logo
How North Korea's IT army is hacking the global job market

How North Korea's IT army is hacking the global job market

Axiosa day ago
Nearly every Fortune 500 company is hiding the same uncomfortable secret: they have hired a North Korean IT worker.
Why it matters: Despite how widespread the issue is, few companies are willing to talk publicly about it.
Experts say reputational risk, legal uncertainty, and embarrassment all contribute to the silence — which in turn makes the problem harder to solve.
Dozens of resumes, LinkedIn profiles, and fraudulent identity documents shared with Axios lay bare the scale and sophisticated of the scams.
The big picture: For North Korea, this is a precious revenue stream that evades American sanctions — capitalizing on the wealth of high-paying remote worker roles in the U.S. to route cash back to Pyongyang.
In the past two years, companies and their security partners have begun to grasp the scale of the problem — and now, they're sounding the alarm about where it's headed next.
"They've been stealing intellectual property and then working on the projects themselves," Michael "Barni" Barnhart, principal investigator at DTEX Systems, told Axios. "They're going to use AI to magnify exponentially what they're already doing — and what they're doing now is bad."
Between the lines: It sounds easy to simply weed out North Korean job applicants. But some of the world's biggest firms have found it devilishly difficult.
That's because the North Korean operation has become as complex as a multi-national corporation. It involves several North Korean government offices, dozens of China-based front companies and Americans willing to facilitate the fraud.
And the undercover North Korean IT workers are often exceptional at their jobs — at least until they start stealing sensitive data or extorting companies that try to fire them.
Google Threat Intelligence VP Sandra Joyce recalled the response of one employer when told they likely had a North Korean fraudster on staff: "You guys better be right, because that is my best guy."
The groups running the show
North Korea has invested years into building up its remote IT labor force, providing training not just for remote job fraud but also corporate espionage and IP theft.
Workers are selected and trained at elite institutions such as Kim Chaek University of Technology and the University of Sciences in Pyongsong — some with specializations in software development, AI or cryptography.
Research from DTEX shows that the most advanced worker scams are often coordinated with units like APT 45, a notorious government hacking group known for infiltrating companies, running scams and laundering money.
Other participants in the scheme include the Lazarus Group, which typically leads the regime's cryptocurrency hacks and has positioned insiders within crypto companies, and Research Center 227, a new AI research unit inside North Korea's intelligence agency.
The intrigue: Cybersecurity companies have been discovering and naming new groups running these hacks, with names like Jasper Sleet, Moonstone Sleet and Famous Chollima.
The scale
Driving the news: Nine security officials who spoke with Axios all said they've yet to meet a Fortune 500 company that hasn't inadvertently hired a North Korean IT worker.
Google told reporters at the RSA Conference in May that it had seen North Koreans applying to its jobs. SentinelOne and others have said the same.
KnowBe4, a cybersecurity training company, admitted last year that it hired a North Korean IT worker. A smaller cryptocurrency startup told the WSJ that they accidentally had North Korean workers on their payroll for almost two years.
In one case, Sam Rubin, senior vice president of Palo Alto Networks' Unit 42 consulting and threat intelligence team, told Axios that within 12 hours of a large client posting a new job, more than 90% of the applicants were suspected to be North Korean workers.
"If you hire contract IT workers, this has probably happened to you," Rubin said.
The intrigue: Even small-to-mid-sized companies that rely on remote IT talent or outsource their IT needs to a consulting firm have encountered this problem, Adam Meyers, senior vice president of counter adversary operations at CrowdStrike, said.
CrowdStrike has investigated more than 320 incidents where North Korean operatives landed jobs as remote software developers, according to the company's annual threat hunting report published earlier this month.
How it works
Getting a job at a U.S. company — and going undetected — is a team effort that involves several North Korean IT workers, China-based companies and even a handful of Americans.
Some of the North Korean workers are even stationed in China and other nearby countries to keep suspicions low.
First, the workers identify potential identities they can assume. Those are often stolen from a real person, or even from a dead U.S. citizen.
To pull off this deception, they create fake passwords, Social Security cards and utility bills. Many of them use the same recognizable tablecloth in the background of fake ID photos, Meyers said.
For instance, in a December indictment of 14 North Koreans, the workers were found using stolen identities to apply to dozens of jobs.
