Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

VeraCrypt encryption software developer says Windows users may experience startup problems after Microsoft shuts down its account

What founders can learn from Anjuna’s layoffs and recovery

Volkswagen is dropping the all-electric ID.4 in the U.S

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    ChatGPT finally offers $100/month plan

    10 April 2026

    AWS boss explains why investing billions in both Anthropic and OpenAI is an okay conflict

    9 April 2026

    Poke makes using AI agents as easy as sending a text

    9 April 2026

    Last 3 days to save up to $500 on your Disrupt 2026 Pass

    8 April 2026

    I can’t help but root for tiny open source AI model maker Arcee

    8 April 2026
  • Apps

    The EFF is the latest organization to leave X

    10 April 2026

    Last 2 days to save up to $500 on your Disrupt 2026 ticket

    9 April 2026

    Canva Doubles Down on AI and Marketing Automation with Simtheory, Ortto Acquisitions

    9 April 2026

    Atlassian launches visual AI tools and third-party agents in Confluence

    8 April 2026

    Chrome is finally adding a better way to deal with too many open tabs

    8 April 2026
  • Crypto

    British cryptographer Adam Back denies NYT report that he is Bitcoin creator Satoshi Nakamoto

    9 April 2026

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025

    Why Benchmark Made a Rare Crypto Bet on Trading App Fomo, with $17M Series A

    6 November 2025

    Solana co-founder Anatoly Yakovenko is a big fan of agentic coding

    30 October 2025
  • Fintech

    Cash app launches ‘pay later’ feature for P2P transfers

    3 April 2026

    Doss raises $55 million for AI inventory management that connects to ERP

    24 March 2026

    Despite stiff competition, Kalshi, Polymarket CEOs back $35m VC fund projections

    23 March 2026

    Amid legal turmoil, Kalshi is temporarily banned in Nevada

    20 March 2026

    Nominations for the Startup Battlefield 200 are still open

    19 March 2026
  • Hardware

    Amazon is ending support for older Kindle devices

    9 April 2026

    Intel signs Elon Musk’s Terafab chip project

    8 April 2026

    The Xiaomi 17 Ultra has some impressive extras that make taking photos really fun

    6 April 2026

    In Japan, the robot doesn’t come for your job. fills the one no one wants

    6 April 2026

    Peter Thiel’s big bet on solar-powered cow collars

    5 April 2026
  • Media & Entertainment

    Spotify now allows everyone to turn off videos in its app

    9 April 2026

    As YouTube expands into TV, it sees more interactive video across all formats

    9 April 2026

    Tubi is the first streamer to launch a native app on ChatGPT

    8 April 2026

    Binge is a movie watching app that warns you about skips in real time

    7 April 2026

    Netflix is ​​expanding into kids’ games with a new standalone app

    6 April 2026
  • Security

    VeraCrypt encryption software developer says Windows users may experience startup problems after Microsoft shuts down its account

    10 April 2026

    Hackers steal and leak sensitive LAPD police documents

    9 April 2026

    The developer of WireGuard VPN cannot send software updates after Microsoft locks the account

    9 April 2026

    Hack-for-hire group caught targeting Android devices and iCloud backups

    8 April 2026

    Iranian hackers are targeting critical US infrastructure, US agencies warn

    8 April 2026
  • Startups

    What founders can learn from Anjuna’s layoffs and recovery

    10 April 2026

    Former Tesla engineer’s startup taps Pronto to help automate a copper mine

    9 April 2026

    Databricks co-founder wins prestigious ACM award, says ‘AGI is already here’

    9 April 2026

    Why a former AirPods engineer is now building heat pumps

    8 April 2026

    AI startup Rocket offers McKinsey-style reporting at a fraction of the cost

    7 April 2026
  • Transportation

    Volkswagen is dropping the all-electric ID.4 in the U.S

    10 April 2026

    Waymo robotaxis tracks potholes and shares that data with Waze users

    9 April 2026

    Self-driving car in Texas hits and kills mother duck, sparking neighborhood outrage

    9 April 2026

    Hermeus raises $350 million to build unmanned hypersonic fighters

    8 April 2026

    Waymo opens robotaxi service in Nashville, partners with Lyft

    7 April 2026
  • Venture

    How to make the Startup Battlefield Top 20 — and what each company gets regardless

    10 April 2026

    Collide Capital Raises $95M to Back Future-of-Work Fintech Startups

    9 April 2026

    VC Eclipse has a new $1.3 billion fund to back — and build — “natural AI” startups

    8 April 2026

    The AI ​​gold rush is pulling private wealth into riskier, older bets

    7 April 2026

    Save up to $500 on tickets this week for Disrupt 2026

    6 April 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»Hackers who expose North Korean government hackers explain why they did
Security

Hackers who expose North Korean government hackers explain why they did

techtost.comBy techtost.com21 August 202504 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
Hackers Who Expose North Korean Government Hackers Explain Why They
Share
Facebook Twitter LinkedIn Pinterest Email

Earlier this year, two hackers broke on a computer and soon realized the importance of what this machine was. As it turned out, they had landed on the computer of a hacker allegedly working for the North Korean government.

