North Korean Cyberespionage Inside KnowBe4 Company – A Massive Wake-Up Call For Cybersecurity Industry

How a North Korean Agent Infiltrated KnowBe4

Primary Category: Cybersecurity

Authors:
•  SCARS Editorial Team – Society of Citizens Against Relationship Scams Inc.
•  Portions KnowBe4 and other sources

About This Article

KnowBe4 recently uncovered that a newly hired remote software engineer, who passed both interview and background checks, was actually a North Korean agent.

The discovery was made after suspicious activity linked to a company-issued MacBook raised red flags. The company’s IT and security teams acted quickly, restricting access and launching an investigation. They found that the individual had loaded malware onto the device and used a single-board computer to manipulate data.

KnowBe4 collaborated with the FBI and Mandiant, concluding that the worker was part of a North Korean operation posing as IT staff to infiltrate American companies.

The incident highlights the importance of continuous monitoring and robust security measures, even post-hiring, to safeguard against internal threats.

North Korean Cyberespionage Inside KnowBe4 Company - A Massive Wake Up Call For Cybersecurity Industry- 2024

Incident at KnowBe4: The Unexpected Discovery of a North Korea Agent on the Payroll

KnowBe4, a leading provider of security awareness training and simulated phishing platform, recently experienced a surprising incident involving a newly hired remote software engineer. The company, known for its work in educating organizations about cybersecurity threats, discovered an anomaly after onboarding the employee, despite the individual having passed both the interview and background check processes.

The Onboarding Process

The new hire was brought on board as a remote software engineer, a common practice in the tech industry that has become even more prevalent in recent years. As part of their standard procedure, KnowBe4 sent the employee a company-issued MacBook to ensure they had the necessary tools to perform their job duties securely. This equipment provisioning step is critical for maintaining a secure working environment, especially for remote workers who may not have access to the company’s internal networks.

Discovery of the Anomaly

Shortly after sending the MacBook, KnowBe4’s IT and security teams noticed unusual activity linked to the device. This discovery prompted a more thorough investigation into the circumstances surrounding the new hire. According to internal sources, the activity raised red flags due to its unusual nature, inconsistent with standard practices expected from new employees.

In a statement, KnowBe4’s CEO, Stu Sjouwerman, emphasized the importance of vigilance even after hiring processes are complete. “Our commitment to security doesn’t end with the hiring process. We continuously monitor all aspects of our operations to ensure the highest level of security, especially in our own backyard,” Sjouwerman said.

Actions Taken by KnowBe4

According to CyberScoop:

An internal investigation started when KnowBe4’s InfoSec Security Operations Center team detected “a series of suspicious activities” from the new hire. The remote worker was sent an Apple laptop, which was flagged by the company on July 15 when malware was loaded onto the machine. The AI-filtered photo, meanwhile, was flagged by the company’s Endpoint Detection and Response software.

Later that evening, the SOC team had “contained” the fake worker’s systems after he stopped responding to outreach. During a roughly 25-minute period, “the attacker performed various actions to manipulate session history files, transfer potentially harmful files, and execute unauthorized software,” Sjouwerman wrote in the post. “He used a [single-board computer] raspberry pi to download the malware.”

From there, the company shared its data and findings with the FBI and with Mandiant, the Google-owned cyber firm, and came to the conclusion that the worker was a fictional persona operating from North Korea.

KnowBe4 said the fake employee likely had his workstation connected “to an address that is basically an ‘IT mule laptop farm.’” They’d then use a VPN to work the night shift from where they actually reside — in this case, North Korea “or over the border in China.” That work would take place overnight, making it appear that they’re logged on during normal U.S. business hours.

Upon discovering the suspicious activity, KnowBe4 acted swiftly to mitigate any potential threats. The company immediately restricted the new employee’s access to internal systems and launched a comprehensive review of the incident. The employee was placed on administrative leave pending further investigation.

“We take any potential security breach very seriously, regardless of the source. Our protocols are designed to detect and respond to any anomalies quickly and efficiently,” Sjouwerman added.

Implications and Lessons Learned

According to Bleeping Computer

The firm detected and stopped the malicious actions in time, so no data breach occurred. However, the case highlights the continued threat posed by North Korean threat actors posing as IT staff, something that the FBI has warned about repeatedly since 2023.

