Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

NanoClaw creator rejects $20M takeover offer, raises $12M instead

The Quartermaster builds a sea hive mind

Startup Battlefield 200 applications close on May 27

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    Stability AI releases a new audio model that can create six-minute songs

    20 May 2026

    You can now speak in your Gmail inbox, as seen at Google IO 2026

    20 May 2026

    Anthropic has acquired the programming tools startup used by OpenAI, Google and Cloudflare

    19 May 2026

    SandboxAQ brings drug discovery models to Claude — no computer science PhD required

    19 May 2026

    Amazon’s new Alexa+ feature can create podcast episodes

    18 May 2026
  • Apps

    Figma adds an AI assistant to its collaborative canvas

    20 May 2026

    Google has just announced that it is a contender in AI design at IO 2026

    20 May 2026

    Apple announces accessibility feature updates with Apple Intelligence support

    19 May 2026

    Kin Health raises $9 million to build an AI notebook for patients

    19 May 2026

    Google brings AI and vibe-coded widgets to Android

    18 May 2026
  • Crypto

    As crypto cools, a16z crypto raises $2.2 billion in capital

    6 May 2026

    Coinbase to lay off 14% of staff as part of broader restructuring

    5 May 2026

    British cryptographer Adam Back denies NYT report that he is Bitcoin creator Satoshi Nakamoto

    9 April 2026

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025
  • Fintech

    Venmo’s biggest makeover in years comes at a very interesting time

    11 May 2026

    Fintech startup Parker files for bankruptcy

    10 May 2026

    Robinhood’s venture fund IPO attracted 150,000+ private investors, CEO says

    7 May 2026

    PayPal says it’s “becoming a tech company again” — that’s AI

    6 May 2026

    Stripe introduces Link, a digital wallet that autonomous AI agents can also use

    1 May 2026
  • Hardware

    Minimalist Light Phone teams up with Andrew Yang’s Noble Mobile, which pays you to stop doomscrolling

    20 May 2026

    Mach Industries just spent $50 million to solve a major defense technology problem

    20 May 2026

    South Korea’s LetinAR makes optics behind AI glasses

    18 May 2026

    Users are turning to jailbreaking their older Kindles as Amazon ends support

    17 May 2026

    Cerebras raises $5.5 billion, then shares soar to $108, first huge tech IPO of 2026

    15 May 2026
  • Media & Entertainment

    ‘Ask YouTube’ Brings AI Chat Search to Video, Adds Gemini Omni to Shorts

    20 May 2026

    Google’s Gemini Omni turns images, audio and text into video — and that’s just the beginning

    19 May 2026

    Theo Baker spent four years researching Stanford. Before he leaves, here’s what he found.

    19 May 2026

    YouTube viewers watch 2 billion hours of Shorts on TV every month

    14 May 2026

    Digg is trying again, this time as an AI news aggregator

    12 May 2026
  • Security

    US cyber agency CISA has exposed bundles of passwords and cloud keys to the open web

    19 May 2026

    Open source tools maker Grafana Labs says hackers stole its code and refuses to pay ransom

    19 May 2026

    NYC Health + Hospitals says hackers stole medical data and fingerprints during breach affecting at least 1.8 million people

    18 May 2026

    Instructure strikes against hackers who breached it twice

    17 May 2026

    US lawmakers demand answers from Instructure after Canvas data breaches

    16 May 2026
  • Startups

    NanoClaw creator rejects $20M takeover offer, raises $12M instead

    20 May 2026

    From teenage hacker to Iron Dome researcher, this founder raised $28M to fight AI phishing

    20 May 2026

    “Survivor” stars Kyle Fraser and Kamilla Karthigesu present a goal-tracking app, Paprclip

    19 May 2026

    Clio’s $500 million milestone comes just as Anthropic steps up to first stage

    15 May 2026

    Startup Battlefield 200 applications close on May 27

    14 May 2026
  • Transportation

    The Quartermaster builds a sea hive mind

    20 May 2026

    OSHA is investigating the death of a worker at SpaceX’s Starbase site

    19 May 2026

    TechCrunch Mobility: The AI ​​skills arms race is coming for the automotive industry

    18 May 2026

    Tesla Reveals Two Robotaxi Accidents With Remote Controls

    16 May 2026

    RJ Scaringe has raised more than $12 billion in three startups, and investors still want more

    16 May 2026
  • Venture

    Startup Battlefield 200 applications close on May 27

    20 May 2026

    Stilta raises $10.5M from a16z and YC to help companies rediscover patents they forgot they had

    20 May 2026

    Forget Streaming: Status AI Raises $17 Million To Turn Social Media Into Interactive Entertainment

    19 May 2026

    For Eclipse, the $2.5 billion Cerebras win is just the beginning of realizing its physical world thesis

    17 May 2026

    General Catalyst posted VC rage bait and it worked, especially on a16z

    16 May 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»Hackers who expose North Korean government hackers explain why they did
Security

Hackers who expose North Korean government hackers explain why they did

techtost.comBy techtost.com21 August 202504 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
Hackers Who Expose North Korean Government Hackers Explain Why They
Share
Facebook Twitter LinkedIn Pinterest Email

Earlier this year, two hackers broke on a computer and soon realized the importance of what this machine was. As it turned out, they had landed on the computer of a hacker allegedly working for the North Korean government.

