A North Korean imposter was uncovered, working as a sysadmin at Amazon U.S., after their keystroke input lag raised suspicions with security specialists at the online retail giant. Normally, a U.S.-based remote worker’s computer would send keystroke data within tens of milliseconds. This suspicious individual’s keyboard lag was “more than 110 milliseconds,” reports Bloomberg.

Amazon is commendably proactive in its pursuit of impostors, according to the source report. The news site talked with Amazon’s Chief Security Officer, Stephen Schmidt, about this fascinating new case of North Koreans trying to infiltrate U.S. organizations to raise hard currency for the Democratic People’s Republic of Korea (DPRK), and sometimes indulge in espionage and/or sabotage.

  • Joe Bidet@lemmy.ml
    link
    fedilink
    English
    arrow-up
    197
    arrow-down
    1
    ·
    9 days ago

    Sounds much better than “Amazon surveils keystrokes of its IT workers”!

    • stoly@lemmy.world
      link
      fedilink
      English
      arrow-up
      20
      ·
      8 days ago

      This was also my takeaway. Sounds like a security nightmare if they are logging any data.

      • Lka1988@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        1
        ·
        7 days ago

        If you use a company-provided computer for work, then it’s safe to assume they’re already doing that.

        • stoly@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          6 days ago

          The problem is that you don’t want to record important information like passwords so if they did log them, it’s another possible vector of loss. I e if someone got into that copy of the data

      • Evotech@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        7 days ago

        Yeah, hate it all you want. But risk scales with the amount of employees you have. At the scale of Amazon you have to do literally everything to minimise risk.

  • SpaceNoodle@lemmy.world
    link
    fedilink
    English
    arrow-up
    115
    arrow-down
    1
    ·
    9 days ago

    How am I the first person to ask why they’re measuring the latency on everyone’s keystrokes?

  • Wispy2891@lemmy.world
    link
    fedilink
    English
    arrow-up
    31
    arrow-down
    1
    ·
    7 days ago

    On one side I feel like “cool, they managed to find a spy on this sophisticated way”

    On the other side I’m thinking what kind of intrusive keylogging malware did they install on all their employees laptops…

    • Lka1988@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      3
      ·
      7 days ago

      I mean, if it’s a company-owned laptop, they can do whatever the fuck they want with it. I bring a personal laptop to work for browsing and YouTube and whatnot, attached to a VPN.

    • amzd@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      ·
      7 days ago

      This article is just building justification for spying on your employees

  • flamingo_pinyata@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    17
    ·
    9 days ago

    I guess this is inevitable at huge companies. Nobody cares about the actual person you’re hiring, it’s just another position to fill. Of course there will be fakes of all kinds.

    • TragicNotCute@lemmy.world
      link
      fedilink
      English
      arrow-up
      15
      ·
      9 days ago

      It’s not that, it’s that they are incredibly sophisticated in their techniques. I just had to sit through 90 minutes of training about how to spot fake applicants.

      • WoodScientist@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        6
        ·
        8 days ago

        I don’t get why companies can’t solve this problem entirely by just flying out applicants for in-person interviews towards the end of the hiring process. Or hell, maybe only even ask the candidate to fly out for a visit after they’ve already accepted the job offer. Just one minimal and relatively cheap step to confirm the remote worker you’re hiring is who they claim to be. For the cost of a flight, a night or two in a hotel, and some meal vouchers, you can verify someone’s identity. Sure, maybe not for freelance work. But for any well paid technical field? This is a trivial expense.

        • TragicNotCute@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          8 days ago

          It not practical at a remote first company to fly people out to where we happen to have offices when they could be working from anywhere.

          It’s cheap-ish for a flight, but at scale, the starts to become an expensive hiring pipeline.

        • TragicNotCute@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          ·
          8 days ago

          It’s more a list of warnings signs.

          • blurred/virtual background (we make them turn it off during interviewing)
          • refusal to do gestures or follow specific instructions (wave your hand in front of your face)
          • not familiar with local knowledge like weather
          • appearing to read from the screen or phone

          There’s more than that, but those are the highlights.

  • pulsewidth@lemmy.world
    link
    fedilink
    English
    arrow-up
    5
    ·
    7 days ago

    I wonder how many they’ve missed over the years, this kind of thing has been occuring since at least 2012.

