logo
#

Latest news with #GregLevesque

Strider Launches Fraudulent Resume Screening to Protect Companies from Nation-State and Insider Threats
Strider Launches Fraudulent Resume Screening to Protect Companies from Nation-State and Insider Threats

Associated Press

time15-05-2025

  • Business
  • Associated Press

Strider Launches Fraudulent Resume Screening to Protect Companies from Nation-State and Insider Threats

New capability addresses the growing threat of North Korean IT workers infiltrating western companies SALT LAKE CITY, May 15, 2025 /PRNewswire/ -- Strider Technologies, Inc. the leading provider of strategic intelligence, today announced the launch of its latest innovation: Falsified Resume Screening. This advanced capability enables organizations to proactively verify remote job applicants' identities, reducing insider threats and protecting them from unwittingly hiring individuals linked to nation-state adversaries, such as the Democratic People's Republic of Korea (DPRK). 'Western businesses risk major financial losses, intellectual property theft, data breaches, and reputational damages if they hire any fraudulent worker—but the risks are especially great if they hire an individual from the DPRK,' said Greg Levesque, CEO and Co-Founder of Strider. 'Government entities can alert companies to these threats, but leaders are often left to figure out how to protect their workforce alone. Strider's new screening capability meets this challenge head-on, combining cutting-edge intelligence analytics with a client-first approach to safeguarding sensitive roles and maintaining workforce fidelity.' In an era when fraudulent remote workers increasingly use sophisticated tactics to bypass hiring defenses, Strider's intelligence-driven solution automates the resume screening process—giving hiring and security teams a trusted, scalable way to vet candidates without overwhelming manual effort. Key Capabilities of Falsified Resume Screening: The launch of Falsified Resume Screening follows the Strider report, 'Inside the Shadow Network: North Korean IT Workers and Their PRC Backers.' This report detailed the tactics, techniques, and procedures (TTPs) DPRK actors use to penetrate Western workforces, and the role PRC-based entities play in these DPRK operations. The full report can be found here. About Strider Strider is the leading strategic intelligence company empowering organizations to secure and advance their technology and innovation. Leveraging cutting-edge AI technology alongside proprietary methodologies, Strider transforms publicly available data into critical insights. This increased intelligence enables organizations to proactively address and respond to risks associated with state-sponsored intellectual property theft, targeted talent acquisition, and third-party partners. Strider has operations in 15 countries around the globe with offices in Salt Lake City, Washington, DC, London, and Tokyo. Media Contact: Janelle Davis, [email protected] View original content: SOURCE Strider Technologies, Inc.

Strider Report Uncovers PRC-Based Network of Companies Affiliated with Organization Sanctioned for Aiding North Korean IT Worker Scheme
Strider Report Uncovers PRC-Based Network of Companies Affiliated with Organization Sanctioned for Aiding North Korean IT Worker Scheme

Yahoo

time13-05-2025

  • Business
  • Yahoo

Strider Report Uncovers PRC-Based Network of Companies Affiliated with Organization Sanctioned for Aiding North Korean IT Worker Scheme

