{"id":58133,"date":"2024-10-18T07:01:15","date_gmt":"2024-10-18T07:01:15","guid":{"rendered":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/18\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\/"},"modified":"2024-10-18T07:02:43","modified_gmt":"2024-10-18T07:02:43","slug":"biz-extorted-after-hiring-fake-north-korean-it-worker-the-register","status":"publish","type":"post","link":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/18\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\/","title":{"rendered":"Biz extorted after hiring fake North Korean IT worker \u2022 The Register"},"content":{"rendered":"<p> <a href=\"https:\/\/go.fiverr.com\/visit\/?bta=1052423&nci=17043\" Target=\"_Top\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/fiverr.ck-cdn.com\/tn\/serve\/?cid=40081059\"  width=\"601\" height=\"201\"><\/a>\n<\/p>\n<div id=\"body\">\n<p>It is a sample cropping up increasingly more often: an organization fills an IT contractor submit, not realizing it is mistakenly employed a North Korean operative. The phony employee virtually instantly begins exfiltrating delicate information, earlier than being fired for poor efficiency. Then the six-figure ransom calls for \u2013 accompanied by proof of the stolen information \u2013 begin showing.<\/p>\n<p>Secureworks&#8217; incident responders have come throughout this sample throughout &#8220;quite a few investigations,&#8221; we&#8217;re informed. And &#8220;a number of&#8221; ways utilized in these scams align with North Korea&#8217;s Nickel Tapestry crew, which depends on the pretend IT employee schemes to line Kim Jong Un&#8217;s coffers. In accordance with the US authorities, these <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/10\/08\/us_lazarus_group_crypto_seizure\/\" rel=\"noopener\">illicit funds<\/a> contribute to the DPRK&#8217;s <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/home.treasury.gov\/news\/press-releases\/jy2215\">illegal weapons programs<\/a>.<\/p>\n<p>&#8220;The emergence of ransom calls for marks a notable departure from prior Nickel Tapestry schemes,&#8221; Secureworks Counter Risk Unit analysis group <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.secureworks.com\/blog\/fraudulent-north-korean-it-worker-schemes\">remarked<\/a> in a report.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\">\n        <noscript><br \/>\n            <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_specialfeatures\/cybersecuritymonth&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZxIHuwn8plj-P2tq6vLqzgAAAIg&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener\"><br \/>\n                <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_specialfeatures\/cybersecuritymonth&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZxIHuwn8plj-P2tq6vLqzgAAAIg&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt=\"\"\/><\/a><br \/>\n        <\/noscript>\n    <\/div>\n<p>&#8220;The extortion incident reveals that Nickel Tapestry has expanded its operations to incorporate theft of mental property with the potential for extra financial achieve via extortion,&#8221; and this &#8220;considerably adjustments the chance profile&#8221; for companies that by chance rent a North Korean techie,&#8221; Secureworks warned.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\">\n            <noscript><br \/>\n                <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_specialfeatures\/cybersecuritymonth&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZxIHuwn8plj-P2tq6vLqzgAAAIg&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"><br \/>\n                    <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_specialfeatures\/cybersecuritymonth&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZxIHuwn8plj-P2tq6vLqzgAAAIg&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt=\"\"\/><\/a><br \/>\n            <\/noscript>\n        <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\">\n                <noscript><br \/>\n                    <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_specialfeatures\/cybersecuritymonth&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZxIHuwn8plj-P2tq6vLqzgAAAIg&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"><br \/>\n                        <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_specialfeatures\/cybersecuritymonth&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZxIHuwn8plj-P2tq6vLqzgAAAIg&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt=\"\"\/><\/a><br \/>\n                <\/noscript>\n            <\/div>\n<\/p><\/div>\n<p>Information theft adopted by extortion does, nonetheless, observe the sample of <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/09\/05\/fbi_north_korean_scammers_prepping\/\" rel=\"noopener\">escalating tactics<\/a> documented by an earlier <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.ic3.gov\/PSA\/2023\/PSA231018\">FBI alert<\/a> and falls consistent with North Korean government-backed hackers&#8217; ongoing money-making schemes.<\/p>\n<p>Different pretend employee ways have been documented by the <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.justice.gov\/opa\/pr\/justice-department-disrupts-north-korean-remote-it-worker-fraud-schemes-through-charges-and\">feds<\/a> and buddies within the <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/assets.publishing.service.gov.uk\/media\/66e2ec410d913026165c3d91\/OFSI_Advisory_on_North_Korean_IT_Workers.pdf\">UK<\/a> [PDF] and Australia. Secureworks\u2019 incident response group has noticed these pretend contractors requesting adjustments to supply addresses for employer-issued laptops, that are then rerouted to laptop computer farms \u2013 each to cover the brand new rent&#8217;s location and likewise to determine persistent entry to company techniques.