Insights Home
October 31, 2024

October Insights: Have you hired a North Korean hacker?

Loading the Elevenlabs Text to Speech AudioNative Player...

Remote work enables global collaboration, but it’s not without risk. North Korean hackers have been using AI to commit fraud, gain employment with companies, steal valuable information, and then immediately ransom it for top dollar. Dozens of Fortune 100 companies have been affected by this elaborate scam.

In other news, the CDC’s retention policies are under fire as they’ve been found to delete emails of former employees in a non-compliant manner.

Document security and record retention are big themes this month, so without further ado, here’s a brief roundup of the stories I’m following this month.

Book a demo

BBC: Company Accidentally Hires a North Korean Hacker

Mandiant cyber researchers have uncovered this fake IT worker profile

With the rise of remote work, a new insider threat has emerged. North Korean hackers have been committing identity fraud to gain employment in organizations, collect sensitive data, and then hold the information for ransom… and companies are paying the price.

AI’s Role in the Deception

AI has been used to create fake headshots.

According to a report by Mandiant, dozens of Fortune 100 companies have been found to have accidentally hired North Korean cyber criminals. Once given access to the company’s computer network, the hackers downloaded sensitive company data and sent a ransom demand. This is the latest in a string of cases of western remote workers being unmasked as North Koreans.

Key Takeaway

Authorities warn employers to be vigilant about new hires if they are fully remote.

Forbes: NSA Says to Reboot Your Device Now

The NSA releases mobile device best practices for 2020.

The NSA previously issued a mobile device best practices guide that informs readers what they should avoid, disable, do, and not do to reduce risk. Forbes recently evaluated the guide, reinstating the need to turn your device off and on every week.

Key Takeaway

Consider rebooting your phone weekly to remove the threat of non-persistent malware.

“Inkit’s steadfast prioritization on data security, providing the best possible variable costs, and having a rockstar support team has made this partnership exceptional.”
— Aaron Williams, Head of Asana for Nonprofits
Learn More About DocGen at Inkit

Politico: Judge Orders the CDC to Stop Deleting Emails of Departing Staff

Judge finds ‘likely unlawful’ activity regarding the CDC’s deletion of employee emails.

U.S. District Judge Rudolph Contreras ruled in a 36-page opinion that “the [Center for Disease Control]’s policy and practice of disposing of former employees’ emails ninety days after the end of their employment is likely unlawful.”

Contreras said the agency appeared to have embraced the National Archives protocol known as the Capstone Plan and then abandoned part of it without permission.

Key Takeaway

A U.S. District Judge ruled that the CDC is possibly violating recordkeeping policies set forth by the National Archives protocol.

“The assurance of data security is mission-critical to our everyday operations. The Inkit platform has provided us the single, all-inclusive solution we needed to maintain control and privacy over our information.”
“Using Inkit’s on-demand document generation and retention policies has proven to be highly successful for us. We’re using the API to generate application and adverse action notices. The platform provides us development and cost savings over implementing a custom solution.”
— Ed Cody, COO at Vital Card
Learn More About DocGen at Inkit
“Inkit has enabled us to streamline our back office and collections, reducing program spend by up to 94%, while maintaining the flexibility to integrate with our existing apps and tools.”
— Jordan Hill, Product Manager at Bird Global
Learn More About DocGen at Inkit

Forbes: Internet Archive Breached for the Third Time

Encrypt your systems to avoid breaches of sensitive data.

In a series of escalating cyberattacks, the Internet Archive has confirmed a third security breach on October 20, 2024. Despite previous warnings and multiple breaches earlier this month, hackers were able to exploit unrotated Zendesk API tokens to gain access and potentially download sensitive support data, including personal identification documents submitted by users.

Key Takeaway

The Internet Archive suffers a breach of PII due to existing vulnerabilities with third-party software Zendesk.

Forbes: Federal Employees, Update Your PC or Stop Using It.

Federal cyber agency issues warning for Microsoft Windows users

Due to “an unspecified spoofing vulnerability which can lead to a loss of confidentiality”, the US cyber agency has mandated all federal employees to “apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable” by October 29.

Key Takeaway

Federal employees must update their PC within the next ten days, or stop using it until they can.

Book a demo
Book a demo

Trusted by those who put privacy first

Experience the leading secure document generation platform. See Inkit in action.