Research uncovered 35 companies based in the People's Republic of China that may be helping generate illicit revenue for the DPRK government SALT LAKE CITY, May 13, 2025 /PRNewswire/ -- Strider Technologies, Inc. ("Strider"), the leading provider of strategic intelligence, today published a new report describing how North Korean actors, often with the support of entities within the People's Republic of China, work to penetrate digital workforces of Western organizations to access sensitive data, advance geopolitical goals, and generate and launder illicit proceeds. Strider's report—Inside the Shadow Network: North Korean IT Workers and Their PRC Backers—lays out the role PRC-based entities play in these DPRK operations, which often involve facilitators and front companies based in China. These intermediaries are crucial in enabling the DPRK's use of digital platforms, payment systems, and employment marketplaces, creating a cross-border infrastructure that helps obscure the origins of the workers and facilitates the laundering of illicit proceeds. Strider identified a PRC-affiliated front company that has been sanctioned by the U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) for shipping IT equipment to Department 53 of The DPRK's Ministry of The People's Armed Forces. Department 53 is a weapons-trading entity subordinate to North Korea's Ministry of National Defense that is reportedly involved in selling advanced conventional weapons and military-grade communications equipment and generating revenue through front companies in various sectors, including IT and software development. Further investigation into that OFAC-sanctioned company uncovered a shadow network of 35 other PRC-based companies that are linked to it through organizational and personal connections. These 35 affiliated companies could also be materially supporting Department 53. "North Korean actors, often posing as freelance developers or engineers, are engaged in a coordinated DPRK campaign to infiltrate Western organizations and generate desperately needed revenue," said Greg Levesque, CEO and Co-Founder of Strider. "Our research at Strider reveals how front companies based in the PRC are enabling these global operations, providing cover and infrastructure for North Korean IT workers to operate undetected. A business that hires any fraudulent worker can face financial losses, IP theft, and data breaches. However, these risks increase exponentially if a company unwittingly hires a DPRK national because their earnings directly fund sanctioned weapons programs and help the regime bypass international restrictions." The report also details the tactics, techniques, and procedures used by these North Korean operatives, including the use of fake identities, front companies, and the exploitation of global freelancing platforms; outlines the risks North Korean IT workers pose to Western businesses; and maps the spread of these workers across the globe. The full Inside the Shadow Network: North Korean IT Workers and Their PRC Backers report can be found here. About StriderStrider is the leading strategic intelligence company empowering organizations to secure and advance their technology and innovation. Leveraging cutting-edge AI technology alongside proprietary methodologies, Strider transforms publicly available data into critical insights. This increased intelligence enables organizations to proactively address and respond to risks associated with state-sponsored intellectual property theft, targeted talent acquisition, and third-party partners. Strider has operations in 15 countries around the globe with offices in Salt Lake City, Washington, DC, London, and Tokyo. Contact: media@ View original content: SOURCE Strider Technologies, Inc.

Strider Report Uncovers PRC-Based Network of Companies Affiliated with Organization Sanctioned for Aiding North Korean IT Worker Scheme
Strider Report Uncovers PRC-Based Network of Companies Affiliated with Organization Sanctioned for Aiding North Korean IT Worker Scheme

Yahoo

time13-05-2025

  • Business
  • Yahoo

Strider Report Uncovers PRC-Based Network of Companies Affiliated with Organization Sanctioned for Aiding North Korean IT Worker Scheme

Research uncovered 35 companies based in the People's Republic of China that may be helping generate illicit revenue for the DPRK government SALT LAKE CITY, May 13, 2025 /PRNewswire/ -- Strider Technologies, Inc. ("Strider"), the leading provider of strategic intelligence, today published a new report describing how North Korean actors, often with the support of entities within the People's Republic of China, work to penetrate digital workforces of Western organizations to access sensitive data, advance geopolitical goals, and generate and launder illicit proceeds. Strider's report—Inside the Shadow Network: North Korean IT Workers and Their PRC Backers—lays out the role PRC-based entities play in these DPRK operations, which often involve facilitators and front companies based in China. These intermediaries are crucial in enabling the DPRK's use of digital platforms, payment systems, and employment marketplaces, creating a cross-border infrastructure that helps obscure the origins of the workers and facilitates the laundering of illicit proceeds. Strider identified a PRC-affiliated front company that has been sanctioned by the U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) for shipping IT equipment to Department 53 of The DPRK's Ministry of The People's Armed Forces. Department 53 is a weapons-trading entity subordinate to North Korea's Ministry of National Defense that is reportedly involved in selling advanced conventional weapons and military-grade communications equipment and generating revenue through front companies in various sectors, including IT and software development. Further investigation into that OFAC-sanctioned company uncovered a shadow network of 35 other PRC-based companies that are linked to it through organizational and personal connections. These 35 affiliated companies could also be materially supporting Department 53. "North Korean actors, often posing as freelance developers or engineers, are engaged in a coordinated DPRK campaign to infiltrate Western organizations and generate desperately needed revenue," said Greg Levesque, CEO and Co-Founder of Strider. "Our research at Strider reveals how front companies based in the PRC are enabling these global operations, providing cover and infrastructure for North Korean IT workers to operate undetected. A business that hires any fraudulent worker can face financial losses, IP theft, and data breaches. However, these risks increase exponentially if a company unwittingly hires a DPRK national because their earnings directly fund sanctioned weapons programs and help the regime bypass international restrictions." The report also details the tactics, techniques, and procedures used by these North Korean operatives, including the use of fake identities, front companies, and the exploitation of global freelancing platforms; outlines the risks North Korean IT workers pose to Western businesses; and maps the spread of these workers across the globe. The full Inside the Shadow Network: North Korean IT Workers and Their PRC Backers report can be found here. About StriderStrider is the leading strategic intelligence company empowering organizations to secure and advance their technology and innovation. Leveraging cutting-edge AI technology alongside proprietary methodologies, Strider transforms publicly available data into critical insights. This increased intelligence enables organizations to proactively address and respond to risks associated with state-sponsored intellectual property theft, targeted talent acquisition, and third-party partners. Strider has operations in 15 countries around the globe with offices in Salt Lake City, Washington, DC, London, and Tokyo. Contact: media@ View original content: SOURCE Strider Technologies, Inc. Sign in to access your portfolio