The two hackers have decided to continue digging and finding out that they are saying that they associate the hacker with the Cybetespionage companies conducted by North Korea, the exploitation tools and the piracy and the infrastructure used in these activities.

Saber, one of the hackers involved, told TechCrunch that they had access to the computer of the North Korean government worker for about four months, but as soon as they realized which data had access, they realized that they had to eventually leak and expose what they had discovered.

“These nation-state hackers are hacking for all the wrong reasons. I hope more of them will be exposed, they deserve to be,” said Saber, who spoke to TechCrunch after him and Cyb0rg posted an article in the legendary hacking e-zine phrackrevealing details of their findings.

There are countless cyberspace companies and researchers and researchers closely monitoring anything that is the North Korean government and many hacking groups, which include espionage businesses, as well as increasing cryptographic robbers and broad businesses where the North Koreans are putting to the North Koreans.

In this case, Saber and CYB0RG went a step further and in fact lost hackers, a business that can give more or at least different information on how these government backed teams work, as well as “what they do on a daily basis and so on”, as Saber put it.

Hackers want to be known only by their handles, Saber and Cyb0rg, because they can face retaliation by the North Korean government and possibly others. Saber said they consider themselves hacktivists and the name of legendary hacktivist FishermanResponsible for Manufacturers Spyware Hacking Finn and Piracy groupas an inspiration.

TechCrunch event

Francisco
|
27-29 October 2025

At the same time, hackers also understand that what they did was illegal, but they thought it was still important to make it public.

“Maintaining him would not be really useful,” Saber said. “With the leak of everyone in the public, we hope that we can give researchers a few more ways to locate them.”

“Hopefully this will also lead to many of their current victims discovered and so [the North Korean hackers] Losing access, “he said.

“Illegal or not, this action has brought specific objects to the community, this is more important,” CYB0RG said in a message sent through Saber.

Saber said they were convinced that while the hacker – called “Kim” – works for North Korea’s regime, can be really Chinese and work for both governments, based on their findings that Kim did not work during the holidays in China.

Also, according to Saber, sometimes Kim translates some Korean documents into simplified Chinese using Google Translate.

Saber said he never tried to contact Kim. “I don’t think he will even hear, all he does is to empower his leaders, the same leaders who enslave his people,” he said. “I would probably like to tell him to use his knowledge in a way that helps people, not hurt them, but live in constant propaganda and probably from birth, so that makes no sense for him.” It refers to the strict gap of information that the North Koreans live, as they are largely reached by the outside world.

Saber refused to reveal how he and Cyb0rg have access to Kim’s computer, as they believe they can use the same techniques to “gain more access to their other systems in the same way”.

During their business, Saber and CYB0RG found elements of active halls made by Kim, against South Korean and Taiwan companies, which they say they came into contact and alerted.

North Korean hackers have a history of targeting people who also work in cyberspace. So Saber said he knows this danger, but “he doesn’t really worry.”

“There is not much to do with it, they are definitely more careful :),” Saber said.


We always try to evolve and by providing some image of your perspective and feedback on TechCrunch and our coverage and events, you can help us! Complete this survey to let us know how we are doing and to get the chance to win a prize in return!

cyberspace explain expose Gooseberry government hacker hackers hook infosec Korean North North Korea piracy
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleIncreasing multiple rounds of business capital may be wrong for your start
Next Article Apple TV+ Prices jumps 30% to $ 12.99 monthly
bhanuprakash.cg
techtost.com
  • Website

Related Posts

From teenage hacker to Iron Dome researcher, this founder raised $28M to fight AI phishing

20 May 2026

US cyber agency CISA has exposed bundles of passwords and cloud keys to the open web

19 May 2026

Open source tools maker Grafana Labs says hackers stole its code and refuses to pay ransom

19 May 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

NanoClaw creator rejects $20M takeover offer, raises $12M instead

20 May 2026

The Quartermaster builds a sea hive mind

20 May 2026

Startup Battlefield 200 applications close on May 27

20 May 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

Venmo’s biggest makeover in years comes at a very interesting time

11 May 2026

Fintech startup Parker files for bankruptcy

10 May 2026

Robinhood’s venture fund IPO attracted 150,000+ private investors, CEO says

7 May 2026
Startups

NanoClaw creator rejects $20M takeover offer, raises $12M instead

From teenage hacker to Iron Dome researcher, this founder raised $28M to fight AI phishing

“Survivor” stars Kyle Fraser and Kamilla Karthigesu present a goal-tracking app, Paprclip

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.