The DPRK maintains a highly organized army of IT workers who obscure their true identities to get hired by hundreds of American firms.

Revenue generated by these workers are used to fund the country’s weapons programs and cyber operations, as well as to collect intelligence.

This incident underscores the importance of not only thorough vetting during the hiring process but also maintaining robust security measures post-hiring. KnowBe4, with its expertise in cybersecurity training, is in a unique position to highlight the potential vulnerabilities that can arise even from trusted internal sources.

KnowBe4’s response to the incident demonstrates the company’s commitment to its mission of enhancing security awareness and maintaining a secure environment for its operations and clients. The company is conducting a thorough review to determine if any sensitive information was accessed or compromised.

The incident also serves as a reminder to other organizations of the critical need for continuous monitoring and the importance of having protocols in place to quickly identify and address any unusual activity.

Conclusion

While the incident at KnowBe4 is still under investigation, it highlights the evolving nature of cybersecurity threats and the necessity for comprehensive security measures. Companies must remain vigilant not only against external threats but also potential risks from within. KnowBe4’s quick action in response to the anomaly reflects best practices in incident response and underscores the company’s role as a leader in cybersecurity education and awareness.

Sources:

  1. https://blog.knowbe4.com/how-a-north-korean-fake-it-worker-tried-to-infiltrate-us
  2. https://blog.knowbe4.com/north-korean-fake-it-worker-faq
  3. KnowBe4 Official Website

Please Leave Us Your Comment
Also, tell us of any topics we might have missed.

Leave a Reply

Your comments help the SCARS Institute better understand all scam victim/survivor experiences and improve our services and processes. Thank you

Your email address will not be published. Required fields are marked *

Thank you for your comment. You may receive an email to follow up. We never share your data with marketers.

Recent Reader Comments

Important Information for New Scam Victims

If you are looking for local trauma counselors please visit counseling.AgainstScams.org or join SCARS for our counseling/therapy benefit: membership.AgainstScams.org

If you need to speak with someone now, you can dial 988 or find phone numbers for crisis hotlines all around the world here: www.opencounseling.com/suicide-hotlines

SCARS Resources:

PLEASE NOTE: Psychology Clarification

The following specific modalities within the practice of psychology are restricted to psychologists appropriately trained in the use of such modalities:

  • Diagnosis: The diagnosis of mental, emotional, or brain disorders and related behaviors.
  • Psychoanalysis: Psychoanalysis is a type of therapy that focuses on helping individuals to understand and resolve unconscious conflicts.
  • Hypnosis: Hypnosis is a state of trance in which individuals are more susceptible to suggestion. It can be used to treat a variety of conditions, including anxiety, depression, and pain.
  • Biofeedback: Biofeedback is a type of therapy that teaches individuals to control their bodily functions, such as heart rate and blood pressure. It can be used to treat a variety of conditions, including stress, anxiety, and pain.
  • Behavioral analysis: Behavioral analysis is a type of therapy that focuses on changing individuals’ behaviors. It is often used to treat conditions such as autism and ADHD.
    Neuropsychology: Neuropsychology is a type of psychology that focuses on the relationship between the brain and behavior. It is often used to assess and treat cognitive impairments caused by brain injuries or diseases.

SCARS and the members of the SCARS Team do not engage in any of the above modalities in relationship to scam victims. SCARS is not a mental healthcare provider and recognizes the importance of professionalism and separation between its work and that of the licensed practice of psychology.

SCARS is an educational provider of generalized self-help information that individuals can use for their own benefit to achieve their own goals related to emotional trauma. SCARS recommends that all scam victims see professional counselors or therapists to help them determine the suitability of any specific information or practices that may help them.

SCARS cannot diagnose or treat any individuals, nor can it state the effectiveness of any educational information that it may provide, regardless of its experience in interacting with traumatized scam victims over time. All information that SCARS provides is purely for general educational purposes to help scam victims become aware of and better understand the topics and to be able to dialog with their counselors or therapists.

It is important that all readers understand these distinctions and that they apply the information that SCARS may publish at their own risk, and should do so only after consulting a licensed psychologist or mental healthcare provider.

