logo
#

Latest news with #PRC-based

Strider Launches Fraudulent Resume Screening to Protect Companies from Nation-State and Insider Threats
Strider Launches Fraudulent Resume Screening to Protect Companies from Nation-State and Insider Threats

Associated Press

time15-05-2025

  • Business
  • Associated Press

Strider Launches Fraudulent Resume Screening to Protect Companies from Nation-State and Insider Threats

New capability addresses the growing threat of North Korean IT workers infiltrating western companies SALT LAKE CITY, May 15, 2025 /PRNewswire/ -- Strider Technologies, Inc. the leading provider of strategic intelligence, today announced the launch of its latest innovation: Falsified Resume Screening. This advanced capability enables organizations to proactively verify remote job applicants' identities, reducing insider threats and protecting them from unwittingly hiring individuals linked to nation-state adversaries, such as the Democratic People's Republic of Korea (DPRK). 'Western businesses risk major financial losses, intellectual property theft, data breaches, and reputational damages if they hire any fraudulent worker—but the risks are especially great if they hire an individual from the DPRK,' said Greg Levesque, CEO and Co-Founder of Strider. 'Government entities can alert companies to these threats, but leaders are often left to figure out how to protect their workforce alone. Strider's new screening capability meets this challenge head-on, combining cutting-edge intelligence analytics with a client-first approach to safeguarding sensitive roles and maintaining workforce fidelity.' In an era when fraudulent remote workers increasingly use sophisticated tactics to bypass hiring defenses, Strider's intelligence-driven solution automates the resume screening process—giving hiring and security teams a trusted, scalable way to vet candidates without overwhelming manual effort. Key Capabilities of Falsified Resume Screening: The launch of Falsified Resume Screening follows the Strider report, 'Inside the Shadow Network: North Korean IT Workers and Their PRC Backers.' This report detailed the tactics, techniques, and procedures (TTPs) DPRK actors use to penetrate Western workforces, and the role PRC-based entities play in these DPRK operations. The full report can be found here. About Strider Strider is the leading strategic intelligence company empowering organizations to secure and advance their technology and innovation. Leveraging cutting-edge AI technology alongside proprietary methodologies, Strider transforms publicly available data into critical insights. This increased intelligence enables organizations to proactively address and respond to risks associated with state-sponsored intellectual property theft, targeted talent acquisition, and third-party partners. Strider has operations in 15 countries around the globe with offices in Salt Lake City, Washington, DC, London, and Tokyo. Media Contact: Janelle Davis, [email protected] View original content: SOURCE Strider Technologies, Inc.

Strider Report Uncovers PRC-Based Network of Companies Affiliated with Organization Sanctioned for Aiding North Korean IT Worker Scheme
Strider Report Uncovers PRC-Based Network of Companies Affiliated with Organization Sanctioned for Aiding North Korean IT Worker Scheme

Yahoo

time13-05-2025

  • Business
  • Yahoo

Strider Report Uncovers PRC-Based Network of Companies Affiliated with Organization Sanctioned for Aiding North Korean IT Worker Scheme

