Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

SpaceX’s Indian rival EtherealX hits 5x valuation as it prepares for engine tests

California AG sends Musk’s xAI a cease and desist order over sexual deepfakes

Gemini’s new beta feature provides predictive responses based on your photos, emails, and more

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    California AG sends Musk’s xAI a cease and desist order over sexual deepfakes

    17 January 2026

    Musk wants up to $134 billion in OpenAI lawsuit, despite $700 billion fortune

    17 January 2026

    From OpenAI offices to Eli Lilly deal – how Chai Discovery became one of the most impressive names in AI drug development

    16 January 2026

    Anthropic taps former Microsoft India Director to lead Bengaluru expansion

    16 January 2026

    Taiwan to invest $250 billion in US semiconductor manufacturing

    15 January 2026
  • Apps

    Gemini’s new beta feature provides predictive responses based on your photos, emails, and more

    17 January 2026

    Bluesky launches cashtags and LIVE badges amid push in app installs

    17 January 2026

    TikTok is quietly launching a micro-drama app called ‘PineDrama’

    16 January 2026

    Google’s Trends Explore page gets new Gemini features

    16 January 2026

    After Italy, WhatsApp exempts Brazil from rival chatbot ban

    15 January 2026
  • Crypto

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025

    Why Benchmark Made a Rare Crypto Bet on Trading App Fomo, with $17M Series A

    6 November 2025

    Solana co-founder Anatoly Yakovenko is a big fan of agentic coding

    30 October 2025

    MoviePass opens Mogul fantasy league game to the public

    29 October 2025
  • Fintech

    Fintech firm Betterment confirms data breach after hackers sent fake crypto scam alert to users

    12 January 2026

    Flutterwave buys Nigeria’s Mono in rare African fintech exit

    5 January 2026

    Even as global crop prices fall, India’s Arya.ag attracts investors – and remains profitable

    2 January 2026

    These 21-year-old school dropouts raise $2 million to launch Givefront, a fintech for nonprofits

    18 December 2025

    Google deepens consumer loyalty drive in India with UPI-linked card

    17 December 2025
  • Hardware

    Oshen built first ocean-going robot to collect data on a Category 5 hurricane

    17 January 2026

    US slaps 25% tariffs on Nvidia’s H200 AI chips headed to China

    15 January 2026

    The weirdest tech announced at CES 2026

    15 January 2026

    Google’s Gemini will power Apple’s AI features like Siri

    14 January 2026

    Pebble founder says his new company ‘isn’t a startup’

    14 January 2026
  • Media & Entertainment

    YouTube relaxes monetization guidelines for some controversial topics

    16 January 2026

    Bandcamp takes a stand against AI music, banning it from the platform

    15 January 2026

    Paramount filed a lawsuit against Warner Bros. amid the controversial Netflix merger

    13 January 2026

    Netflix had a huge night at the 2026 Golden Globes with 7 wins

    12 January 2026

    Spotify lowers monetization limit for video podcasts

    8 January 2026
  • Security

    Supreme Court Hacker Posts Stolen Government Data on Instagram

    17 January 2026

    Iran’s internet shutdown is now one of the longest as protests continue

    16 January 2026

    AI security company depthfirst announces $40M Series A

    14 January 2026

    Man pleads guilty to hacking US Supreme Court filing system

    14 January 2026

    Internet crashes in Iran amid protests over financial crisis

    9 January 2026
  • Startups

    SpaceX’s Indian rival EtherealX hits 5x valuation as it prepares for engine tests

    17 January 2026

    The rise of “micro” apps: non-developers write apps instead of buying them

    17 January 2026

    Cloud AI startup Runpod hits $120M in ARR — and it started with a Reddit post

    16 January 2026

    Parloa triples valuation in 8 months to $3 billion with $350 million raise

    16 January 2026

    AI video startup Higgsfield, founded by ex-Snap exec, valued at $1.3 billion

    15 January 2026
  • Transportation

    Chinese electric vehicles are closing in on the US as Canada slashes tariffs

    16 January 2026

    Tesla will only offer subscriptions for full self-driving (Supervision) in the future.

    15 January 2026

    The FTC’s data-sharing order against GM was finally settled

    15 January 2026

    The American cargo technology company has publicly exposed its shipping systems and customer data on the web

    14 January 2026

    New York’s governor paves the way for robotaxis everywhere, with one notable exception

    13 January 2026
  • Venture

    Tiger Global loses India tax case linked to Walmart-Flipkart deal in blow to offshore playbook

    15 January 2026

    The super-organization is raising $25 million to support biodiversity startups

    13 January 2026

    These Gen Zers just raised $11.75 million to put Africa’s defense back in the hands of Africans

    12 January 2026

    The venture firm that ate up Silicon Valley just raised another $15 billion

    9 January 2026

    Why This VC Thinks 2026 Will Be ‘The Year of the Consumer’

    8 January 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»Hackers who expose North Korean government hackers explain why they did
Security

Hackers who expose North Korean government hackers explain why they did

techtost.comBy techtost.com21 August 202504 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
Hackers Who Expose North Korean Government Hackers Explain Why They
Share
Facebook Twitter LinkedIn Pinterest Email

Earlier this year, two hackers broke on a computer and soon realized the importance of what this machine was. As it turned out, they had landed on the computer of a hacker allegedly working for the North Korean government.

