🎉 Gate xStocks 交易開啓啦,現貨、合約、Alpha齊上線!
📝 在Gate廣場發帖,曬出你的交易體驗或精彩截圖,瓜分$1,000大獎池!
🎁 廣場優質創作者5名,每人獨享$100合約體驗券!
🎉 帖文同步分享到X(推特),瀏覽量前十再得$50獎勵!
參與方式:
1️⃣ 關注 @Gate廣場_Official
2️⃣ 帶 #Gate xStocks 交易体验# ,原創發帖(不少於20字,僅用活動標籤)
3️⃣ 若分享到推特,請將連結提交表單:https://www.gate.com/questionnaire/6854
注:表單可多次提交,發布更多帖文可提升獲獎機會!
📅 7月3日16:00—7月9日24:00(UTC+8)
詳情:https://www.gate.com/announcements/article/45926
每一條體驗,都有機會贏取大獎!快在Gate廣場show出你的操作吧!
Microsoft Axes 3,000 NK Spy Accounts in Major Crackdown
Key Points:
Coordinated Action With Law Enforcement
The U.S. Department of Justice supported the crackdown with a coordinated enforcement action. Authorities seized laptops, closed 29 financial accounts, and took down nearly two dozen websites. Law enforcement also raided 29 “laptop farms”—locations in the U.S. where accomplices maintained devices used by North Korean IT workers operating remotely.
In one case, a Maryland resident working in a nail salon was found to be holding 13 remote jobs that were executed by North Korean nationals based in China. These roles reportedly paid out nearly $1 million.
How the Scheme Operates
The North Korean scheme involves trained IT professionals from the Democratic People’s Republic of Korea who apply for global tech jobs under false identities. While the workers often perform legitimate tasks, Microsoft stated that some companies even reported them as “some of their most talented employees.”
The U.N. estimates the operation generates up to $600 million annually. The FBI and DOJ believe the revenue supports North Korea’s weapons programs. These workers are also said to share information with hackers responsible for large-scale cryptocurrency thefts.
AI Use and Evolving Tactics Raise Concerns
Microsoft confirmed that the operatives are now using AI tools to enhance their deception. They rely on software to polish job applications, swap faces on profile images, and mask accents using voice changers.
The company says these methods could make it easier for operatives to bypass traditional screening during job interviews.
Microsoft also developed a machine-learning tool to flag suspicious activity, including what it calls “impossible time travel risk detections,” which monitor login attempts between regions like the U.S. and China or Russia.
The company says it is continuing to track the activity under the internal name “Jasper Sleet.”
| | | --- | | DISCLAIMER: The information on this website is provided as general market commentary and does not constitute investment advice. We encourage you to do your own research before investing. |