browsercookies's profile picture. Ex-Unit 350: Elite cookie ops. Perfect bake temp. No ties to Unit 8200.

Cookie Connoisseur

@browsercookies

Ex-Unit 350: Elite cookie ops. Perfect bake temp. No ties to Unit 8200.

置頂

ICYMI - DPRK's training video on making Civil Engineering profiles to perform fraudulent CIV-E work. #DRPK #kimhasabigfacemole @aptwhatnow youtu.be/m4XmJUBorKU


Patiently waiting for the new X account location feature to propagate so I can revisit all the DPRK 🇰🇵 X accounts.


Cookie Connoisseur 已轉發

Gen Threat Labs uncover evidence of rare cross-country coordination between Russia’s Gamaredon and North Korea’s Lazarus | gendigital.com/blog/insights/… @GenThreatLabs


Blast from the past Our boy @AMangus7 - AKA "Tyler Minegar, Brock Patterson, Tretiak Sashka" LMAO Bro, where did you find this X PFP? Boy be manifesting. Surprised Daddy lets you on X I hope you find someone to help you with your english so your ITW frenz stop pickin' on you

browsercookies's tweet image. Blast from the past

Our boy @AMangus7 - AKA "Tyler Minegar, Brock Patterson, Tretiak Sashka"

LMAO Bro, where did you find this X PFP? Boy be manifesting. Surprised Daddy lets you on X

I hope you find someone to help you with your english so your ITW frenz stop pickin' on you
browsercookies's tweet image. Blast from the past

Our boy @AMangus7 - AKA "Tyler Minegar, Brock Patterson, Tretiak Sashka"

LMAO Bro, where did you find this X PFP? Boy be manifesting. Surprised Daddy lets you on X

I hope you find someone to help you with your english so your ITW frenz stop pickin' on you

Cookie Connoisseur 已轉發

‼️🇰🇵 Another North Korean hacker using AI to alter his face caught while trying to infiltrate Bitso. Meet "Sebastian," a software engineer from Colombia who can't speak Spanish. Strange, right?


Cookie Connoisseur 已轉發

🇰🇵 Meet "Mateo" and "Alfredo", two young #Lazarus agents who thought it was a good idea to steal someone else's ID and resume to try to get a job with us. 🪶 We recorded them and found interesting data on how they operate. ⬇️ Read our article on the #QuetzalTeam Blog below!

MauroEldritch's tweet image. 🇰🇵 Meet "Mateo" and "Alfredo", two young #Lazarus agents who thought it was a good idea to steal someone else's ID and resume to try to get a job with us.

🪶 We recorded them and found interesting data on how they operate.

⬇️ Read our article on the #QuetzalTeam Blog below!
MauroEldritch's tweet image. 🇰🇵 Meet "Mateo" and "Alfredo", two young #Lazarus agents who thought it was a good idea to steal someone else's ID and resume to try to get a job with us.

🪶 We recorded them and found interesting data on how they operate.

⬇️ Read our article on the #QuetzalTeam Blog below!

Multilateral Sanctions Monitoring Team’s DPRK IT Worker report. msmt.info/view/save/2025… #DPRK

browsercookies's tweet image. Multilateral Sanctions Monitoring Team’s DPRK IT Worker report.

msmt.info/view/save/2025…

#DPRK

Thanks for the call out Matt Burgess! It's true, DPRK boyz are acting as architects, structural engineers, and stamping/approving designs in the United States for a quick dollar. They steal legitimate licenses and make up stamps. Time to do something. wired.com/story/north-ko…

browsercookies's tweet image. Thanks for the call out Matt Burgess!

It's true, DPRK boyz are acting as architects, structural engineers, and stamping/approving designs in the United States for a quick dollar. They steal legitimate licenses and make up stamps. Time to do something.

wired.com/story/north-ko…

Cookie Connoisseur 已轉發

Just added a fresh write-up on DPRK-linked GitHub orgs - examples, tactics, and indicators. From fake “startups” to fork farms: how DPRK teams spin up orgs, boost each other, and hunt for facilitators. As at the time of writing, most are still active on Twitter. Link below.


Cookie Connoisseur 已轉發

After nuking all of his accounts since @browsercookies and I last looked at him, "Steven Leal" has been hard at work as "Crazy Steven". 🇰🇵 He was kind enough to keep the luckypenny1632333 while he pivoted from shitty crypto grifter to shitty AI grifter.

KawaiiJongUwUn's tweet image. After nuking all of his accounts since @browsercookies and I last looked at him, "Steven Leal" has been hard at work as "Crazy Steven". 🇰🇵 He was kind enough to keep the luckypenny1632333 while he pivoted from shitty crypto grifter to shitty AI grifter.

Using automation with AI voice agents(2): Make.com and N8N orchestrate when your voice agents contact customers. Use cases include inbound Call Handling: Log call metadata received via webhook (e.g., from Retell) into a database or CRM for analysis or follow-up.



