Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

Eclipse Energy’s microbes can turn dormant oil wells into hydrogen factories

Inside Rivian’s big bet on self-driving with artificial intelligence

DoorDash driver faces felony charges after allegedly spraying customers’ food

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    Trump’s AI executive order promises ‘a rulebook’ – startups may find legal loophole instead

    13 December 2025

    Ok, so what’s up with the LinkedIn algo?

    12 December 2025

    Google Released Its Deepest Research AI Agent To Date — The Same Day OpenAI Dropped GPT-5.2

    12 December 2025

    Disney hits Google with cease and desist alleging ‘massive’ copyright infringement

    11 December 2025

    Google’s answer to the AI ​​arms race — promote the guy behind its data center technology

    11 December 2025
  • Apps

    DoorDash driver faces felony charges after allegedly spraying customers’ food

    13 December 2025

    Google Translate now lets you listen to real-time translations on your headphones

    13 December 2025

    With iOS 26.2, Apple lets you bring back Liquid Glass again — this time on the lock screen

    12 December 2025

    World launches its ‘super app’, including payment encryption and encrypted chat features

    12 December 2025

    Epic Games’ Fortnite is back on the US Google Play Store after a court partially lifted the restrictions it won on iOS

    11 December 2025
  • Crypto

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025

    Why Benchmark Made a Rare Crypto Bet on Trading App Fomo, with $17M Series A

    6 November 2025

    Solana co-founder Anatoly Yakovenko is a big fan of agentic coding

    30 October 2025

    MoviePass opens Mogul fantasy league game to the public

    29 October 2025

    Only 5 days until Disrupt 2025 sets the startup world on fire

    22 October 2025
  • Fintech

    Coinbase starts onboarding users again in India, plans to do fiat on-ramp next year

    7 December 2025

    Walmart-backed PhonePe shuts down Pincode app in yet another step back in e-commerce

    5 December 2025

    Nexus stays out of AI, keeping half of its new $700M fund for India startup

    4 December 2025

    Fintech firm Marquis notifies dozens of US banks and credit unions of data breach after ransomware attack

    3 December 2025

    Revolut hits $75 billion valuation in new capital raise

    24 November 2025
  • Hardware

    Pebble founder unveils $75 AI smart ring to record short notes with the push of a button

    10 December 2025

    Amazon’s Ring launches controversial AI-powered facial recognition feature on video doorbells

    10 December 2025

    Google’s first AI glasses are expected next year

    9 December 2025

    eSIM adoption is on the rise thanks to travel and device compatibility

    6 December 2025

    AWS re:Invent was an all-in pitch for AI. Customers may not be ready.

    5 December 2025
  • Media & Entertainment

    Disney signs deal with OpenAI to allow Sora to create AI videos with its characters

    11 December 2025

    YouTube TV will launch genre-based subscription plans in 2026

    11 December 2025

    Founder of AI startup Tavus says users talk to AI Santa ‘for hours’ a day

    10 December 2025

    Spotify releases music videos in the US and Canada for Premium subscribers

    9 December 2025

    Amazon Music’s 2025 Delivered is now here to compete with Spotify Wrapped

    9 December 2025
  • Security

    The flaw in the photo booth manufacturer’s website exposes customers’ photos

    13 December 2025

    Home Depot exposed access to internal systems for a year, researcher says

    13 December 2025

    Security flaws in the Freedom Chat app exposed users’ phone numbers and PINs

    11 December 2025

    Petco takes down Vetco website after exposing customers’ personal information

    10 December 2025

    Petco’s security bug affected customers’ SSNs, driver’s licenses and more

    9 December 2025
  • Startups

    Eclipse Energy’s microbes can turn dormant oil wells into hydrogen factories

    13 December 2025

    Interest in Spoor’s AI bird tracking software is soaring

    13 December 2025

    Retro, a photo-sharing app for friends, lets you ‘time travel’ to your camera roll

    12 December 2025

    On Me Raises $6M to Shake Up the Gift Card Industry

    12 December 2025

    1X has struck a deal to send its ‘homemade’ humanoids to factories and warehouses

    11 December 2025
  • Transportation

    Inside Rivian’s big bet on self-driving with artificial intelligence

    13 December 2025

    Zevo wants to add robotaxis to its car-sharing fleet, starting with newcomer Tensor

    13 December 2025

    Driving aboard Rivian’s fight for autonomy

    12 December 2025

    Rivian goes big on autonomy, with custom silicon, lidar and a hint of robotaxis

    12 December 2025

    Rivian’s AI assistant is coming to its electrics in early 2026

    11 December 2025
  • Venture

    Runware raises $50 million in Series A to make it easier for developers to create images and videos

    12 December 2025

    Stanford’s star reporter understands Silicon Valley’s startup culture

    12 December 2025

    The market has “changed” and founders now have the power, VCs say

    11 December 2025

    Tiger Global plans cautious business future with new $2.2 billion fund

    8 December 2025

    Sources: AI-powered synthetic research startup Aaru raises Series A at $1B ‘headline’ valuation

    6 December 2025
  • Recommended Essentials
TechTost
You are at:Home»Security»Hackers who expose North Korean government hackers explain why they did
Security

Hackers who expose North Korean government hackers explain why they did

techtost.comBy techtost.com21 August 202504 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
Hackers Who Expose North Korean Government Hackers Explain Why They
Share
Facebook Twitter LinkedIn Pinterest Email

Earlier this year, two hackers broke on a computer and soon realized the importance of what this machine was. As it turned out, they had landed on the computer of a hacker allegedly working for the North Korean government.

