🎉 Gate xStocks 交易开启啦,现货、合约、Alpha齐上线!
📝 在Gate广场发帖,晒出你的交易体验或精彩截图,瓜分$1,000大奖池!
🎁 广场优质创作者5名,每人独享$100合约体验券!
🎉 帖文同步分享到X(推特),浏览量前十再得$50奖励!
参与方式:
1️⃣ 关注 @Gate广场_Official
2️⃣ 带 #Gate xStocks 交易体验# ,原创发帖(不少于20字,仅用活动标签)
3️⃣ 若分享到推特,请将链接提交表单:https://www.gate.com/questionnaire/6854
注:表单可多次提交,发布更多帖文可提升获奖机会!
📅 7月3日16:00—7月9日24:00(UTC+8)
详情:https://www.gate.com/announcements/article/45926
每一条体验,都有机会赢取大奖!快在Gate广场show出你的操作吧!
Microsoft Axes 3,000 NK Spy Accounts in Major Crackdown
Key Points:
Coordinated Action With Law Enforcement
The U.S. Department of Justice supported the crackdown with a coordinated enforcement action. Authorities seized laptops, closed 29 financial accounts, and took down nearly two dozen websites. Law enforcement also raided 29 “laptop farms”—locations in the U.S. where accomplices maintained devices used by North Korean IT workers operating remotely.
In one case, a Maryland resident working in a nail salon was found to be holding 13 remote jobs that were executed by North Korean nationals based in China. These roles reportedly paid out nearly $1 million.
How the Scheme Operates
The North Korean scheme involves trained IT professionals from the Democratic People’s Republic of Korea who apply for global tech jobs under false identities. While the workers often perform legitimate tasks, Microsoft stated that some companies even reported them as “some of their most talented employees.”
The U.N. estimates the operation generates up to $600 million annually. The FBI and DOJ believe the revenue supports North Korea’s weapons programs. These workers are also said to share information with hackers responsible for large-scale cryptocurrency thefts.
AI Use and Evolving Tactics Raise Concerns
Microsoft confirmed that the operatives are now using AI tools to enhance their deception. They rely on software to polish job applications, swap faces on profile images, and mask accents using voice changers.
The company says these methods could make it easier for operatives to bypass traditional screening during job interviews.
Microsoft also developed a machine-learning tool to flag suspicious activity, including what it calls “impossible time travel risk detections,” which monitor login attempts between regions like the U.S. and China or Russia.
The company says it is continuing to track the activity under the internal name “Jasper Sleet.”
| | | --- | | DISCLAIMER: The information on this website is provided as general market commentary and does not constitute investment advice. We encourage you to do your own research before investing. |