Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Please enable JavaScript in your browser to complete this form.
    Loading
    What's Hot

    Get 1 Year of The Zero Byte for $30: Lawsuit Highlights Fake News

    October 21, 2024

    Get One Year of The Zero Byte for $5: How a Trump Win Could Unleash AI

    October 21, 2024

    Get One Year of The Zero Byte for $5: Sam Altman’s Eye-Scanning Orb Delivered

    October 17, 2024
    Facebook X (Twitter) Instagram
    The Zero ByteThe Zero Byte
    • AI
    • Tech
      1. Computing
      2. Cybersecurity
      3. Politics
      4. Smart Home
      5. Software
      6. Startups
      7. Streaming Services
      8. Virtual Reality
      9. View All

      OpenAI Unveils New AI Safety Research, Critics Call for More Action

      July 17, 2024

      Samsung Galaxy Book 4 Edge is among the first Copilot+ PCs to arrive

      June 20, 2024

      M4 MacBook Pros Expected to Launch in Late 2024

      June 19, 2024

      AI Cameras on UK Trains Use Amazon Tech to Monitor Passenger Emotions

      June 17, 2024

      Can You Trust ChatGPT-4o With Your Private Data?

      July 31, 2024

      ACLU Defends Your Right to Create Deepfakes

      July 24, 2024

      Apple, Nvidia, Anthropic Used YouTube Videos to Train AI

      July 16, 2024

      AI Spam Outranks Original News in Google Search Results

      July 2, 2024

      New Jersey’s $500M Plan to Lead in AI Innovation

      July 25, 2024

      ACLU Defends Your Right to Create Deepfakes

      July 24, 2024

      French AI Startups Thrived Until the Election Changed Everything

      June 28, 2024

      Auto Industry Calls Biden’s New Automatic Braking Rule “Impractical

      June 24, 2024

      Why Heat Pumps Are Gaining Popularity

      May 23, 2024

      Green and Blue-Green Roofs: The Ultimate Eco-Friendly Solution

      April 22, 2024

      Couple’s Journey to Eliminate Natural Gas from Their Home

      March 30, 2024

      Zoom Challenges Google and Microsoft with AI-Powered Documents

      August 6, 2024

      Download Paywalled Articles Easily with Quora’s Poe Chatbot Platform

      June 28, 2024

      Apple WWDC 2024 Live Blog: Major AI, iOS, and Software Updates Expected

      June 10, 2024

      Lightroom’s AI Tool Quickly Removes Unwanted Objects

      May 21, 2024

      Anthropic Unveils Method to Understand AI’s Inner Workings

      May 21, 2024

      OpenAI Dissolves Long-Term AI Risk Team Amid Growing Concerns

      May 17, 2024

      VSCO Launches Marketplace Connecting Photographers and Brands

      May 7, 2024

      Quora CEO Discusses AI, Poe Chatbot, and OpenAI’s Non-Competitive Role

      May 6, 2024

      Get One Year of The Zero Byte for Just $5

      September 26, 2024

      Spotify Expands Enterprise and Developer Tools with Backstage Platform

      April 30, 2024

      Rio: The AI News Anchor App Secures Funding from Curio

      April 26, 2024

      Substack Enhances Notes Feature with Twitter-Inspired Functionalities

      April 16, 2024

      Saga’s HoloBike: A Bizarre Virtual Reality Cycling Experience

      May 7, 2024

      Exploring the World Beyond Apple’s Vision Pro Headset

      April 20, 2024

      Disney Imagineer Builds Real-Life Lightsaber: Bringing Star Wars to Life

      April 8, 2024

      Apple’s Vision Pro Aims to Solve VR’s Biggest Problems: Comfort and Immersion

      April 8, 2024

      Get One Year of The Zero Byte for Just $5

      September 26, 2024

      Get One Year of The Zero Byte for Just $5

      September 25, 2024

      Get One Year of The Zero Byte for Just $30

      September 18, 2024

      AI Scientist Invents and Runs Its Own Experiments

      August 21, 2024
    • Gaming
      1. Gaming Hardware
      2. Game Reviews
      3. View All

