DPRK IT workers are quietly running polished GitHub organizations to win contracts and launder reputation. We map the networks, tactics, and tells.
            
        
        
        
            
            
            
            
            
            A comprehensive analysis of the tactics, behaviors, and operational patterns of North Korean (DPRK) IT workers.
            
        
        
        
            
            
            
            
            
            A DPRK IT worker-turned-hacker gains (partial) control over the Waves (Fraud) Protocol.
            
        
        
        
            
            
            
            
            
            A cluster of actors discovered in onlyDust.com freelancer platform and beyond
            
        
        
        
            
            
            
            
            
            Unusual Discoveries in DPRK IT Worker Profiles connected to Russia
            
        
        
        
            
            
            
            
            
            Comingled multiple types of threats hidden within single North Korean operation.
            
        
        
        
            
            
            
            
            
            In the ever-evolving landscape of cybersecurity, traditional methods of tracking threat actors through hashes, IPs, and websites are not enough. Today...
            
        
        
        
            
            
            
            
            
            The investigation into the threat actor associated with DPRK activities has revealed several interesting insights into how to track this actor's activity based on their own presentation on GitHub.