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\">\n            <noscript><br \/>\n                <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_specialfeatures\/cybersecuritymonth&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZxIHuwn8plj-P2tq6vLqzgAAAIg&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"><br \/>\n                    <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_specialfeatures\/cybersecuritymonth&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZxIHuwn8plj-P2tq6vLqzgAAAIg&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt=\"\"\/><\/a><br \/>\n            <\/noscript>\n        <\/div>\n<p>Or, in some circumstances, the North Korean scammers will ask to make use of a private laptop computer as an alternative of a company-issued system and point out their choice for utilizing a digital desktop.<\/p>\n<h3 class=\"crosshead\">You&#8217;ve got been pwned<\/h3>\n<p>In a single case documented by Secureworks, the phony employee exfiltrated proprietary data to a private Google Drive location utilizing the company digital PC.<\/p>\n<p>After firing the cyber criminal, the biz obtained &#8220;a sequence of emails&#8221; \u2013 one together with .ZIP archive attachments containing samples of the stolen paperwork, and one other demanding a six-figure ransom, paid in cryptocurrency, or else the criminals would leak the delicate data.<\/p>\n<p>&#8220;Later that day, an e-mail from a Gmail tackle shared a Google Drive folder containing further proof of stolen information,&#8221; the report notes.<\/p>\n<p>The risk hunters observe they&#8217;ve additionally noticed criminals utilizing Chrome Distant Desktop to remotely handle and entry company techniques, and AnyDesk for distant entry \u2013 regardless of this instrument not being sometimes wanted for his or her jobs.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" id=\"story_eagle_xsm_sm_md_xmd_lg_xlg\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-xmd=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\">\n            <noscript><br \/>\n                <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_specialfeatures\/cybersecuritymonth&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZxIHuwn8plj-P2tq6vLqzgAAAIg&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"><br \/>\n                    <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_specialfeatures\/cybersecuritymonth&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZxIHuwn8plj-P2tq6vLqzgAAAIg&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt=\"\"\/><\/a><br \/>\n            <\/noscript>\n        <\/div>\n<p>&#8220;Evaluation of AnyDesk logs in a single engagement revealed connections to Astrill VPN IP addresses, indicating the applying is a part of Nickel Tapestry&#8217;s toolset,&#8221; we&#8217;re informed.<\/p>\n<p>One other indication that you&#8217;ll have by chance employed a North Korean felony: these IT staff keep away from video calls as a lot as doable, claiming the webcams on company-provided computer systems aren&#8217;t working.<\/p>\n<p>To be honest: this excuse additionally turns out to be useful on no-makeup and frizzy-hair days for reliable <span class=\"strike\">reporters<\/span> staff.<\/p>\n<p>Secureworks studies that their forensic proof discovered free SplitCam digital video clone software program \u2013 which can assist disguise the pretend staff&#8217; id and placement \u2013 in use on the scammers&#8217; laptops. &#8220;Based mostly on these observations, it&#8217;s extremely probably that the risk group is experimenting with varied strategies for accommodating firms&#8217; requests to allow video on calls,&#8221; the safety analysts be aware.<\/p>\n<p>In addition they advise firms to be looking out for &#8220;suspicious monetary conduct&#8221; \u2013 comparable to updating financial institution accounts for paycheck deposits a number of occasions in a brief interval. Particularly, the researchers have seen the usage of financial institution accounts operated by the Payoneer Inc. digital cost service in these scams.<\/p>\n<p>Plus, for those who&#8217;ve inadvertently employed one phony North Korean IT employee, it is probably that you simply&#8217;re using multiple rip-off artist \u2013 and even the identical particular person who has adopted a number of personas.<\/p>\n<p>&#8220;In a single engagement, a number of connections throughout a number of contractors employed by the corporate surfaced, with Candidate A offering a reference for a future rent (Candidate B), and one other probably fraudulent contractor (Candidate C) changing Candidate B after that contractor&#8217;s termination,&#8221; the group wrote, including that in one other incident they caught a number of people utilizing the identical e-mail tackle.<\/p>\n<p>&#8220;This remark signifies that North Korean IT staff are sometimes co-located and should share jobs,&#8221; in accordance with the report.<\/p>\n<h3 class=\"crosshead\">How to not get scammed<\/h3>\n<p>To keep away from falling sufferer to this distant IT employee rip-off, Secureworks suggests recommends checking job candidates&#8217; documentation and conducting in-person interviews if doable.<\/p>\n<p>Infosec consciousness and coaching supplier KnowBe4 would probably second this advice. The safety store carried out 4 video interviews with a candidate and checked their look matched photographs on a job software, however nonetheless <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/07\/24\/knowbe4_north_korean\/\" rel=\"noopener\">hired<\/a> a North Korean pretend IT employee for a software program engineering position on its AI group.