Using cybercrime intelligence data from Hudson Rock, we analyzed a machine belonging to a suspected DPRK IT worker that was accidentally infected with the LummaC2 infostealer. Instead of corporate credentials, this log contained the ultimate "smoking gun" exposing a previously undocumented Indonesian proxy node. Here is a look inside the digital life of a state-sponsored fraudster.