Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
North Korean Operatives Exploit LinkedIn to Access Companies

North Korean Operatives Exploit LinkedIn to Access Companies

Posted on February 10, 2026 By CWS

North Korean operatives are increasingly using LinkedIn to impersonate professionals, seeking to infiltrate companies globally. This marks an escalation in their strategic operations, where they apply for remote positions using authentic LinkedIn profiles of unsuspecting users.

Impersonation Tactics and Objectives

Security Alliance (SEAL) reports that these profiles often feature verified workplace emails, making them appear legitimate. The broader cybersecurity community tracks this effort under various names, including Jasper Sleet and PurpleDelta. The dual objectives of these schemes are financial gain to support North Korea’s weapons programs and stealing sensitive data for espionage.

According to Silent Push, this operation is a significant revenue generator for North Korea, providing threat actors with access to sensitive company data. The operatives reportedly use sophisticated methods to maintain persistent access within corporate networks.

Financial Maneuvering and Countermeasures

Chainalysis highlights how North Korean IT workers convert their salaries into cryptocurrency, using complex money laundering techniques like chain-hopping and token swapping. These methods obscure the money trail, complicating efforts to trace the funds.

To counter these threats, individuals are advised to monitor and safeguard their identities. SEAL recommends confirming the authenticity of LinkedIn profiles before engaging with potential candidates, using verified communication channels.

Impact and Expanding Threats

The Norwegian Police Security Service has observed several instances where Norwegian firms unknowingly hired North Korean IT workers. The income from these positions is believed to fund North Korea’s nuclear and weapons development.

Parallel to this scheme is the Contagious Interview campaign, which exploits fake job interviews to deploy malware. This involves candidates unknowingly executing malicious code during purported skill assessments.

Security researcher Ori Hershko notes that these campaigns employ advanced techniques, such as EtherHiding, to enhance the resilience of malicious payloads. Recent instances have used Microsoft VS Code to deploy malware disguised as web fonts, targeting cryptocurrency wallets and credentials.

Evolving Cyber Threat Landscape

The Koalemos RAT campaign represents another facet of North Korean cyber operations. This involves malicious npm packages designed to deploy a remote access trojan for persistent system access and data extraction.

CrowdStrike has identified that the North Korean hacking group Labyrinth Chollima has evolved into specialized units. These clusters, including Golden Chollima and Pressure Chollima, focus on distinct objectives like cryptocurrency theft and high-value heists.

Despite their segmentation, these groups share tools and infrastructure, indicating coordinated efforts within the North Korean cyber apparatus. Their activities range from economic espionage to sophisticated hacking campaigns, posing a significant ongoing global threat.

The Hacker News Tags:cryptocurrency laundering, cyber threats, Cybersecurity, Espionage, Hacking, IT workers, LinkedIn, Malware, North Korea, social engineering

Post navigation

Previous Post: SAP Addresses Critical Code Injection in CRM and S/4HANA
Next Post: Adobe Addresses 44 Vulnerabilities in Software Update

Related Posts

China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks The Hacker News
Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations The Hacker News
ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices The Hacker News
CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild The Hacker News
Threat Actors Weaponize HexStrike AI to Exploit Citrix Flaws Within a Week of Disclosure Threat Actors Weaponize HexStrike AI to Exploit Citrix Flaws Within a Week of Disclosure The Hacker News
Android Enhances Security with New Intrusion Logging Android Enhances Security with New Intrusion Logging The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark