cognitive cybersecurity intelligence

News and Analysis

Search

New Research Unmask DPRK IT Workers Email Address and Hiring Patterns

New Research Unmask DPRK IT Workers Email Address and Hiring Patterns

Recent cybersecurity intelligence has exposed a sophisticated infiltration campaign orchestrated by North Korean state-sponsored threat actors, specifically the Jasper Sleet group, who have systematically penetrated Western organizations through fraudulent employment schemes.

This operation, targeting primarily Web3, blockchain, and cryptocurrency companies, represents a significant evolution in North Korean cyber warfare tactics, eliminating the need for traditional exploitation methods by securing legitimate corporate access through deceptive hiring practices.

Two critical data leaks, surfacing in mid-August 2025, have provided unprecedented insight into the operational structure and methodologies employed by these DPRK IT workers.

The first leak exposed 1,389 email addresses allegedly used by North Korean operatives to secure overseas employment, while a second leak revealed 28 additional addresses alongside operational documents, expense spreadsheets, and internal communications.

These breaches have illuminated the industrial-scale nature of the operation, revealing systematic identity fabrication, technological infrastructure, and sophisticated social engineering tactics designed to bypass conventional security screening processes.

Different email domains detected (Source – The Raven File)

THE RAVEN FILE analysts identified critical patterns within the exposed email addresses that serve as potential red flags for organizations conducting recruitment processes.

The research reveals that these threat actors demonstrate remarkable consistency in their operational security practices, utilizing specific naming conventions, temporary email services, and strategic age manipulation to create convincing professional personas.

Affected TEMP and Privacy email platforms (Source – The Raven File)

Analysis of the compromised credentials indicates extensive use of privacy-focused email providers, with 29 out of 63 identified email domains being temporary email services, while legitimate providers like Gmail and Skiff were extensively compromised for operational purposes.

Email Pattern Analysis and Operational Infrastructure

The forensic examination of the leaked email addresses reveals systematic patterns that reflect both operational discipline and cultural influences in the threat actors’ identity construction methodology.

THE RAVEN FILE researchers noted that approximately 11 email addresses contained birth years ranging from 1990 to 1995, suggesting deliberate age targeting to present candidates within optimal hiring demographics for technology positions.

The naming conventions demonstrate strategic psychological manipulation, incorporating animal references (Dragon, Tiger, Lion, Bear), color associations (Blue, Gold, Red), and technology-focused terminology (Dev, Code, Tech, Software) to create authentic-appearing professional identities.

Password analysis reveals concerning security practices that paradoxically aided in the operation’s exposure. The most frequently used password pattern “123qwe!@#QWE” appeared across multiple accounts, suggesting centralized password management or shared operational protocols.

Two unique passwords, “Xiah” and “Jay231,” appeared exclusively within this dataset and were absent from the Have I Been Pwned database, indicating possible operational significance or internal reference codes.

The prevalence of QWERTY keyboard patterns in password construction supports intelligence assessments regarding the threat actors’ technological environment and suggests systematic password generation protocols rather than individual creativity.

Exposed DPRK IT Worker Credentials:-

Email AddressPassword(s)akileus010902@gmail.com!@#123QWEqweait.oubella.marouane@gmail.comqwery123secretagent1025@gmail.com1QAZxswbalsinyar@gmail.com11111111, Xiahaudreybass140@gmail.comP@ssw0rdchainerspace@gmail.comqwe123QWE!@#codechef730@gmail.comwatercup123comsuper0030@gmail.comqweQWE123!@#danny.may.9012@gmail.com123darkhorse03111@gmail.com123123duartejose020202@gmail.com123123123enthusiastdev121@gmail.combluesky3itsolution1014@gmail.comasdasdasdjarrenjackson15@gmail.comRstjayevanslinkedin@gmail.comJay231kylecollins412@gmail.comp, kyle0412leonohlin0123@gmail.comleodavinciliam.pilips.hub@gmail.comourcountrymanricvilegas@gmail.comintmastering0429@gmail.comDragon2002, dragon2002

The investigation revealed extensive use of advanced privacy tools, including Octo Browser for fingerprint obfuscation, FaceSwap technology for video interview manipulation, and sophisticated proxy networks through services like IPRoyal.

Organizations must implement enhanced screening protocols, including deepfake detection tools, comprehensive background verification processes, and systematic analysis of applicant communication patterns to identify potential infiltration attempts before granting system access.

Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.
The post New Research Unmask DPRK IT Workers Email Address and Hiring Patterns appeared first on Cyber Security News.

Source: cybersecuritynews.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts