Earlier this year, two hackers broke on a computer and soon realized the importance of what this machine was. As it turned out, they had landed on the computer of a hacker allegedly working for the North Korean government.
The two hackers have decided to continue digging and finding out that they are saying that they associate the hacker with the Cybetespionage companies conducted by North Korea, the exploitation tools and the piracy and the infrastructure used in these activities.
Saber, one of the hackers involved, told TechCrunch that they had access to the computer of the North Korean government worker for about four months, but as soon as they realized which data had access, they realized that they had to eventually leak and expose what they had discovered.
“These nation-state hackers are hacking for all the wrong reasons. I hope more of them will be exposed, they deserve to be,” said Saber, who spoke to TechCrunch after him and Cyb0rg posted an article in the legendary hacking e-zine phrackrevealing details of their findings.
There are countless cyberspace companies and researchers and researchers closely monitoring anything that is the North Korean government and many hacking groups, which include espionage businesses, as well as increasing cryptographic robbers and broad businesses where the North Koreans are putting to the North Koreans.
In this case, Saber and CYB0RG went a step further and in fact lost hackers, a business that can give more or at least different information on how these government backed teams work, as well as “what they do on a daily basis and so on”, as Saber put it.
Hackers want to be known only by their handles, Saber and Cyb0rg, because they can face retaliation by the North Korean government and possibly others. Saber said they consider themselves hacktivists and the name of legendary hacktivist FishermanResponsible for Manufacturers Spyware Hacking Finn and Piracy groupas an inspiration.
TechCrunch event
Francisco
|
27-29 October 2025
At the same time, hackers also understand that what they did was illegal, but they thought it was still important to make it public.
“Maintaining him would not be really useful,” Saber said. “With the leak of everyone in the public, we hope that we can give researchers a few more ways to locate them.”
“Hopefully this will also lead to many of their current victims discovered and so [the North Korean hackers] Losing access, “he said.
“Illegal or not, this action has brought specific objects to the community, this is more important,” CYB0RG said in a message sent through Saber.
Saber said they were convinced that while the hacker – called “Kim” – works for North Korea’s regime, can be really Chinese and work for both governments, based on their findings that Kim did not work during the holidays in China.
Also, according to Saber, sometimes Kim translates some Korean documents into simplified Chinese using Google Translate.
Saber said he never tried to contact Kim. “I don’t think he will even hear, all he does is to empower his leaders, the same leaders who enslave his people,” he said. “I would probably like to tell him to use his knowledge in a way that helps people, not hurt them, but live in constant propaganda and probably from birth, so that makes no sense for him.” It refers to the strict gap of information that the North Koreans live, as they are largely reached by the outside world.
Saber refused to reveal how he and Cyb0rg have access to Kim’s computer, as they believe they can use the same techniques to “gain more access to their other systems in the same way”.
During their business, Saber and CYB0RG found elements of active halls made by Kim, against South Korean and Taiwan companies, which they say they came into contact and alerted.
North Korean hackers have a history of targeting people who also work in cyberspace. So Saber said he knows this danger, but “he doesn’t really worry.”
“There is not much to do with it, they are definitely more careful :),” Saber said.
We always try to evolve and by providing some image of your perspective and feedback on TechCrunch and our coverage and events, you can help us! Complete this survey to let us know how we are doing and to get the chance to win a prize in return!
