Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

Spotify introduces verified artist badges to distinguish humans from artificial intelligence

Bill Gurley, Jack Altman back startup Pursuit, which helps companies sell to the government

Sources: Anthropic Could Raise New $50B Round at $900B Valuation

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    Amazon’s cloud business is growing — and so is its capital spending

    30 April 2026

    Firestorm Labs raises $82 million to bring drone factories to the field

    29 April 2026

    YouTube is testing an AI-powered search feature that shows guided answers

    28 April 2026

    OpenAI ends Microsoft’s legal risk over $50 billion Amazon deal

    28 April 2026

    China blocks Meta’s $2 billion deal with Manus after months-long investigation

    27 April 2026
  • Apps

    Spotify introduces verified artist badges to distinguish humans from artificial intelligence

    30 April 2026

    Google gains 25 million subscribers in Q1, thanks to YouTube and Google One

    30 April 2026

    Meet Shapes, the app that brings humans and artificial intelligence into the same group chats

    29 April 2026

    Amazon is launching an AI-powered audio Q&A experience on product pages

    29 April 2026

    Snapchat is bringing AI-powered chat ads to its app

    28 April 2026
  • Crypto

    British cryptographer Adam Back denies NYT report that he is Bitcoin creator Satoshi Nakamoto

    9 April 2026

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025

    Why Benchmark Made a Rare Crypto Bet on Trading App Fomo, with $17M Series A

    6 November 2025

    Solana co-founder Anatoly Yakovenko is a big fan of agentic coding

    30 October 2025
  • Fintech

    Amazon, Meta join the fight to end Google Pay and PhonePe’s dominance in India

    30 April 2026

    Steve Ballmer slams founder he backed, who pleaded guilty to fraud: ‘I was cheated and I feel stupid’

    25 April 2026

    Salmon raises $100 million in equity and debt to bring digital credit to unbanked Filipinos

    24 April 2026

    Cash App targets a new type of customer: children aged 6 to 12 years

    22 April 2026

    Revolut eyes up to $200 billion valuation in potential IPO

    22 April 2026
  • Hardware

    More Gemini features are coming to Google TV

    30 April 2026

    OpenAI could be building a phone with AI agents that replace apps

    28 April 2026

    SpeakOn’s dictation device is a good idea marred by platform limitations

    27 April 2026

    What Tim Cook Built | TechCrunch

    27 April 2026

    Apple under Ternus: what’s next for the tech giant’s hardware strategy

    26 April 2026
  • Media & Entertainment

    Roku’s $3 streaming service Howdy hits 1 million subscribers, per recent report

    29 April 2026

    Australia forces Big Tech companies to pay for news or face 2.25% tax.

    28 April 2026

    India’s app market is booming — but global platforms are raking in most of the profits

    23 April 2026

    YouTube extends its AI similarity detection technology to celebrities

    21 April 2026

    Deezer says 44% of songs uploaded to its platform every day are created with artificial intelligence

    20 April 2026
  • Security

    Sri Lanka reveals another missing payment, days after hackers stole $2.5 million from its finance ministry

    29 April 2026

    The US Supreme Court appears divided on the controversial use of ‘geofence’ search warrants.

    29 April 2026

    Paragon is not cooperating with Italian authorities investigating spyware attacks, the report said

    28 April 2026

    Critical infrastructure giant Itron says it was breached

    28 April 2026

    The hacker who allegedly carried out cyberattacks for China is extradited to the US

    27 April 2026
  • Startups

    Bill Gurley, Jack Altman back startup Pursuit, which helps companies sell to the government

    30 April 2026

    BCI startup Neurable wants to license ‘mind reading’ technology to wearable consumer devices

    29 April 2026

    Founder of Shark Tank-backed startup Sholly sues buyer Sallie Mae

    29 April 2026

    Lachy Groom to back Indian startup Pronto at $200m valuation, sources say

    26 April 2026

    Why Tokyo is the most important tech destination of 2026

    25 April 2026
  • Transportation

    Uber is now in the hospitality industry, thanks in part to artificial intelligence

    29 April 2026

    TechCrunch Mobility: Elon’s Acceptance | TechCrunch

    27 April 2026

    Production of the Rivian R2 has begun despite tornado damage at the factory

    25 April 2026

    Porsche is adding an all-electric Cayenne coupe to its lineup

    24 April 2026

    Tesla’s Q1 revenue rises, driven by EV sales and FSD subscriptions

    24 April 2026
  • Venture

    Sources: Anthropic Could Raise New $50B Round at $900B Valuation

    30 April 2026

    BMW i Ventures Has a New $300M Fund and AI Rides Shotgun

    29 April 2026

    How a venture firm invests in an increasingly fragmented world

    29 April 2026

    Stanford freshmen who want to rule the world. . . he will probably read this book and try even harder

    27 April 2026

    India’s Snabbit is seeking fresh funding at a $400 million valuation, sources say

    25 April 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»Hackers who expose North Korean government hackers explain why they did
Security

Hackers who expose North Korean government hackers explain why they did

techtost.comBy techtost.com21 August 202504 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
Hackers Who Expose North Korean Government Hackers Explain Why They
Share
Facebook Twitter LinkedIn Pinterest Email

Earlier this year, two hackers broke on a computer and soon realized the importance of what this machine was. As it turned out, they had landed on the computer of a hacker allegedly working for the North Korean government.