Research uncovered 35 companies based in the People's Republic of China that may be helping generate illicit revenue for the DPRK government SALT LAKE CITY, May 13, 2025 /PRNewswire/ -- Strider Technologies, Inc. ("Strider"), the leading provider of strategic intelligence, today published a new report describing how North Korean actors, often with the support of entities within the People's Republic of China, work to penetrate digital workforces of Western organizations to access sensitive data, advance geopolitical goals, and generate and launder illicit proceeds. Strider's report—Inside the Shadow Network: North Korean IT Workers and Their PRC Backers—lays out the role PRC-based entities play in these DPRK operations, which often involve facilitators and front companies based in China. These intermediaries are crucial in enabling the DPRK's use of digital platforms, payment systems, and employment marketplaces, creating a cross-border infrastructure that helps obscure the origins of the workers and facilitates the laundering of illicit proceeds. Strider identified a PRC-affiliated front company that has been sanctioned by the U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) for shipping IT equipment to Department 53 of The DPRK's Ministry of The People's Armed Forces. Department 53 is a weapons-trading entity subordinate to North Korea's Ministry of National Defense that is reportedly involved in selling advanced conventional weapons and military-grade communications equipment and generating revenue through front companies in various sectors, including IT and software development. Further investigation into that OFAC-sanctioned company uncovered a shadow network of 35 other PRC-based companies that are linked to it through organizational and personal connections. These 35 affiliated companies could also be materially supporting Department 53. "North Korean actors, often posing as freelance developers or engineers, are engaged in a coordinated DPRK campaign to infiltrate Western organizations and generate desperately needed revenue," said Greg Levesque, CEO and Co-Founder of Strider. "Our research at Strider reveals how front companies based in the PRC are enabling these global operations, providing cover and infrastructure for North Korean IT workers to operate undetected. A business that hires any fraudulent worker can face financial losses, IP theft, and data breaches. However, these risks increase exponentially if a company unwittingly hires a DPRK national because their earnings directly fund sanctioned weapons programs and help the regime bypass international restrictions." The report also details the tactics, techniques, and procedures used by these North Korean operatives, including the use of fake identities, front companies, and the exploitation of global freelancing platforms; outlines the risks North Korean IT workers pose to Western businesses; and maps the spread of these workers across the globe. The full Inside the Shadow Network: North Korean IT Workers and Their PRC Backers report can be found here. About StriderStrider is the leading strategic intelligence company empowering organizations to secure and advance their technology and innovation. Leveraging cutting-edge AI technology alongside proprietary methodologies, Strider transforms publicly available data into critical insights. This increased intelligence enables organizations to proactively address and respond to risks associated with state-sponsored intellectual property theft, targeted talent acquisition, and third-party partners. Strider has operations in 15 countries around the globe with offices in Salt Lake City, Washington, DC, London, and Tokyo. Contact: media@ View original content: SOURCE Strider Technologies, Inc.

Strider Report Uncovers PRC-Based Network of Companies Affiliated with Organization Sanctioned for Aiding North Korean IT Worker Scheme
Strider Report Uncovers PRC-Based Network of Companies Affiliated with Organization Sanctioned for Aiding North Korean IT Worker Scheme

Yahoo

time13-05-2025

  • Business
  • Yahoo

Strider Report Uncovers PRC-Based Network of Companies Affiliated with Organization Sanctioned for Aiding North Korean IT Worker Scheme

Research uncovered 35 companies based in the People's Republic of China that may be helping generate illicit revenue for the DPRK government SALT LAKE CITY, May 13, 2025 /PRNewswire/ -- Strider Technologies, Inc. ("Strider"), the leading provider of strategic intelligence, today published a new report describing how North Korean actors, often with the support of entities within the People's Republic of China, work to penetrate digital workforces of Western organizations to access sensitive data, advance geopolitical goals, and generate and launder illicit proceeds. Strider's report—Inside the Shadow Network: North Korean IT Workers and Their PRC Backers—lays out the role PRC-based entities play in these DPRK operations, which often involve facilitators and front companies based in China. These intermediaries are crucial in enabling the DPRK's use of digital platforms, payment systems, and employment marketplaces, creating a cross-border infrastructure that helps obscure the origins of the workers and facilitates the laundering of illicit proceeds. Strider identified a PRC-affiliated front company that has been sanctioned by the U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) for shipping IT equipment to Department 53 of The DPRK's Ministry of The People's Armed Forces. Department 53 is a weapons-trading entity subordinate to North Korea's Ministry of National Defense that is reportedly involved in selling advanced conventional weapons and military-grade communications equipment and generating revenue through front companies in various sectors, including IT and software development. Further investigation into that OFAC-sanctioned company uncovered a shadow network of 35 other PRC-based companies that are linked to it through organizational and personal connections. These 35 affiliated companies could also be materially supporting Department 53. "North Korean actors, often posing as freelance developers or engineers, are engaged in a coordinated DPRK campaign to infiltrate Western organizations and generate desperately needed revenue," said Greg Levesque, CEO and Co-Founder of Strider. "Our research at Strider reveals how front companies based in the PRC are enabling these global operations, providing cover and infrastructure for North Korean IT workers to operate undetected. A business that hires any fraudulent worker can face financial losses, IP theft, and data breaches. However, these risks increase exponentially if a company unwittingly hires a DPRK national because their earnings directly fund sanctioned weapons programs and help the regime bypass international restrictions." The report also details the tactics, techniques, and procedures used by these North Korean operatives, including the use of fake identities, front companies, and the exploitation of global freelancing platforms; outlines the risks North Korean IT workers pose to Western businesses; and maps the spread of these workers across the globe. The full Inside the Shadow Network: North Korean IT Workers and Their PRC Backers report can be found here. About StriderStrider is the leading strategic intelligence company empowering organizations to secure and advance their technology and innovation. Leveraging cutting-edge AI technology alongside proprietary methodologies, Strider transforms publicly available data into critical insights. This increased intelligence enables organizations to proactively address and respond to risks associated with state-sponsored intellectual property theft, targeted talent acquisition, and third-party partners. Strider has operations in 15 countries around the globe with offices in Salt Lake City, Washington, DC, London, and Tokyo. Contact: media@ View original content: SOURCE Strider Technologies, Inc. Sign in to access your portfolio