      Game Devs at GDC Demand Change Amidst Internet Outrage

      March 26, 2024

      Retro Oddities: A Must-Own Gaming History Lesson in The Zero Byte Collection

      March 14, 2024

      Snag a PS5 Bundle with Marvel’s Spider-Man 2 for Just $399.99 Today

      March 11, 2024

      MSI Claw: A Formidable Challenger to the Steam Deck

      March 11, 2024

      Sonic Heroes Rumored to Make a Comeback: What We Know

      March 26, 2024

      Game Devs at GDC Demand Change Amidst Internet Outrage

      March 26, 2024

      Rise of the Ronin’s Innovative Feature: A New Industry Standard

      March 24, 2024

      Rise of the Ronin: A Masterful Blend of Gaming’s Finest Elements

      March 13, 2024

      Video Game Actors Strike Over AI Concerns

      July 25, 2024

      Carv Secures $10M Series A to Empower Gamers to Monetize Their Data

      April 25, 2024

      Raichu Mega Evolution Forms Imagined by Creative Pokemon Fan

      March 26, 2024

      Sonic Heroes Rumored to Make a Comeback: What We Know

      March 26, 2024
    • Gadgets
      1. New Gadgets
      2. Phones and Tech
      3. Wearables
      4. Gadget Reviews
      5. View All

      Acer Chromebook Plus: The Perfect Student Laptop Solution

      April 18, 2024

      OnePlus Unveils Its Own Take on Google’s Magic Eraser Feature

      April 3, 2024

      Do Smartphones Help or Harm Kids? Exploring the Pros and Cons

      March 29, 2024

      Google to Introduce AI-Powered Features on Pixel 8 Devices

      March 28, 2024

      Humane Ai Pin: A Flawed Glimpse into the Future of Wearable Tech

      April 11, 2024

      Withings ScanWatch 2 and Light: Effortless Elegance for the Tech-Weary

      March 11, 2024

      Acer Chromebook Plus: The Perfect Student Laptop Solution

      April 18, 2024

      AMD 3D V-Cache Processor to Avoid: The Zero Byte’s Recommendation

      March 26, 2024

      Microsoft Unveils Unexpected Surface Devices in Latest Launch

      March 22, 2024

      OnePlus 12 Screen: Is It Curved or Flat? Here’s What We Know

      March 16, 2024

      Top 9 TV Streaming Devices for 4K and HD: Our Best Picks

      June 19, 2024

      M4 MacBook Pros Expected to Launch in Late 2024

      June 19, 2024

      McLaren Artura Spider Hybrid: High Performance and Fun

      June 16, 2024

      Apple AI May Not Work on Millions of iPhones—But There’s Hope

      June 17, 2024
    • Science
      1. Health
      2. Space
      3. Psychology and Neuroscience
      4. Robots
      5. Space
      6. View All

      New Alzheimer’s Treatments Useless Without Early Diagnosis

      June 24, 2024

      Post-Pandemic Recovery: Challenges and Uncertainties Ahead

      June 24, 2024

      How to Exercise Safely During a Heat Wave

      June 22, 2024

      Tips to Stay Healthy and Avoid Illness This Summer

      June 15, 2024

      NASA Investigates Starliner Faults, Indefinite Delay in Space

      June 23, 2024

      What Happened Before the Big Bang?

      June 23, 2024

      SpaceX Starship Test Brings Mars Mission Closer

      June 6, 2024

      Searching for Ultralight Dark Matter Explained

      June 2, 2024

      Get One Year of The Zero Byte for $5: Most US Teens Use AI, Parents Unaware

      September 18, 2024

      New Alzheimer’s Treatments Useless Without Early Diagnosis

      June 24, 2024

      Arctic Zombie Fire Season Begins: What You Need to Know

      June 1, 2024

      Can AI Prove String Theory’s Accuracy in Describing Our World?

      May 26, 2024

      AI Scientist Invents and Runs Its Own Experiments

      August 21, 2024

      Boeing’s Starliner Set to Launch NASA Astronauts After Delays

      May 6, 2024

      SpaceX’s Starship: The Future Plans and Upcoming Developments

      March 15, 2024

      Uncanny Valley: Exploring the Realm of Eerie AI Dolls

      March 13, 2024

      NASA Investigates Starliner Faults, Indefinite Delay in Space

      June 23, 2024

      What Happened Before the Big Bang?

