Google recently published the results of their Threat Analysis Group’s study of North Korea cyberespionage targeting security researchers utilizing a fictitious company supported by fake LinkedIn and Twitter personas.

Google’s Threat Analysis Group published research centered around “SecuriElite” and its engagement on the LinkedIn and Twitter social networks. The modus operandi is very similar to that previously encountered in January 2021 when the Google team first discovered North Korea generated personas attempting to engage and compromise western security researchers by posing as peers with expertise in offensive cyber security and exploitation.

North Korea’s cover for action centered on SecuriElite, ostensibly a company located in Turkey. The totally fictitious company, created from whole cloth, professes to offer services in pentests, software security assessments, and exploits. The use of a link to a PGP public encryption key found on the bottom of the company’s site  is one of the hooks used by the North Koreans to draw the target to a controlled website where a “browser exploit was waiting to be triggered.”

LinkedIn and Twitter Accounts from North Korea

The identified LinkedIn and Twitter accounts created and used by North Korea include:

North Korea LinkedIn Accounts

  • SecuriElite –
  • Carter Edwards, HR Director @ Trend Macro –
  • Colton Perry, Security Researcher –
  • Evely Burton, Technical Recruiter @ Malwarebytes –
  • Osman Demir, CEO @ SecuriElite –
  • Piper Webster, Security Researcher –
  • Sebastian Lazarescue, Security Researcher @ SecuriElite –

North Korea Twitter Accounts

  • Alex Joe –
  • Ben Hemmings –
  • Julia –
  • Chape –
  • Osman Demir –
  • Sebastian Lazarescue –
  • SecuriElite –

North Korea Associated Websites

  • bestwing[.]org
  • codebiogblog[.]com
  • coldpacific[.]com
  • cutesaucepuppy[.]com
  • devguardmap[.]org
  • hireproplus[.]com
  • hotelboard[.]org
  • mediterraneanroom[.]org
  • redeastbay[.]com
  • regclassboard[.]com
  • securielite[.]com
  • spotchannel02[.]com
  • wileprefgurad[.]net

[NB: None of the above links to social networks or websites should be visited and are provided for information security and counterintelligence purposes.]

Take away for FSOs

A review of the personas created for this foray highlights the concerted effort to create disarming, yet credible, personas with no connection whatsoever to North Korea. Briefed personnel should be reminded to report any anomalous activities which are encountered from individuals known or unknown to them.

FSOs will be well served to ensure the aforementioned names, links and modus operandi are provided to their information security teams and included in the counterintelligence briefings provided to personnel to ensure any engagement is identified and immediately remediated.

In essence, North Korea is going to school on China’s successful utilization of LinkedIn and is creating a similar playbook designed to identify and vet targets of interest using information which the target has themselves published. The North Korea espionage effort utilizing the very public social networks of LinkedIn and Twitter can be expected to continue.

Related News

Christopher Burgess (@burgessct) is an author and speaker on the topic of security strategy. Christopher, served 30+ years within the Central Intelligence Agency. He lived and worked in South Asia, Southeast Asia, the Middle East, Central Europe, and Latin America. Upon his retirement, the CIA awarded him the Career Distinguished Intelligence Medal, the highest level of career recognition. Christopher co-authored the book, “Secrets Stolen, Fortunes Lost, Preventing Intellectual Property Theft and Economic Espionage in the 21st Century” (Syngress, March 2008). He is the founder of