    Reminded me of the ‘critical infrastructure company’ (I presume utility) software developer who handed all his credentials over to a worker in China, including mailing them his RSA keyfob, and wasn’t discovered for months until the company security team noticed VPN logins coming from China.

    https://arstechnica.com/information-technology/2013/01/worlds-most-industrious-lazy-man-outsources-all-of-his-work-to-china/

    Apparently it’s become even easier for malicious remote workers to fake resumes and identities to gain jobs via AI, so I hope all major companies are monitoring their remote access very closely.

    https://au.pcmag.com/security/106436/security-firm-discovers-remote-worker-is-really-a-north-korean-hacker

  • ☂️-@lemmy.ml
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    12
    ·
    8 days ago

    weasel language. the “infiltrators” are literally working a job for them.

    • treesquid@lemmy.world
      link
      fedilink
      English
      arrow-up
      8
      arrow-down
      2
      ·
      8 days ago

      Correct. The hostile actor gained employment with their victim, a common method of infiltration. You should look up the definition of infiltration.

        • vaultdweller013@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          4
          ·
          8 days ago

          It kinda is, its practically a requirement for a lot of corporate espionage and a lot of spies have entire lives alongside their spy duties. Also fun joke I’ve heard about Vladivostok during the Cold war, “There were surprisingly only a handful of people in that city, American spies, Soviet counter intelligence, smugglers, cargo movers, and baristas who ignored the whole mess” heard that from an ex-CIA guy who was doing a talk at a spy exhibit back when I was a kid.

          • ☂️-@lemmy.ml
            link
            fedilink
            English
            arrow-up
            2
            arrow-down
            2
            ·
            edit-2
            7 days ago

            so? does working a job == espionage because it’s north korea? i don’t think they have ever gone at war or any kind of open conflict with western countries at all recently excluding the thing with south korea and the us not liking their existence…?

            why are their workers totally all spies as opposed to say, chinese ones, which might even have a stronger interest in keeping an eye on the west? you don’t seem to have much issue with them.

            as i said to me, it sounds like weasel language to smear this specific country for trying to get around the sanctions imposed on them.

            • vaultdweller013@sh.itjust.works
              link
              fedilink
              English
              arrow-up
              1
              ·
              7 days ago

              The Norks have quite literally done data breaches and major hacks via this exact method in the past. They basically have nothing to lose on the international level so they do this and then trade it to countries like China or Russia for whatever it is they want. If they didn’t have a documented history of doing shit like that nobody would assume espionage.

              If they didn’t have a known tendency towards weird espionage shit going back to the 50 and 60s nobody would care, but they do have a known tendency towards doing weird espionage shit.

              • ☂️-@lemmy.ml
                link
                fedilink
                English
                arrow-up
                2
                arrow-down
                1
                ·
                7 days ago

                and the chinese has been stealing back tech from you for decades this exact way, but you don’t mind them working for you.

                maybe if they weren’t santioned from hell and back.

    • UnderpantsWeevil@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      2
      ·
      8 days ago

      Yeah, and its curious to see you getting downvotes for the intra-departmental outsourcing that’s been rampant through the tech sector for a while now.

      What we’ve got isn’t some nefarious plot by the Chinese-Adjacent to invade our precious trillion dollar tech industry. Its the deliberate consequence of sanctioning a country to the hilt to devalue local labor, then exploiting the sanctioned locals to extract labor at below market rate.

      • jol@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        15
        arrow-down
        1
        ·
        9 days ago

        Right? I never heard of tracking employee’s keystroke latency before. Pretty genius.

        • stevestevesteve@lemmy.world
          link
          fedilink
          English
          arrow-up
          7
          ·
          edit-2
          9 days ago

          How do they even?? They can’t know the difference in time between the humans key input and the computer’s receipt of it, since they can’t possibly know the exact millisecond the human input was made…?

          The reported article really sounds like a misreading of a more technical document

        • tidderuuf@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          1
          ·
          9 days ago

          It’s actually common for micromanaging to have software that tracks this. I believe Microsoft Teams has something similar managers can use to track “productivity”. Someone probably just compiled all of it and clicked sort, then saw some Asian name at the top and that’s what raised the red flag.