Cookie Connoisseur 已轉發

Kimsuky used AI deepfake-generated ID cards via ChatGPT to impersonate a South Korean defense institution in an APT spear-phishing attack. genians.co.kr/en/blog/threat… #Kimsuky #ChatGPT #Deepfake

cyberwar_15's tweet image. Kimsuky used AI deepfake-generated ID cards via ChatGPT to impersonate a South Korean defense institution in an APT spear-phishing attack.

genians.co.kr/en/blog/threat…

#Kimsuky #ChatGPT #Deepfake

A little fuckin’ dramatic. Luckily there is a pressure release for those who need validation. They become InfoSec influencers, making it their entire identity. Fireside chats, podcasts, new job every 2 years, LinkedIn premium analytics - hard copes. FOR THE LOVE OF THE GAME!

In security, when you do your job perfectly, nothing happens. And people don't see when nothing happens.



Cookie Connoisseur 已轉發

Great stuff coming out of Chollima Group. Started months ago but nice to finally see it out there. Come for the juice, stay for the creepy altered images chollima-group.io/posts/dubai-cr…

aptwhatnow's tweet image. Great stuff coming out of Chollima Group. Started months ago but nice to finally see it out there.

Come for the juice, stay for the creepy altered images

chollima-group.io/posts/dubai-cr…

Hello again This time we cover IT Worker who infected himself with Contagious Interview malware Meet Gerardo Salgado aka Tammy Hans (the old one). He appears to have access to a large number of compromised accounts and has run two fake companies in US.

Narcass3's tweet image. Hello again

This time we cover IT Worker who infected himself with Contagious Interview malware

Meet Gerardo Salgado aka Tammy Hans (the old one). He appears to have access to a large number of compromised accounts and has run two fake companies in US.
Narcass3's tweet image. Hello again

This time we cover IT Worker who infected himself with Contagious Interview malware

Meet Gerardo Salgado aka Tammy Hans (the old one). He appears to have access to a large number of compromised accounts and has run two fake companies in US.
Narcass3's tweet image. Hello again

This time we cover IT Worker who infected himself with Contagious Interview malware

Meet Gerardo Salgado aka Tammy Hans (the old one). He appears to have access to a large number of compromised accounts and has run two fake companies in US.


god bless.

Someone just dropped almost 1.4k email address list used by North Korean IT workers. gofile.io/d/mh6DUE



Cookie Connoisseur 已轉發

なぜこのタイミングで x.com/MOJ_PSIA/statu…

【業務委託先が北朝鮮の資金源かも?】 北朝鮮IT労働者が、日本人になりすまして業務を受注しているかもしれません。労働者が獲得した報酬は、核・ミサイル開発の資金源となる恐れがあり、知らず知らずのうちに国連安保理決議に基づく対北朝鮮制裁に違反してしまう可能性があります。

MOJ_PSIA's tweet image. 【業務委託先が北朝鮮の資金源かも?】
北朝鮮IT労働者が、日本人になりすまして業務を受注しているかもしれません。労働者が獲得した報酬は、核・ミサイル開発の資金源となる恐れがあり、知らず知らずのうちに国連安保理決議に基づく対北朝鮮制裁に違反してしまう可能性があります。
MOJ_PSIA's tweet image. 【業務委託先が北朝鮮の資金源かも?】
北朝鮮IT労働者が、日本人になりすまして業務を受注しているかもしれません。労働者が獲得した報酬は、核・ミサイル開発の資金源となる恐れがあり、知らず知らずのうちに国連安保理決議に基づく対北朝鮮制裁に違反してしまう可能性があります。


Cookie Connoisseur 已轉發

"Nothing to luck, Everything to effort. Believe yourself and get success."

Narcass3's tweet image. "Nothing to luck, Everything to effort. Believe yourself and get success."

Cookie Connoisseur 已轉發

hi here is ican0220 or RokyangDeveloper0220!. Might also go by Xun Zhu [email protected] [email protected] github.com/ican0220 many nice resources on his Github!

Narcass3's tweet image. hi

here is ican0220 or RokyangDeveloper0220!. Might also go by Xun Zhu 

dev.zhu0712@gmail.com
icandev0220@gmail.com
github.com/ican0220

many nice resources on his Github!

Cookie Connoisseur 已轉發

1/ An unnamed source recently compromised a DPRK IT worker device which provided insights into how a small team of five ITWs operated 30+ fake identities with government IDs and purchased Upwork/LinkedIn accounts to obtain developer jobs at projects.

zachxbt's tweet image. 1/ An unnamed source recently compromised a DPRK IT worker device which provided insights into how a small team of five ITWs operated 30+ fake identities with government IDs and purchased Upwork/LinkedIn accounts to obtain developer jobs at projects.
zachxbt's tweet image. 1/ An unnamed source recently compromised a DPRK IT worker device which provided insights into how a small team of five ITWs operated 30+ fake identities with government IDs and purchased Upwork/LinkedIn accounts to obtain developer jobs at projects.

Loading...

Something went wrong.


Something went wrong.