<\/p>\n<p>It additionally pays to look at for brand spanking new hires who ask to alter their tackle throughout onboarding, or route paychecks to cash switch providers. And, as all the time, prohibit the usage of unsanctioned distant entry software program and restrict entry to non-essential techniques.<\/p>\n<p>Google-owned infosec outfit Mandiant gives <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/09\/24\/mandiant_north_korea_workers\/\" rel=\"noopener\">similar advice<\/a> on methods to rent \u2013 or not rent &#8211; North Korean operatives.<\/p>\n<p>And, as a number of different job seekers and techies identified on Reddit: <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.reddit.com\/r\/technology\/comments\/1g4yy4l\/firm_hacked_after_accidentally_hiring_north\/?mid=1&amp;ref=metacurity.com#cid=2292335\">beware of cheap hires<\/a>. As with most issues in life, if it sounds too good to be true, it in all probability is. \u00ae<\/p>\n<\/p><\/div>\n<iframe data-lazy=\"true\" data-src=\"https:\/\/www.fiverr.com\/gig_widgets?id=U2FsdGVkX18x7XQvttUTrv1oEqmGNGTgvvCUiUoJ\/AP4z\/UyMz8lXGOLpu15jIMxBbTR0gmD5uBoFvhC4KWeALQRp3h\/X\/AwcVD0K8Wj9H\/ZzYKzcCNHosB9oS4SCJJFWiN85P9ICAc4OgCoE\/wHKIY7CDkf2\/DQ1vqGvk4smVe5cRDEmrLPCWi4FC8p40VUhSmWQ5udCm0zoJtorgWv3vbDQw0kKYkwn39ozAnQXDe+YvWMxkLFWA+O3TFwkJvdkIK+\/AUSnRssPKt5WHY0FhNOxnSPcLslEL4G4\/RfP95ve99U+kRnDy3X+KtzdQLY+u935ghON\/o3UE4IMv9oN6JX9RnxzL\/LRcOgnHigxStSGPKsZYtnz8RWNVT\/rOLAibqiWJadC5MYHRbekF3eg6FOGrQGkXYbsn0+a5aovnlLCbLwIqY9fcS17UX8J235iQ6cdmHNbrPeS84CMm34RA==&affiliate_id=1052423&strip_google_tagmanager=true\" loading=\"lazy\" data-with-title=\"true\" class=\"fiverr_nga_frame\" frameborder=\"0\" height=\"350\" width=\"100%\" referrerpolicy=\"no-referrer-when-downgrade\" data-mode=\"random_gigs\" onload=\" var frame = this; var script = document.createElement('script'); script.addEventListener('load', function() { window.FW_SDK.register(frame); }); script.setAttribute('src', 'https:\/\/www.fiverr.com\/gig_widgets\/sdk'); document.body.appendChild(script); \" ><\/iframe>\n<br \/><a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2024\/10\/18\/ransom_fake_it_worker_scam\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It is a sample cropping up increasingly more often: an organization fills an IT contractor submit, not realizing it is mistakenly employed a North Korean&#8230;<\/p>\n","protected":false},"author":1,"featured_media":58134,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-58133","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-universe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Biz extorted after hiring fake North Korean IT worker \u2022 The Register - mailinvest.blog<\/title>\n<meta name=\"description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailinvest.blog\/index.php\/2024\/10\/18\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Biz extorted after hiring fake North Korean IT worker \u2022 The Register - mailinvest.blog\" \/>\n<meta property=\"og:description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailinvest.blog\/index.php\/2024\/10\/18\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\/\" \/>\n<meta property=\"og:site_name\" content=\"mailinvest.blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/freelanceracademic\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-18T07:01:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-18T07:02:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailinvest.blog\/wp-content\/uploads\/2024\/10\/shuttertstock_north_korea_btc_flag_laptop.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin@mailinvest.blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin@mailinvest.blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/10\\\/18\\\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/10\\\/18\\\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\\\/\"},\"author\":{\"name\":\"admin@mailinvest.blog\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\"},\"headline\":\"Biz extorted after hiring fake North Korean IT worker \u2022 The Register\",\"datePublished\":\"2024-10-18T07:01:15+00:00\",\"dateModified\":\"2024-10-18T07:02:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/10\\\/18\\\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\\\/\"},\"wordCount\":969,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/10\\\/18\\\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/shuttertstock_north_korea_btc_flag_laptop.jpg\",\"articleSection\":[\"Tech Universe\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/10\\\/18\\\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/10\\\/18\\\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/10\\\/18\\\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\\\/\",\"name\":\"Biz extorted after hiring fake North Korean IT worker \u2022 The Register - mailinvest.blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/10\\\/18\\\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/10\\\/18\\\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/shuttertstock_north_korea_btc_flag_laptop.jpg\",\"datePublished\":\"2024-10-18T07:01:15+00:00\",\"dateModified\":\"2024-10-18T07:02:43+00:00\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/10\\\/18\\\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/10\\\/18\\\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/10\\\/18\\\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/shuttertstock_north_korea_btc_flag_laptop.jpg\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/shuttertstock_north_korea_btc_flag_laptop.jpg\",\"width\":1200,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/10\\\/18\\\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mailinvest.blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Biz extorted after hiring fake North Korean IT worker \u2022 The Register\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"name\":\"mailinvest.blog\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mailinvest.