184
How a North Korean Fake IT Worker Tried to Infiltrate Security Awareness Firm KnowBe4
(blog.knowbe4.com)
This is a most excellent place for technology news and articles.
Hiring somebody without ever physically seeing them is a curious reality
I'm surprised , if the intention has stated, is to work well paid job and place a resource, why load malware at all?
If they're just trying to remote into the device, why are they remoting indirectly to the laptop? Why not use a remote KVM that hooks up to the output and USB ports?
Interesting point about the KVM. To make it transparent the KVM would need to report the model of a real monitor in the display EDID data. Also if you’re monitoring the device, which is almost certainly a laptop, it would be suspicious if it was plugged in to a monitor 100% of the time.
Having a laptop permanently in a dock is pretty normal for tech workers.
Mine is either connected to a USBC dock at home or the office. I have only used it without when at a hotel.