US Lawmakers Urge SEC to Delist CCP-Linked Companies
US Lawmakers Urge SEC to Delist CCP-Linked Companies

Epoch Times

time07-05-2025

  • Business
  • Epoch Times

US Lawmakers Urge SEC to Delist CCP-Linked Companies

A group of Republican lawmakers is asking the U.S. Securities and Exchange Commission (SEC) to delist some Chinese companies, including the Chinese low-cost online retailer Temu's owner PDD Holdings, saying that their ties to the Chinese Communist Party (CCP) put U.S. national security at risk. Led by Rep. John Moolenaar (R-Mich.), chairman of the House Select Committee on the CCP, and Sen. Rick Scott (R-Fla.), chairman of the Senate Special Committee on Aging, the lawmakers 'These companies are not just commercial entities; they are instruments of the Chinese Communist Party's broader strategy to undermine U.S. interests,' Moolenaar The lawmakers said they didn't provide an 'exhaustive list' when naming the companies. 'It reflects only a subset of PRC-based firms accessing U.S. capital while serving a genocidal dictatorship and our foremost geostrategic rival,' the lawmakers wrote. The lawmakers explained that the 20 companies shared one or more of the same characteristics: having been subjected to U.S. government restrictions, maintaining hidden Party mechanisms, secretly supporting Chinese military applications, and being connected to slave labor. Related Stories 5/3/2025 5/6/2025 Regarding U.S. government restrictions, the letter named light detection and ranging solutions (LiDAR) company Hesai, fintech company Qifu Technology, music streaming company Tencent Music, and photovoltaics company Daqo New Energy. Tencent Music's parent company, Tencent Holdings, Qifu Technology's parent company, Qihoo 360, and Hesai are on the The U.S. Commerce Department The 20 companies also include Chinese conglomerate Alibaba Group Holding, online retail platform search engine Baidu, social media platform Weibo, electric vehicle manufacturer Zeekr, and autonomous driving company WeRide. According to the letter, Alibaba has a party committee within the company, and its cloud division works with two Pentagon-designated Chinese military companies, Global Tone Communication Technology and China North Industries Group Corporation. Additionally, Alibaba has created facial recognition technology to identify ethnic Uyghurs and played a role in the sales of products associated with forced labor. Zeekr has a smart factory 'serving as a CCP training and propaganda base for ideological education, career grooming, and university-enterprise integration,' the letter states. What's more, Zeekr is tied to China's military-civil fusion and has sold more than 1,000 sedans to the People's Liberation Army. The U.S. State Department 'Under Beijing's model of military-civil fusion, data, capital, hardware, and research—no matter how commercial on the surface—are ultimately harnessed for nefarious state purposes,' the lawmakers wrote. 'Those purposes include surveillance, repression, and, in the event of a military conflict, operations aimed at defeating the American military and killing our service members. 'The SEC can—and must—act.' The lawmakers said the SEC had the necessary authority under the Holding Foreign Companies Accountable Act to 'suspend trading and compel delisting by suspending or revoking the registration of the securities of Chinese companies that do not adequately protect American investors.' As of March 7, there were 286 Chinese companies listed on the New York Stock Exchange (NYSE), Nasdaq, and NYSE American, Other lawmakers who have signed the letter include Reps. Rob Wittman (R-Va.), Andy Barr (R-Ky.), Darin LaHood (R-Ill.), Gus Bilirakis (R-Fla.), Dan Newhouse (R-Wash.), Ashley Hinson (R-Iowa), Nathaniel Moran (R-Texas), and Sen. Jim Justice (

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store