      June 23, 2024

      SpaceX Starship Test Brings Mars Mission Closer

      June 6, 2024

      Searching for Ultralight Dark Matter Explained

      June 2, 2024

      Get One Year of The Zero Byte for $5: Most US Teens Use AI, Parents Unaware

      September 18, 2024

      AI Scientist Invents and Runs Its Own Experiments

      August 21, 2024

      New Alzheimer’s Treatments Useless Without Early Diagnosis

      June 24, 2024

      Post-Pandemic Recovery: Challenges and Uncertainties Ahead

      June 24, 2024
    • Movies
      • Movie Reviews
    • Auto
    • Reviews
      1. Gadget Reviews
      2. Game Reviews
      3. Movie Reviews
      4. View All

      Acer Chromebook Plus: The Perfect Student Laptop Solution

      April 18, 2024

      AMD 3D V-Cache Processor to Avoid: The Zero Byte’s Recommendation

      March 26, 2024

      Microsoft Unveils Unexpected Surface Devices in Latest Launch

      March 22, 2024

      OnePlus 12 Screen: Is It Curved or Flat? Here’s What We Know

      March 16, 2024

      Sonic Heroes Rumored to Make a Comeback: What We Know

      March 26, 2024

      Game Devs at GDC Demand Change Amidst Internet Outrage

      March 26, 2024

      Rise of the Ronin’s Innovative Feature: A New Industry Standard

      March 24, 2024

      Rise of the Ronin: A Masterful Blend of Gaming’s Finest Elements

      March 13, 2024

      Oscars 2024: Unveiling the Triumphs and Surprises in Cinema

      March 11, 2024

      Conann: A Glamorous Fever Dream Exploring Beauty in Barbarism

      March 12, 2024

      Acer Chromebook Plus: The Perfect Student Laptop Solution

      April 18, 2024

      Sonic Heroes Rumored to Make a Comeback: What We Know

      March 26, 2024

      Game Devs at GDC Demand Change Amidst Internet Outrage

      March 26, 2024

      Rise of the Ronin’s Innovative Feature: A New Industry Standard

      March 24, 2024
    The Zero ByteThe Zero Byte
    Home»AI»Unmasked: The Vigilante Hacker Who Shut Down North Korea’s Internet
    Unmasked: The Vigilante Hacker Who Shut Down North Korea’s Internet
    AI

    Unmasked: The Vigilante Hacker Who Shut Down North Korea’s Internet

    By TZBApril 4, 20248 Mins Read
    Share
    Facebook Twitter Copy Link

    A Hacker’s Personal Vendetta Against North Korea

    In January 2022, Alejandro Caceres, a 38-year-old Colombian-American cybersecurity entrepreneur, launched a one-man cyberwar against North Korea. Working from his Florida home, Caceres used custom-built programs and cloud-based servers to intermittently disrupt the country’s internet for over a week. Adopting the pseudonym “P4x,” Caceres sought to send a message to the Kim Jong Un regime that targeting American hackers would have consequences.

    North Korea on a map glitches with a 404 error code.

    Targeted by North Korean Spies

    Caceres’ motivation stemmed from being personally targeted by North Korean spies who aimed to steal his intrusion tools. Despite reporting the incident to the FBI, he received little support, prompting him to take matters into his own hands. By hiding behind the “P4x” pseudonym, Caceres hoped to evade both North Korean retaliation and potential criminal charges from the US government.

    Unexpected Recruitment

    Instead of facing prosecution, Caceres was surprised to find that the US government was more interested in recruiting him following his North Korean cyberattacks. He spent the next year immersed in the secretive world of America’s state-sponsored hacking agencies, presenting his techniques to high-level officials and carrying out hacking projects to impress his new audience.

    Caceres worried after his attack on North Korea that the US government might prosecute him. Instead, he was surprised to find that it was more interested in recruiting him.

    Advocating for Aggressive Cyberwarfare

    Frustrated with the US government’s slow and risk-averse approach to cyberwarfare, Caceres is now dropping his pseudonym to send a new message to his fellow Americans. He believes that the US needs to wield its hacking powers more aggressively, particularly against ransomware actors who have targeted critical infrastructure and caused significant damage.

    A Hacker’s Unconventional Path

    Caceres’ hacker career has been marked by a willingness to engage in aggressive applications of his skills. From working for a Blackwater subsidiary to receiving grants from the Defense Advanced Research Projects Agency (DARPA), Caceres has operated in the murky territory between whitehat and blackhat hacking. His startup, Hyperion Gray, even reflects this ambiguity in its name, combining his hacker handle with a shade in the middle of the hacking spectrum.

    A portrait taken of Caceres before he decided to publicly reveal his identity as P4x.