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\",\"name\":\"mailinvest\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"width\":1000,\"height\":1000,\"caption\":\"mailinvest\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/freelanceracademic\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\",\"name\":\"admin@mailinvest.blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"caption\":\"admin@mailinvest.blog\"},\"sameAs\":[\"https:\\\/\\\/mailinvest.blog\",\"admin@mailinvest.blog\"],\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/author\\\/adminmailinvest-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Biz extorted after hiring fake North Korean IT worker \u2022 The Register - mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/18\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\/","og_locale":"en_US","og_type":"article","og_title":"Biz extorted after hiring fake North Korean IT worker \u2022 The Register - mailinvest.blog","og_description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","og_url":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/18\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\/","og_site_name":"mailinvest.blog","article_publisher":"https:\/\/www.facebook.com\/freelanceracademic\/","article_published_time":"2024-10-18T07:01:15+00:00","article_modified_time":"2024-10-18T07:02:43+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2024\/10\/shuttertstock_north_korea_btc_flag_laptop.jpg","type":"image\/jpeg"}],"author":"admin@mailinvest.blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin@mailinvest.blog","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/18\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\/#article","isPartOf":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/18\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\/"},"author":{"name":"admin@mailinvest.blog","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4"},"headline":"Biz extorted after hiring fake North Korean IT worker \u2022 The Register","datePublished":"2024-10-18T07:01:15+00:00","dateModified":"2024-10-18T07:02:43+00:00","mainEntityOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/18\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\/"},"wordCount":969,"commentCount":0,"publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/18\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2024\/10\/shuttertstock_north_korea_btc_flag_laptop.jpg","articleSection":["Tech Universe"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mailinvest.blog\/index.php\/2024\/10\/18\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/18\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\/","url":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/18\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\/","name":"Biz extorted after hiring fake North Korean IT worker \u2022 The Register - mailinvest.blog","isPartOf":{"@id":"https:\/\/mailinvest.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/18\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\/#primaryimage"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/18\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2024\/10\/shuttertstock_north_korea_btc_flag_laptop.jpg","datePublished":"2024-10-18T07:01:15+00:00","dateModified":"2024-10-18T07:02:43+00:00","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","breadcrumb":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/18\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailinvest.blog\/index.php\/2024\/10\/18\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/18\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\/#primaryimage","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2024\/10\/shuttertstock_north_korea_btc_flag_laptop.jpg","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2024\/10\/shuttertstock_north_korea_btc_flag_laptop.jpg","width":1200,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/18\/biz-extorted-after-hiring-fake-north-korean-it-worker-the-register\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailinvest.blog\/"},{"@type":"ListItem","position":2,"name":"Biz extorted after hiring fake North Korean IT worker \u2022 The Register"}]},{"@type":"WebSite","@id":"https:\/\/mailinvest.blog\/#website","url":"https:\/\/mailinvest.blog\/","name":"mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailinvest.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailinvest.blog\/#organization","name":"mailinvest","url":"https:\/\/mailinvest.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","width":1000,"height":1000,"caption":"mailinvest"},"image":{"@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/freelanceracademic\/"]},{"@type":"Person","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4","name":"admin@mailinvest.blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","caption":"admin@mailinvest.blog"},"sameAs":["https:\/\/mailinvest.blog","admin@mailinvest.blog"],"url":"https:\/\/mailinvest.blog\/index.php\/author\/adminmailinvest-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/58133","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/comments?post=58133"}],"version-history":[{"count":1,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/58133\/revisions"}],"predecessor-version":[{"id":58135,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/58133\/revisions\/58135"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media\/58134"}],"wp:attachment":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media?parent=58133"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/categories?post=58133"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/tags?post=58133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}