BLUF

North Korean cybercriminals, posing as IT professionals, hack and scam to fund their regime, often targeting firms that pay in cryptocurrency or renminbi.

Summary

KEY POINTS.
  1. Cryptocurrency heists use mixers to hide profits.
  2. Cybercriminals pose as Canadians or Americans, favouring elusive remote work.
  3. Hackers access organisations for sensitive data.
  4. Attack methods adapt quickly to sanctions and detections.
  5. Checking only URLs and grammar is insufficient.

References