    Taking Matters into His Own Hands

    When North Korean hackers targeted Caceres in 2021, he reported the incident to the FBI but received little follow-up. After nursing his grudge for a year, Caceres decided to retaliate, launching a solo cyberattack that knocked North Korea’s entire web offline for days. News outlets initially speculated that the attack was the work of another country’s cyber forces, unaware that it was orchestrated by a single individual in Florida.

    The US Government Takes Notice

    Although the US government had no involvement in Caceres’ attack on North Korea, it quietly took an interest in his work. In the weeks following the publication of his story, Caceres began receiving messages from hacker friends connected to the Pentagon and intelligence agencies, indicating that several agencies were intrigued by his techniques and wanted to discuss them further.

    Read the full story on WIRED

    Rethinking Cyber Warfare: The P4x Model and Its Implications

    A Fateful Meeting

    Through a mutual acquaintance, Caceres found himself face-to-face with Angus, a seasoned military intelligence contractor. Angus cautioned Caceres about potential retaliation from North Korea, urging him to be vigilant against physical attacks disguised as muggings or tampering with his medications. Unnerved by the warning, Caceres took drastic measures, arming himself with firearms and bulletproof vests.

    During their meeting, Angus probed Caceres’ hacking history, political affiliations, and ideological leanings. Satisfied with his responses, they delved into discussions about the potential for a US special forces hacker team and how they could collaborate to showcase this concept to the Department of Defense.

    Pitching the Concept

    Caceres found himself standing before an audience of high-ranking officials from various military and intelligence agencies, presenting his North Korean hacking project as a case study. He outlined key principles for replicating his success: prioritize simplicity and impact, minimize bureaucracy, and iterate quickly. His proposed timeline suggested assembling small teams of hackers, supported by researchers and analysts, with operations planned and executed within days.

    The audience’s response was a mix of admiration and cynicism. As Angus put it, “Most of them put their faces in their palms when they realized what he’d done and how he did it, and the only thing that stopped them from doing it was bureaucracy.” One attendee even joked that Caceres had omitted the step involving a lengthy, incomprehensible PowerPoint presentation followed by a denial of authorization.

    Demonstrating Capabilities

    As Angus sought funding for their project, Caceres took matters into his own hands. Alongside fellow hacker tu3sday, he embarked on an extensive intrusion campaign against another foreign adversary, showcasing the potential havoc a small team could wreak. While they conducted much of their hacking from the offices of Angus’ startup, Caceres maintains that the work was never officially sanctioned by the company or the Pentagon.

    Despite initial enthusiasm, Angus encountered roadblocks in securing official support for their experiment. He attributes this resistance to a combination of risk aversion and bureaucratic inertia within the Department of Defense. Frustrated by the lack of progress, Caceres eventually abandoned his visits to the startup.

    Reimagining Cyber Deterrence

    Undeterred by the setbacks, Caceres continues to advocate for the concept of American “special forces” hackers. He envisions small teams targeting ransomware gangs, recovering stolen cryptocurrency, and disrupting adversarial nations’ internet access as a form of deterrence. Caceres even suggests that civilian infrastructure should be considered fair game, likening such attacks to trade embargoes or sanctions.

    “Exactly as we’re withholding certain goods and businesses from Russia right now,” Caceres says, “we could be withholding the internet.”

    However, critics argue that indiscriminate attacks on civilians could be considered war crimes and invite retaliation from other countries. Jacquelyn Schneider, a cyber conflict researcher at Stanford’s Hoover Institution, points out that the US government’s cautious approach to cyberattacks stems from a desire to avoid unintended civilian casualties, violating international law, or triggering dangerous blowback.

    Nevertheless, Schneider acknowledges that Caceres and Angus raise valid points about the US underutilizing its cyber capabilities, with bureaucracy being a significant factor. As she puts it, “There are good reasons, and then there are bad reasons.”

    Caceres' tattoos

    On his right arm, Caceres has tattoos of his pre-P4x hacker handles. On his left, he has a cryptographic hash—a long string of numbers and letters—that encodes a word. He invites WIRED readers to try to crack it.

    The Cybersecurity Dilemma: Balancing Offense and Defense in the Digital Age

    Critiquing America’s Cyber Strategy

    “Like, we have complicated organizational politics, we don’t know how to do things differently, we’re bad at using this type of talent, we’ve been doing it this way for 50 years, and it worked well for dropping bombs.”

    In recent years, the United States’ offensive hacking capabilities have seemingly become less aggressive and adaptable. Despite the “defend forward” strategy advocated by General Paul Nakasone in 2018, which aimed to confront cyber threats on enemy networks, U.S. military hackers appear to have taken a more subdued approach. Increasingly, the responsibility for responding to foreign hackers has fallen to law enforcement agencies like the FBI, which face greater legal limitations.