The two hackers have decided to continue digging and finding out that they are saying that they associate the hacker with the Cybetespionage companies conducted by North Korea, the exploitation tools and the piracy and the infrastructure used in these activities.

Saber, one of the hackers involved, told TechCrunch that they had access to the computer of the North Korean government worker for about four months, but as soon as they realized which data had access, they realized that they had to eventually leak and expose what they had discovered.

“These nation-state hackers are hacking for all the wrong reasons. I hope more of them will be exposed, they deserve to be,” said Saber, who spoke to TechCrunch after him and Cyb0rg posted an article in the legendary hacking e-zine phrackrevealing details of their findings.

There are countless cyberspace companies and researchers and researchers closely monitoring anything that is the North Korean government and many hacking groups, which include espionage businesses, as well as increasing cryptographic robbers and broad businesses where the North Koreans are putting to the North Koreans.

In this case, Saber and CYB0RG went a step further and in fact lost hackers, a business that can give more or at least different information on how these government backed teams work, as well as “what they do on a daily basis and so on”, as Saber put it.

Hackers want to be known only by their handles, Saber and Cyb0rg, because they can face retaliation by the North Korean government and possibly others. Saber said they consider themselves hacktivists and the name of legendary hacktivist FishermanResponsible for Manufacturers Spyware Hacking Finn and Piracy groupas an inspiration.

TechCrunch event

Francisco
|
27-29 October 2025

At the same time, hackers also understand that what they did was illegal, but they thought it was still important to make it public.

“Maintaining him would not be really useful,” Saber said. “With the leak of everyone in the public, we hope that we can give researchers a few more ways to locate them.”

“Hopefully this will also lead to many of their current victims discovered and so [the North Korean hackers] Losing access, “he said.

“Illegal or not, this action has brought specific objects to the community, this is more important,” CYB0RG said in a message sent through Saber.

Saber said they were convinced that while the hacker – called “Kim” – works for North Korea’s regime, can be really Chinese and work for both governments, based on their findings that Kim did not work during the holidays in China.

Also, according to Saber, sometimes Kim translates some Korean documents into simplified Chinese using Google Translate.

Saber said he never tried to contact Kim. “I don’t think he will even hear, all he does is to empower his leaders, the same leaders who enslave his people,” he said. “I would probably like to tell him to use his knowledge in a way that helps people, not hurt them, but live in constant propaganda and probably from birth, so that makes no sense for him.” It refers to the strict gap of information that the North Koreans live, as they are largely reached by the outside world.

Saber refused to reveal how he and Cyb0rg have access to Kim’s computer, as they believe they can use the same techniques to “gain more access to their other systems in the same way”.

During their business, Saber and CYB0RG found elements of active halls made by Kim, against South Korean and Taiwan companies, which they say they came into contact and alerted.

North Korean hackers have a history of targeting people who also work in cyberspace. So Saber said he knows this danger, but “he doesn’t really worry.”

“There is not much to do with it, they are definitely more careful :),” Saber said.


We always try to evolve and by providing some image of your perspective and feedback on TechCrunch and our coverage and events, you can help us! Complete this survey to let us know how we are doing and to get the chance to win a prize in return!

cyberspace explain expose Gooseberry government hacker hackers hook infosec Korean North North Korea piracy
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleIncreasing multiple rounds of business capital may be wrong for your start
Next Article Apple TV+ Prices jumps 30% to $ 12.99 monthly
bhanuprakash.cg
techtost.com
  • Website

Related Posts

VeraCrypt encryption software developer says Windows users may experience startup problems after Microsoft shuts down its account

10 April 2026

Hackers steal and leak sensitive LAPD police documents

9 April 2026

The developer of WireGuard VPN cannot send software updates after Microsoft locks the account

9 April 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

VeraCrypt encryption software developer says Windows users may experience startup problems after Microsoft shuts down its account

10 April 2026

What founders can learn from Anjuna’s layoffs and recovery

10 April 2026

Volkswagen is dropping the all-electric ID.4 in the U.S

10 April 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

Cash app launches ‘pay later’ feature for P2P transfers

3 April 2026

Doss raises $55 million for AI inventory management that connects to ERP

24 March 2026

Despite stiff competition, Kalshi, Polymarket CEOs back $35m VC fund projections

23 March 2026
Startups

What founders can learn from Anjuna’s layoffs and recovery

Former Tesla engineer’s startup taps Pronto to help automate a copper mine

Databricks co-founder wins prestigious ACM award, says ‘AGI is already here’

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.