Opinions

The opinions of the author are not necessarily those of the Society of Citizens Against Relationship Scams Inc. The author is solely responsible for the content of their work. SCARS is protected under the Communications Decency Act (CDA) section 230 from liability.

Disclaimer:

SCARS IS A DIGITAL PUBLISHER AND DOES NOT OFFER HEALTH OR MEDICAL ADVICE, LEGAL ADVICE, FINANCIAL ADVICE, OR SERVICES THAT SCARS IS NOT LICENSED OR REGISTERED TO PERFORM.

IF YOU’RE FACING A MEDICAL EMERGENCY, CALL YOUR LOCAL EMERGENCY SERVICES IMMEDIATELY, OR VISIT THE NEAREST EMERGENCY ROOM OR URGENT CARE CENTER. YOU SHOULD CONSULT YOUR HEALTHCARE PROVIDER BEFORE FOLLOWING ANY MEDICALLY RELATED INFORMATION PRESENTED ON OUR PAGES.

ALWAYS CONSULT A LICENSED ATTORNEY FOR ANY ADVICE REGARDING LEGAL MATTERS.

A LICENSED FINANCIAL OR TAX PROFESSIONAL SHOULD BE CONSULTED BEFORE ACTING ON ANY INFORMATION RELATING TO YOUR PERSONAL FINANCES OR TAX-RELATED ISSUES AND INFORMATION.

SCARS IS NOT A PRIVATE INVESTIGATOR – WE DO NOT PROVIDE INVESTIGATIVE SERVICES FOR INDIVIDUALS OR BUSINESSES. ANY INVESTIGATIONS THAT SCARS MAY PERFORM IS NOT A SERVICE PROVIDED TO THIRD-PARTIES. INFORMATION REPORTED TO SCARS MAY BE FORWARDED TO LAW ENFORCEMENT AS SCARS SEE FIT AND APPROPRIATE.

This content and other material contained on the website, apps, newsletter, and products (“Content”), is general in nature and for informational purposes only and does not constitute medical, legal, or financial advice; the Content is not intended to be a substitute for licensed or regulated professional advice. Always consult your doctor or other qualified healthcare provider, lawyer, financial, or tax professional with any questions you may have regarding the educational information contained herein. SCARS makes no guarantees about the efficacy of information described on or in SCARS’ Content. The information contained is subject to change and is not intended to cover all possible situations or effects. SCARS does not recommend or endorse any specific professional or care provider, product, service, or other information that may be mentioned in SCARS’ websites, apps, and Content unless explicitly identified as such.

The disclaimers herein are provided on this page for ease of reference. These disclaimers supplement and are a part of SCARS’ website’s Terms of Use

Legal Notices: 

All original content is Copyright © 1991 – 2023 Society of Citizens Against Relationship Scams Inc. (Registered D.B.A SCARS) All Rights Reserved Worldwide & Webwide. Third-party copyrights acknowledge.

U.S. State of Florida Registration Nonprofit (Not for Profit) #N20000011978 [SCARS DBA Registered #G20000137918] – Learn more at www.AgainstScams.org

SCARS, SCARS|INTERNATIONAL, SCARS, SCARS|SUPPORT, SCARS, RSN, Romance Scams Now, SCARS|INTERNATION, SCARS|WORLDWIDE, SCARS|GLOBAL, SCARS, Society of Citizens Against Relationship Scams, Society of Citizens Against Romance Scams, SCARS|ANYSCAM, Project Anyscam, Anyscam, SCARS|GOFCH, GOFCH, SCARS|CHINA, SCARS|CDN, SCARS|UK, SCARS|LATINOAMERICA, SCARS|MEMBER, SCARS|VOLUNTEER, SCARS Cybercriminal Data Network, Cobalt Alert, Scam Victims Support Group, SCARS ANGELS, SCARS RANGERS, SCARS MARSHALLS, SCARS PARTNERS, are all trademarks of Society of Citizens Against Relationship Scams Inc., All Rights Reserved Worldwide

Contact the legal department for the Society of Citizens Against Relationship Scams Incorporated by email at legal@AgainstScams.org