Two hackers known as Saber and cyb0rg have taken a bold step by infiltrating the computer systems of a North Korean government hacker, revealing a large cache of sensitive data connected to state-backed cyber espionage efforts. Over the course of about four months, they accessed the hacker’s machine and uncovered various hacking tools, exploits, and proof of cyberattacks directed at South Korean and Taiwanese targets.
Their motivation for exposing this operation was rooted in a sense of moral duty. Saber explained that although their actions were illegal, they believed making the information public was essential for the cybersecurity community. They felt that keeping the data to themselves would have been unhelpful, while leaking it could provide researchers with better ways to detect similar threats. The leaked information is expected to help in identifying and countering ongoing cyberattacks attributed to North Korean actors.
The hacker they targeted, identified as “Kim,” is believed to be linked to the North Korean espionage group Kimsuky, also known as APT43 or Thallium. Various clues, including work hours matching Pyongyang’s time zone and the use of simplified Chinese in translations, suggest that this hacker may be based in China and possibly working as a contractor for both governments.
This incident highlights increasing concerns about state-sponsored cyber operations and the ethical dilemmas surrounding individuals who expose such activities. While some consider these hackers whistleblowers, others warn against unauthorized system access regardless of intent. The ongoing debate continues about how to balance national security and individual rights in the digital era.