Second, the workers find open jobs in software development, technical support and DevOps posted on Upwork, Fiverr, LinkedIn, and third-party staffing platforms. Much of this is streamlined through AI tools that help track and manage their job applications.
Many of them will use AI tools to help generate passable resumes and LinkedIn profiles, according to Trevor Hilligoss, senior vice president at SpyCloud Labs.
"There's a hierarchy: There's a group of people who are the interviewers, and they're the ones with the really good English specialties," Hilligoss told Axios. "When they get hired, that gets turned over to somebody that's a developer."
Those developers will often juggle several jobs and multiple different personas.
Zoom in: Job interviews would seem like the obvious time to catch a fraudulent application. But the "applicants" — whether they're using their real faces and voices or AI-enabled personas — are practiced interviewers with the skills necessary to complete technical coding assignments.
In multiple cases, hiring managers only realized something was wrong weeks later when employees looked or behaved differently than during the interview, Barnhart said.
After landing the job, the developers step in and request that their company laptop be shipped to a U.S. address — often citing a last-minute move or family emergency. That address often belongs to an American accomplice, who typically operates what's known as a "laptop farm."
These facilitators are told to install specific remote desktop software onto the laptops so the North Korean worker can operate the laptop from abroad.
In July, the FBI said it executed searchers of 21 premises across 14 states that were known or suspected laptop farms, seizing 137 laptops.
Then there's the challenge of ensuring the salaries actually reach the North Korean regime.
That often requires the facilitators forward the paychecks to front companies across China or funnel it through cryptocurrency exchanges.
In a report published in May, researchers at Strider Technologies identified 35 China-based companies linked to helping North Korean operations.
Challenges
Hiring processes are so siloed that it's difficult for managers to see all the signs of fraud until the North Korean workers start their roles, Kern said.
Even if a company suspects something is wrong, the forensic signals can be subtle and scattered. Security teams may detect unusual remote access tools or strange browser behavior. HR might notice recycled references or resumes that reuse the same phone number.
But unless those insights are pooled together, it rarely raises alarms.
"There's not one giant red flag to point to," said Sarah Kern, a leading North Korea analyst at Sophos' Counter Threat Unit. "It is multiple technical forensic aspects and then such a human aspect of small things to pick up on that aren't necessarily going to be in telemetry data from an endpoint detection standpoint."
Yes, but: Even when these workers are detected, they're not easy to fire. Many of them are so talented that managers are reluctant to even believe they could actually be in North Korea, Alexandra Rose, director at Sophos' Counter Threat Unit, told Axios.
If these workers are caught, employers then face a litany of problems: Some workers will download sensitive internal data and extort the companies for a hefty sum in a last-ditch effort to bleed the company of whatever money they can.
Some workers have filed legal complaints, including workers' compensation claims, Barnhart said. In one case, Barnhart said he had a worker try to claim domestic violence protections as they were being fired just to buy time.
"There is a lot of focus on companies that cybersecurity shouldn't just be for the CISO," Rose said. "You want a bit of that security feel throughout the company, and this is the kind of case that really demonstrates why that is."
The bottom line: Some companies also hesitate to report these incidents, fearing they could be penalized for unknowingly violating U.S. sanctions — even though law enforcement officials have said they're more interested in cooperation than prosecution.
What's next
Right now, the operations are predominantly focused on making money for North Korea's regime.
Threat level: But the hacking groups involved are evolving into something more sophisticated and dangerous — including by potentially building their own AI models and feeding in sensitive U.S. company data.
That's a particular concern in the defense sector. Barnhart says his teams have seen North Korean IT workers increasingly studying information about AI technologies, drone manufacturing and other defense contract work.
What to watch: As U.S. companies become more alert, North Korean IT workers are shifting their focus abroad as they seek employment at other companies and set up laptop farms throughout Europe — suggesting the operation is only just now ramping up, instead of slowing down.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Lawyer for activist Jimmy Lai defends free speech in landmark Hong Kong trial
Lawyer for activist Jimmy Lai defends free speech in landmark Hong Kong trial