    The Subversive Trilemma and Targeted Aggression

    While some criticize this conservative stance, others argue that it aligns with the Subversive Trilemma, a concept introduced by researcher Lennart Maschmeyer. According to this idea, hacking operations must prioritize among intensity, speed, and control. The U.S. Cyber Command has historically emphasized control over the other variables. However, certain targets, such as ransomware gangs or hackers associated with Russia’s GRU military intelligence agency, may warrant a more aggressive approach. As Jason Healey, a former senior cybersecurity strategist at the U.S. Cybersecurity and Infrastructure Security Agency, puts it, “For those targets, you really can release the hounds.”

    The Case for Action and the Ongoing Threat

    Caceres, the former P4x hacker, argues that while he supports a conservative approach to limiting damage and protecting civilians, he believes that action is necessary. He points to the escalating attacks carried out by foreign hackers, such as the AlphV ransomware group’s targeting of medical claim platforms in February, which disrupted services for hundreds of providers and hospitals. “That escalation is already happening,” Caceres asserts. “We’re not doing anything, and they’re still escalating.”

    The Future of Cyber Warfare: P4x’s Doctrine Lives On

    Although Caceres has revealed his real identity in an attempt to engage the U.S. government in a conversation about adopting a more aggressive approach to cyber warfare, he remains committed to his cause. He states that by working independently or with a small group of trusted individuals, he can move more quickly and “fuck shit up for the people who deserve it” without the need for official approval. While the P4x handle may be retired, the P4x doctrine of cyber warfare persists.

    Alejandro Caceres Cyberwarfare FBI North Korea P4x
    Share. Facebook Twitter Copy Link
    Previous ArticleOnePlus Unveils Its Own Take on Google’s Magic Eraser Feature
    Next Article Storiaverse Unveils Innovative Short-Form Storytelling App Blending Video and Text

    Related Posts

    AI

    Get 1 Year of The Zero Byte for $30: Lawsuit Highlights Fake News

    October 21, 2024
    AI

    Get One Year of The Zero Byte for $5: How a Trump Win Could Unleash AI

    October 21, 2024
    AI

    Get One Year of The Zero Byte for $5: Sam Altman’s Eye-Scanning Orb Delivered

    October 17, 2024
    View 4 Comments

    4 Comments

    1. Aria Turner on March 26, 2024 11:11 am

      Did they hand out superhero capes after that stunt, or was it all undercover glory?

      Reply
    2. Vale on April 4, 2024 6:47 am

      So, one person can really throw a wrench in a country’s internet gears, huh? Fascinating!

      Reply
    3. VoiceVoyager on April 4, 2024 10:22 pm

      Who knew being a tech wizard could land you in the league of international vigilantes?

      Reply
    4. ChatterChameleon on April 24, 2024 6:37 am

      A real-life cyber Batman taking on a whole country’s internet, that’s gutsy!

      Reply
    Leave A Reply Cancel Reply

    Top Posts

    Truecaller Unveils Web Client for Android: Seamless Caller ID and Spam Protection

    April 10, 2024

    M4 MacBook Pro Already in Development, According to Expert

    March 15, 2024

    Withings ScanWatch 2 and Light: Effortless Elegance for the Tech-Weary

    March 11, 2024
    Stay In Touch
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from The Zero Byte about tech.

    Please enable JavaScript in your browser to complete this form.
    Loading
    Most Popular

    Truecaller Unveils Web Client for Android: Seamless Caller ID and Spam Protection

    April 10, 2024

    M4 MacBook Pro Already in Development, According to Expert

    March 15, 2024

    Withings ScanWatch 2 and Light: Effortless Elegance for the Tech-Weary

    March 11, 2024
    Our Picks

    Get 1 Year of The Zero Byte for $30: Lawsuit Highlights Fake News

    October 21, 2024

    Get One Year of The Zero Byte for $5: How a Trump Win Could Unleash AI

    October 21, 2024

    Get One Year of The Zero Byte for $5: Sam Altman’s Eye-Scanning Orb Delivered

    October 17, 2024

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Please enable JavaScript in your browser to complete this form.
    Loading
    The Zero Byte
    Facebook X (Twitter) Instagram
    • Privacy Policy
    © 2025 The Zero Byte.

    Type above and press Enter to search. Press Esc to cancel.