The two hackers have decided to continue digging and finding out that they are saying that they associate the hacker with the Cybetespionage companies conducted by North Korea, the exploitation tools and the piracy and the infrastructure used in these activities.

Saber, one of the hackers involved, told TechCrunch that they had access to the computer of the North Korean government worker for about four months, but as soon as they realized which data had access, they realized that they had to eventually leak and expose what they had discovered.

“These nation-state hackers are hacking for all the wrong reasons. I hope more of them will be exposed, they deserve to be,” said Saber, who spoke to TechCrunch after him and Cyb0rg posted an article in the legendary hacking e-zine phrackrevealing details of their findings.

There are countless cyberspace companies and researchers and researchers closely monitoring anything that is the North Korean government and many hacking groups, which include espionage businesses, as well as increasing cryptographic robbers and broad businesses where the North Koreans are putting to the North Koreans.

In this case, Saber and CYB0RG went a step further and in fact lost hackers, a business that can give more or at least different information on how these government backed teams work, as well as “what they do on a daily basis and so on”, as Saber put it.

Hackers want to be known only by their handles, Saber and Cyb0rg, because they can face retaliation by the North Korean government and possibly others. Saber said they consider themselves hacktivists and the name of legendary hacktivist FishermanResponsible for Manufacturers Spyware Hacking Finn and Piracy groupas an inspiration.

TechCrunch event

Francisco
|
27-29 October 2025

At the same time, hackers also understand that what they did was illegal, but they thought it was still important to make it public.

“Maintaining him would not be really useful,” Saber said. “With the leak of everyone in the public, we hope that we can give researchers a few more ways to locate them.”

“Hopefully this will also lead to many of their current victims discovered and so [the North Korean hackers] Losing access, “he said.

“Illegal or not, this action has brought specific objects to the community, this is more important,” CYB0RG said in a message sent through Saber.

Saber said they were convinced that while the hacker – called “Kim” – works for North Korea’s regime, can be really Chinese and work for both governments, based on their findings that Kim did not work during the holidays in China.

Also, according to Saber, sometimes Kim translates some Korean documents into simplified Chinese using Google Translate.

Saber said he never tried to contact Kim. “I don’t think he will even hear, all he does is to empower his leaders, the same leaders who enslave his people,” he said. “I would probably like to tell him to use his knowledge in a way that helps people, not hurt them, but live in constant propaganda and probably from birth, so that makes no sense for him.” It refers to the strict gap of information that the North Koreans live, as they are largely reached by the outside world.

Saber refused to reveal how he and Cyb0rg have access to Kim’s computer, as they believe they can use the same techniques to “gain more access to their other systems in the same way”.

During their business, Saber and CYB0RG found elements of active halls made by Kim, against South Korean and Taiwan companies, which they say they came into contact and alerted.

North Korean hackers have a history of targeting people who also work in cyberspace. So Saber said he knows this danger, but “he doesn’t really worry.”

“There is not much to do with it, they are definitely more careful :),” Saber said.


We always try to evolve and by providing some image of your perspective and feedback on TechCrunch and our coverage and events, you can help us! Complete this survey to let us know how we are doing and to get the chance to win a prize in return!

cyberspace explain expose Gooseberry government hacker hackers hook infosec Korean North North Korea piracy
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleIncreasing multiple rounds of business capital may be wrong for your start
Next Article Apple TV+ Prices jumps 30% to $ 12.99 monthly
bhanuprakash.cg
techtost.com
  • Website

Related Posts

Bill Gurley, Jack Altman back startup Pursuit, which helps companies sell to the government

30 April 2026

Sri Lanka reveals another missing payment, days after hackers stole $2.5 million from its finance ministry

29 April 2026

The US Supreme Court appears divided on the controversial use of ‘geofence’ search warrants.

29 April 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

Spotify introduces verified artist badges to distinguish humans from artificial intelligence

30 April 2026

Bill Gurley, Jack Altman back startup Pursuit, which helps companies sell to the government

30 April 2026

Sources: Anthropic Could Raise New $50B Round at $900B Valuation

30 April 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

Amazon, Meta join the fight to end Google Pay and PhonePe’s dominance in India

30 April 2026

Steve Ballmer slams founder he backed, who pleaded guilty to fraud: ‘I was cheated and I feel stupid’

25 April 2026

Salmon raises $100 million in equity and debt to bring digital credit to unbanked Filipinos

24 April 2026
Startups

Bill Gurley, Jack Altman back startup Pursuit, which helps companies sell to the government

BCI startup Neurable wants to license ‘mind reading’ technology to wearable consumer devices

Founder of Shark Tank-backed startup Sholly sues buyer Sallie Mae

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.