Yahoo

time10 minutes ago

  • Yahoo

Lawyer for activist Jimmy Lai defends free speech in landmark Hong Kong trial

HONG KONG (AP) — A lawyer for prominent Hong Kong democracy activist and newspaper founder Jimmy Lai argued Wednesday that it was not wrong to support freedom of expression, as he made final arguments in Lai's landmark sedition trial. Barrister Robert Pang was representing Lai in his fight against charges of colluding with foreign forces to endanger national security and conspiring with others to issue seditious publications. Lai, 77, faces up to life in prison if convicted under a national security law imposed by Beijing following anti-government protests in 2019. The high-profile trial, which has lasted 150 days so far, entered its final stage this week, though the date for a verdict remains unclear. Foreign governments and political observers are closely monitoring the outcome, which is widely seen as a barometer of the city's judicial independence and press freedom. As the defense began its closing arguments, Pang said it was not wrong to hope that the government would change its policies, whether through internal review or pressure, whether from inside or outside of Hong Kong. 'It's not wrong to try to persuade the government to change its policy. Nor is it wrong not to love a particular administration or even the country,' he said. He added that the prosecution seemed to have dismissed human rights as an alien concept. Prosecutors have deemed 161 articles published in Lai's now-defunct Apple Daily newspaper to have been seditious. Pang pushed back against that notion, using three examples to argue that they were just 'reporting,' and that the items in question were only a small fraction of what the newspaper published. Judge Esther Toh said the three-judge panel was looking at the content of the articles, not the number, and said she wasn't playing a mathematical game. She said it is not wrong not to love the government, but it becomes wrong when someone does that through certain nefarious means. Earlier in the day, prosecutor Anthony Chau concluded his closing statement, arguing that Lai was a mastermind of a conspiracy linked to foreign collusion, and that his testimony during the trial has not been credible. The hearing will resume on Thursday. Despite health issues, Lai has continued to appear in court since the final arguments began on Monday. Concerns over Lai's health delayed the trial last week after Pang reported that his client had experienced heart palpitations and the judges wanted him to receive medical treatment first. A heart monitor was delivered to Lai. Last Friday, the Hong Kong government said a medical examination of Lai found no abnormalities and that the medical care he received in custody was adequate.

Shein Reportedly Considers Moving HQ Back to China For Hong Kong IPO
Shein Reportedly Considers Moving HQ Back to China For Hong Kong IPO

Yahoo

time10 minutes ago

  • Yahoo

Shein Reportedly Considers Moving HQ Back to China For Hong Kong IPO

Shein may be plotting a move in alignment with its aspirations to go public. Shein is reportedly contemplating moving its headquarters back to China (where the company was founded) from Singapore, its current base, Bloomberg reported. In doing so, the outlet said Shein hopes to persuade authorities in Beijing to approve its bid for a Hong Kong initial public offering (IPO). More from Sourcing Journal India and China: US Tariffs Turn Rivals Toward Friendship in Major Geopolitical Shift Shein's UK Sales Jump By Nearly One-Third Trump Administration Extends China Tariff Pause for 90 Days The Financial Times reported last month that the fast-fashion company had filed for an IPO in Hong Kong; the fast-fashion company has notoriously struggled to find a sound landing location for the IPO it has reportedly pursued in two other markets: New York and London. Its U.S. IPO attempt faced scrutiny over its alleged involvement with forced labor, while its London IPO filing has faced regulatory hurdles, according to CNBC. New York or London could have provided an air of credibility to the company, which in Western markets has caught backlash from multiple directions—shoppers, consumer organizations and governments alike. It has also struggled to garner approval for an offshore IPO from Hong Kong; although Shein has been based in Singapore since 2021, it was founded in Nanjing, China, in 2008, and Chinese regulators still require companies with strong ties to the country to go through a review process before listing in any global market. But now that it has applied to list on the Hong Kong exchange, it has gone as far as consulting lawyers to discuss the creation of a mainland China-based parent company, per Bloomberg's report. If the parent entity is created, Shein's other operations—in Singapore and in global markets—would become subsidiaries of that entity. Sources reportedly noted that while discussions have begun, moving Shein's headquarters back to China is not a guarantee. Those familiar with the matter said moving back could be advantageous because it would mean that the company's income would be taxed directly in China. Shein has long faced scrutiny from global regulators, including U.S. officials who say that the company's ties to the Chinese government are already concerning. Recent policy changes, like President Donald Trump's decision to collapse the de minimis exemption for parcels inbound from Hong Kong, have also been aimed at stunting Shein and its competitors' business models. That decision has been reinforced by the passage of Republicans' megabill, which will see the total collapse of de minimis from all countries in 2027. Shein did not immediately return Sourcing Journal's request for comment. Sign in to access your portfolio