The two hackers have decided to continue digging and finding out that they are saying that they associate the hacker with the Cybetespionage companies conducted by North Korea, the exploitation tools and the piracy and the infrastructure used in these activities.

Saber, one of the hackers involved, told TechCrunch that they had access to the computer of the North Korean government worker for about four months, but as soon as they realized which data had access, they realized that they had to eventually leak and expose what they had discovered.

“These nation-state hackers are hacking for all the wrong reasons. I hope more of them will be exposed, they deserve to be,” said Saber, who spoke to TechCrunch after him and Cyb0rg posted an article in the legendary hacking e-zine phrackrevealing details of their findings.

There are countless cyberspace companies and researchers and researchers closely monitoring anything that is the North Korean government and many hacking groups, which include espionage businesses, as well as increasing cryptographic robbers and broad businesses where the North Koreans are putting to the North Koreans.

In this case, Saber and CYB0RG went a step further and in fact lost hackers, a business that can give more or at least different information on how these government backed teams work, as well as “what they do on a daily basis and so on”, as Saber put it.

Hackers want to be known only by their handles, Saber and Cyb0rg, because they can face retaliation by the North Korean government and possibly others. Saber said they consider themselves hacktivists and the name of legendary hacktivist FishermanResponsible for Manufacturers Spyware Hacking Finn and Piracy groupas an inspiration.

TechCrunch event

Francisco
|
27-29 October 2025

At the same time, hackers also understand that what they did was illegal, but they thought it was still important to make it public.

“Maintaining him would not be really useful,” Saber said. “With the leak of everyone in the public, we hope that we can give researchers a few more ways to locate them.”

“Hopefully this will also lead to many of their current victims discovered and so [the North Korean hackers] Losing access, “he said.

“Illegal or not, this action has brought specific objects to the community, this is more important,” CYB0RG said in a message sent through Saber.

Saber said they were convinced that while the hacker – called “Kim” – works for North Korea’s regime, can be really Chinese and work for both governments, based on their findings that Kim did not work during the holidays in China.

Also, according to Saber, sometimes Kim translates some Korean documents into simplified Chinese using Google Translate.

Saber said he never tried to contact Kim. “I don’t think he will even hear, all he does is to empower his leaders, the same leaders who enslave his people,” he said. “I would probably like to tell him to use his knowledge in a way that helps people, not hurt them, but live in constant propaganda and probably from birth, so that makes no sense for him.” It refers to the strict gap of information that the North Koreans live, as they are largely reached by the outside world.

Saber refused to reveal how he and Cyb0rg have access to Kim’s computer, as they believe they can use the same techniques to “gain more access to their other systems in the same way”.

During their business, Saber and CYB0RG found elements of active halls made by Kim, against South Korean and Taiwan companies, which they say they came into contact and alerted.

North Korean hackers have a history of targeting people who also work in cyberspace. So Saber said he knows this danger, but “he doesn’t really worry.”

“There is not much to do with it, they are definitely more careful :),” Saber said.


We always try to evolve and by providing some image of your perspective and feedback on TechCrunch and our coverage and events, you can help us! Complete this survey to let us know how we are doing and to get the chance to win a prize in return!

cyberspace explain expose Gooseberry government hacker hackers hook infosec Korean North North Korea piracy
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleIncreasing multiple rounds of business capital may be wrong for your start
Next Article Apple TV+ Prices jumps 30% to $ 12.99 monthly
bhanuprakash.cg
techtost.com
  • Website

Related Posts

The flaw in the photo booth manufacturer’s website exposes customers’ photos

13 December 2025

Home Depot exposed access to internal systems for a year, researcher says

13 December 2025

Security flaws in the Freedom Chat app exposed users’ phone numbers and PINs

11 December 2025
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

Eclipse Energy’s microbes can turn dormant oil wells into hydrogen factories

13 December 2025

Inside Rivian’s big bet on self-driving with artificial intelligence

13 December 2025

DoorDash driver faces felony charges after allegedly spraying customers’ food

13 December 2025
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

Coinbase starts onboarding users again in India, plans to do fiat on-ramp next year

7 December 2025

Walmart-backed PhonePe shuts down Pincode app in yet another step back in e-commerce

5 December 2025

Nexus stays out of AI, keeping half of its new $700M fund for India startup

4 December 2025
Startups

Eclipse Energy’s microbes can turn dormant oil wells into hydrogen factories

Interest in Spoor’s AI bird tracking software is soaring

Retro, a photo-sharing app for friends, lets you ‘time travel’ to your camera roll

© 2025 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.