Exclusive: North Korean scammers land jobs in U.S. with help from Chinese companies
Exclusive: North Korean scammers land jobs in U.S. with help from Chinese companies

Axios

time13-05-2025

  • Business
  • Axios

Exclusive: North Korean scammers land jobs in U.S. with help from Chinese companies

North Korean IT workers are setting up front companies across China as part of their global operation to trick Western companies into hiring them, according to a new report shared first with Axios. Why it matters: Nearly every Fortune 500 company has struggled with the problem of North Korea-based IT workers trying to get hired at their firms. But few talk about the problem publicly over fears of law enforcement retaliation and embarrassment. Driving the news: Strider Technologies, a cyber intelligence platform that works with eight of the Fortune 10 companies, released a report today saying it's identified 35 China-based companies linked to North Korean IT worker operations. Those 35 companies are strongly believed to be affiliated with Liaoning China Trade Industry Co., a U.S.-sanctioned company that has shipped IT equipment to a North Korean government agency. Zoom in: Strider specifically calls out three of those 35 organizations that could be helping Liaoning China Trade fund North Korea's operation: Dandong Deyun Trading Co., a registered textiles and electronics wholesaler and retailer; Guangzhou Aiyixi Trading Co., a cosmetics and clothing wholesaler that advertises itself online as a producer of commercial induction cookers and bathroom cabinets; Yongping Zhuoren Mining Co., a company registered as a wholesaler of mineral products and building materials. The big picture: For years, North Korean IT workers have been scamming U.S.-based companies into hiring them with the goal of using the higher salaries to help fund the country's missiles program. But a part of those operations have shifted to focus on gathering intelligence about the companies they're working at, including intellectual property and any other company secrets, Strider CEO Greg Levesque told Axios. The intrigue: Cybersecurity vendors have been stepping up their efforts to raise awareness about the problem over the last year. An FBI notice sent to companies earlier this year significantly raised awareness about the scope of the problem, Levesque said. Google said during a media roundtable on the sidelines of the RSA Conference last month that it had seen North Korean IT workers applying for jobs at their company. Cyber vendors SentinelOne and KnowBe4 have said they've accidentally hired these workers themselves. What they're saying: "Right now, what we're all realizing is that the scope and scale of that enterprise is far greater than people originally knew," Levesque said. Between the lines: Much of the remote hiring process is siloed, and HR professionals aren't necessarily equipped to spot a fraudulent application. New mitigation and detection tools that automatically spot applications that could have fake or misleading information will be the key to stopping this problem, Levesque said. What to watch: Strider is releasing a tool later this week that will help automatically detect falsified resumes, which North Korean IT workers are using in their job applications all the time.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store