.
Persons: Richard, Covid, Richard Lee, , James Pearson, Ted Hesson, Daphne Psaledakis, Chris Sanders, Anna Driver Organizations: North, Reuters, Palo Alto Networks, REUTERS Acquire, Palo Alto, United Nations, United, United Arab Emirates, U.S . Justice Department, DOJ, Federal Bureau of Investigation, FBI, North Korean, U.S, of Liberty, Palo Alto's, Constella Intelligence, U.S . Department of Homeland Security, Thomson Locations: North Korean, Korean, North Korea, United States, South Korea, U.S, Chile, New Zealand, Uzbekistan, United Arab, Singapore, Los Angeles, LA, China, Russia, Africa, Southeast Asia, Pyongyang, Palo, Britain, Japan, Spain, Australia, Washington
WASHINGTON, April 11 (Reuters) - Ukrainian hackers claim to have broken into the emails of a senior Russian military spy wanted by the Federal Bureau of Investigation for hacking the Hillary Clinton campaign and other senior U.S. Democrats ahead of Donald Trump's election to the presidency in 2016. It wasn't immediately clear what information the hackers had managed to steal or how significant it was. Morgachev's inbox could potentially hold insight into Russia's hacking operations, including the operation against Clinton and the Democrats. It said his department was "dedicated to developing and managing malware," including the "X-Agent" spy software used to hack the DNC. In its message announcing the theft, the group said of Morgachev: "A very cool and clever hacker, but ... We hacked him."
LONDON/WASHINGTON, Jan 6 (Reuters) - A Russian hacking team known as Cold River targeted three nuclear research laboratories in the United States this past summer, according to internet records reviewed by Reuters and five cyber security experts. Cold River has escalated its hacking campaign against Kyiv's allies since the invasion of Ukraine, according to cybersecurity researchers and western government officials. 'INTELLIGENCE COLLECTION'In May, Cold River broke into and leaked emails belonging to the former head of Britain's MI6 spy service. Reuters was unable independently to confirm why Cold River targeted the NGOs. "Google has tied this individual to the Russian hacking group Cold River and their early operations," he said.
Total: 3