Before this year, two hackers broke into the computer and soon knows the importance of this engine. As it turns out, They have landed on a hacker computer that is alleged to work for the North Korean governmentSee rankings-.
The two protection decided to digging and discovering the evidence that he said to the hacker to the Cybescesspionage operations used by North Korea, exploitation and infrastructure used in the operation.
Saber, one of the hackers involved, telling techcrunch when they have access to Korean workers’ computers on the side of the ride, but as soon as they have to be found and exposes what they are found.
“This state hacking hacking hacking for all the wrong reasons, I hope more will be exposed, they have to be,” Saber said, who speaks to her and cyb0rg Issuing an article on e-zine hacking e-zine phrackexpose the details of the invention.
There are cypical companies and researchers who nerikritly North Korean government, and group hacking up to several hacking groups, including espionate surgery but also increased Great Kripto Heisalso operational that is too much where the corian is north accused as a worker’s remote To finance the regime nuclear weapon program.
In this case, Saber and Cyb0rg are more steps and contempt the hackers, the operation can be ordained, or not related to the government and others, “like a saber.
Hackers want only to be known for the handle, Saber and Cyb0rg, as they can face retaliiation from North Korea government, and maybe others. Saber says he considers themselves hackivists, and they have legendaris hacktivists named names Fisher PhineasResponsible for Spyware Manufacturer hacking Finfisher and The hacking teamas an inspiration.
TechCrunch Events
San Francisco
|
October 27, 2025
At the same time, hackers also know that what they do is illegally, but they think that it is not important to declare.
“Stay for us always never help,” Saber said. “By leaking up all for the public I hope you can give more researchers to detect.”
“I hope this will cause a lot of victims now found and for (North Harries of North Korea) lose access,” he said.
“Illegal or not, this action has brought concrete artifacts to the community, this is more important,” Cyb0rg said, in the message sent through Saber.
Saber says he is believed that when the hacker – called north and work for the government and work in China, advised that the hacker is based.
In addition, according to Saber, the Times Kim Translate some Korean documents using Google Translate.
Saber says he never taught Kim. “I don’t think he listening, all they do is reinforce the leader, the same leader who stood their own people,” said. “I may tell you that using knowledge in a way that helps people, not pain.
Saber declined to tell her how and the cyb0rg got access to the computer kim, because the two believed that they could use the same technique to “get more access to the same system.”
During operation, Saber and Cyb0rg found active hack proof that Kim, to Korean and Taiwanese, the Taiwanese’s Korean companies, which were told to contact and sign.
The hacker of North Korea has a team of target people who work in the cygedeged industry as well. Therefore Saber says he knows the risk, but “is not very worried.”
“Not much we can do about this, it is supposed to be more careful :),” Saber said.