China's extension of EU dairy import probe linked to September talks
China's extension of EU dairy import probe linked to September talks

Yahoo

time10 minutes ago

  • Yahoo

China's extension of EU dairy import probe linked to September talks

China will not conclude its anti-dumping investigation into EU dairy imports until at least early next year as talks are set to continue in September. In response to China's decision this week to extend its probe to February, the European Dairy Association (EDA) said it was not surprised by the decision given Chinese officials are due to make 'technical visits' to Belgium and the Netherlands next month, as well as hold talks with the European Commission (EC). China kicked off its investigation in August last year to ascertain whether the EU was guilty of exporting dairy products to the Asian country at prices that put local producers at an unfair advantage. The probe followed similar enquiries launched by China for pork and brandy shipped from the European trading bloc that commenced in June and January of 2024, respectively. The trade spat with China was sparked by the EU threatening to impose tariffs on imports of Chinese battery electric vehicles (BEV), with the EC claiming 'unfair subsidisation' by its Chinese counterparts that risked 'causing a threat of economic injury' to local manufacturers. Xinhua, China's state-run news agency and official government mouthpiece, reported on Monday (18 August) that the Ministry of Commerce had extended its investigation into 'certain dairy products' from the EU to February The news service, citing a Ministry statement, said the extension was due to the 'complexity of the case'. Similar language emerged from the EDA. Its Secretary General Alexander Anton said in a statement: 'This highlights the increasingly complex dynamics of global dairy trade and has required coordinated responses from the industry and policymakers, and EDA will continue to work closely with the EU Commission and the 'sampled' dairies that are most involved in the process.' In October last year, China's Ministry of Commerce identified Dutch dairy giant FrieslandCampina, Elvir (France) Co. and Sterilgarda Alimenti in Italy as three EU companies that would be subject to a sampling exercise as part of its anti-dumping probe. Meanwhile, the EC took its case to the World Trade Organization (WTO) last September under a 'commitment to firmly defend the interests of the EU dairy industry and the Common Agricultural Policy against abusive proceedings'. Anton at the EDA said today (20 August) in the statement, when asked for comment and an update on those proceedings by Just Food: 'With that, for the very first time in such an early state of the procedure, the EU has given a clear political sign to step up to defend our European interest. 'WTO procedures are not known for speed and so far, we have no signs for any progress at this level.' Just Food has asked the EC for an update on the status of proceedings regarding China's probe into dairy and pork imports from the bloc, and whether there has been any progress with the WTO. When China kicked off its dairy import investigation last August, Xinhua said the probe was launched on behalf of the Dairy Association of China and the China Dairy Industry Association. The news agency suggested at the time that the review would include fresh cheese, curd and blue cheese from the EU. It was expected that the enquiry would conclude on 21 August of this year but could be extended for six months 'under special circumstances'. "China's extension of EU dairy import probe linked to September talks" was originally created and published by Just Food, a GlobalData owned brand. The information on this site has been included in good faith for general informational purposes only. It is not intended to amount to advice on which you should rely, and we give no representation, warranty or guarantee, whether express or implied as to its accuracy or completeness. You must obtain professional or specialist advice before taking, or refraining from, any action on the basis of the content on our site. Error while retrieving data Sign in to access your portfolio Error while retrieving data Error while retrieving data Error while retrieving data Error while retrieving data

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store