The two hackers have decided to continue digging and finding out that they are saying that they associate the hacker with the Cybetespionage companies conducted by North Korea, the exploitation tools and the piracy and the infrastructure used in these activities.

Saber, one of the hackers involved, told TechCrunch that they had access to the computer of the North Korean government worker for about four months, but as soon as they realized which data had access, they realized that they had to eventually leak and expose what they had discovered.

“These nation-state hackers are hacking for all the wrong reasons. I hope more of them will be exposed, they deserve to be,” said Saber, who spoke to TechCrunch after him and Cyb0rg posted an article in the legendary hacking e-zine phrackrevealing details of their findings.

There are countless cyberspace companies and researchers and researchers closely monitoring anything that is the North Korean government and many hacking groups, which include espionage businesses, as well as increasing cryptographic robbers and broad businesses where the North Koreans are putting to the North Koreans.

In this case, Saber and CYB0RG went a step further and in fact lost hackers, a business that can give more or at least different information on how these government backed teams work, as well as “what they do on a daily basis and so on”, as Saber put it.

Hackers want to be known only by their handles, Saber and Cyb0rg, because they can face retaliation by the North Korean government and possibly others. Saber said they consider themselves hacktivists and the name of legendary hacktivist FishermanResponsible for Manufacturers Spyware Hacking Finn and Piracy groupas an inspiration.

TechCrunch event

Francisco
|
27-29 October 2025

At the same time, hackers also understand that what they did was illegal, but they thought it was still important to make it public.

“Maintaining him would not be really useful,” Saber said. “With the leak of everyone in the public, we hope that we can give researchers a few more ways to locate them.”

“Hopefully this will also lead to many of their current victims discovered and so [the North Korean hackers] Losing access, “he said.

“Illegal or not, this action has brought specific objects to the community, this is more important,” CYB0RG said in a message sent through Saber.

Saber said they were convinced that while the hacker – called “Kim” – works for North Korea’s regime, can be really Chinese and work for both governments, based on their findings that Kim did not work during the holidays in China.

Also, according to Saber, sometimes Kim translates some Korean documents into simplified Chinese using Google Translate.

Saber said he never tried to contact Kim. “I don’t think he will even hear, all he does is to empower his leaders, the same leaders who enslave his people,” he said. “I would probably like to tell him to use his knowledge in a way that helps people, not hurt them, but live in constant propaganda and probably from birth, so that makes no sense for him.” It refers to the strict gap of information that the North Koreans live, as they are largely reached by the outside world.

Saber refused to reveal how he and Cyb0rg have access to Kim’s computer, as they believe they can use the same techniques to “gain more access to their other systems in the same way”.

During their business, Saber and CYB0RG found elements of active halls made by Kim, against South Korean and Taiwan companies, which they say they came into contact and alerted.

North Korean hackers have a history of targeting people who also work in cyberspace. So Saber said he knows this danger, but “he doesn’t really worry.”

“There is not much to do with it, they are definitely more careful :),” Saber said.


We always try to evolve and by providing some image of your perspective and feedback on TechCrunch and our coverage and events, you can help us! Complete this survey to let us know how we are doing and to get the chance to win a prize in return!

cyberspace explain expose Gooseberry government hacker hackers hook infosec Korean North North Korea piracy
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleIncreasing multiple rounds of business capital may be wrong for your start
Next Article Apple TV+ Prices jumps 30% to $ 12.99 monthly
bhanuprakash.cg
techtost.com
  • Website

Related Posts

Supreme Court Hacker Posts Stolen Government Data on Instagram

17 January 2026

Iran’s internet shutdown is now one of the longest as protests continue

16 January 2026

AI security company depthfirst announces $40M Series A

14 January 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

SpaceX’s Indian rival EtherealX hits 5x valuation as it prepares for engine tests

17 January 2026

California AG sends Musk’s xAI a cease and desist order over sexual deepfakes

17 January 2026

Gemini’s new beta feature provides predictive responses based on your photos, emails, and more

17 January 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

Fintech firm Betterment confirms data breach after hackers sent fake crypto scam alert to users

12 January 2026

Flutterwave buys Nigeria’s Mono in rare African fintech exit

5 January 2026

Even as global crop prices fall, India’s Arya.ag attracts investors – and remains profitable

2 January 2026
Startups

SpaceX’s Indian rival EtherealX hits 5x valuation as it prepares for engine tests

The rise of “micro” apps: non-developers write apps instead of buying them

Cloud AI startup Runpod hits $120M in ARR — and it started with a Reddit post

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.