North Korean remote worker infiltration scheme
Founded | c. 2014 |
---|---|
Founding location | North Korea |
Years active | 2014–present |
Territory | Global (primarily targeting US and European companies) |
Ethnicity | Primarily North Korean |
Membership | Estimated 8,400 cyber operatives (2024) |
Criminal activities | Identity theft, Wire fraud, Money laundering, Cyber espionage |
North Korean operatives have posed as remote workers in Western companies under stolen or fabricated identities, primarily targeting information technology and technical roles. They generate revenue for the North Korean government, particularly to fund its weapons programs.
Operations
[edit]The operation emerged as part of North Korea's broader cybercrime strategy under Kim Jong Un, who made information technology a national priority after assuming power in 2011.[1] The COVID-19 pandemic significantly expanded remote work opportunities, which North Korean intelligence services exploited to scale up their operations.
According to South Korea's National Intelligence Service, the number of people working in North Korea's cyber divisions grew from 6,800 in 2022 to 8,400 in 2024, including IT worker infiltrators, cryptocurrency thieves, and military hackers.[1]
The operations are run out of North Korea's Department 53. It is behind front companies including Korea Osong Shipping Co. and Chonsurim Trading Corporation, that sent IT workers to Laos.[2]
Recruitment and training
[edit]North Korean intelligence services, including the Reconnaissance General Bureau, recruit top graduates from prestigious institutions such as Kim Chaek University of Technology and the University of Sciences in Pyongsong.[1] These operatives are trained in hacking techniques, foreign languages, and are promised higher wages and internet access as incentives.
Methodology
[edit]The scheme typically follows a standardized process:
- Identity Theft: Operatives create fake profiles using stolen personal information, including Social Security numbers, addresses, and other credentials from real Americans.[3]
- Job Applications: Using platforms like LinkedIn and freelance sites like Upwork, operatives apply for high-paying, fully remote positions, with a focus on IT roles such as software engineering, web design, and full-stack development, though the scheme has expanded to other technical and some non-technical roles.[3][4]
- AI-Enhanced Interviews: Operatives use artificial intelligence tools, including deepfake technology, to pass video interviews and coding assessments while impersonating their stolen identities.[3]
- Laptop Farms: After being hired, operatives request that company laptops be sent to addresses controlled by US-based facilitators, who maintain "laptop farms" containing dozens of devices that can be controlled remotely.[1]
Income
[edit]According to US government estimates, a typical team of North Korean IT workers can earn up to $3 million annually.[1] Individual workers can earn an average of $300,000 per year, with the funds being funneled directly to North Korea's government and weapons programs.[3] Some operatives work multiple jobs simultaneously to maximize earnings.
Notable cases
[edit]Christina Chapman case
[edit]In 2025, Christina Chapman, a 44-year-old American citizen from Arizona, pleaded guilty to charges related to operating a laptop farm that facilitated North Korean operatives for three years. Chapman's operation involved over 300 American companies and generated more than $17 million for the North Korean government.[1]
KnowBe4 incident
[edit]In July 2024, KnowBe4, a Florida-based cybersecurity training company, discovered that a new hire identified as "Kyle" was actually a North Korean operative who had passed background checks and ID verification.[1][5]
Impact
[edit]According to Mandiant (now part of Google Cloud), nearly every Fortune 500 company chief information security officer interviewed about the issue has admitted to hiring at least one North Korean IT worker.[3] SentinelOne, a cybersecurity firm, reported receiving approximately 1,000 job applications linked to North Korean operatives.[3]
North Korean operatives generally target software engineer, front-end developer and full-stack developer jobs, though the scheme extends to roles beyond traditional IT.[4]
Beyond salary payments, impact includes:
- Data Theft: Operatives often steal sensitive company data and intellectual property
- Malware Installation: Some plant malicious software for future access or ransomware attacks
- Compliance Violations: Unknowingly employing North Korean operatives violates international sanctions[3]
While initially focused on US companies, the scheme has expanded globally. CrowdStrike reports tracking similar operations in the United Kingdom, Poland, Romania, and other European nations, as well as organizations in South Asian countries.[3]
Government response
[edit]The FBI, State Department, and Treasury Department have issued joint advisories warning companies about the threat, [3] and initiated multiple prosecutions.
In December 2024, the Justice Department indicted 14 North Koreans for generating at least $88 million over six years.[6]
The Department of Justice announced indictments in January 2025 against two Americans for operating a six-year scheme that placed North Korean operatives in over 60 US companies, generating more than $800,000 in revenue.[7]
The U.S. Treasury’s Office of Foreign Assets Control (OFAC) announced sanctions in January 2025 against two individuals and four entities involved in North Korea's illicit remote IT worker schemes that generate revenue for the country's weapons programs. The sanctioned entities include two front companies (Korea Osong Shipping Co. and Chonsurim Trading Corporation) that sent IT workers to Laos, Chinese company Liaoning China Trade Industry Co. for supplying technological equipment, and individuals Jong In Chol and Son Kyong Sik who ran the front operations.[2]
See also
[edit]References
[edit]- ^ a b c d e f g Johnson, Bobbie (May 1, 2025). "North Korea Stole Your Tech Job". Wired. Retrieved June 10, 2025.
- ^ a b Otto, Greg (2025-01-16). "Treasury sanctions North Korea over remote IT worker schemes". CyberScoop. Retrieved 2025-06-11.
- ^ a b c d e f g h i "Tech companies have a big remote worker problem: North Korean operatives". Politico. May 12, 2025. Retrieved June 10, 2025.
- ^ a b Kapko, Matt (April 1, 2025). "The North Korea worker problem is bigger than you think". CyberScoop. Retrieved June 10, 2025.
- ^ "Firm hacked after accidentally hiring North Korean cyber criminal". www.bbc.com. 2024-10-16. Retrieved 2025-06-11.
- ^ Starks, Tim (2024-12-12). "Court indicts 14 North Korean IT workers tied to $88 million in illicit gains". CyberScoop. Retrieved 2025-06-11.
- ^ "Office of Public Affairs | Two North Korean Nationals and Three Facilitators Indicted for Multi-Year Fraudulent Remote Information Technology Worker Scheme that Generated Revenue for the Democratic People's Republic of Korea | United States Department of Justice". www.justice.gov. 2025-01-23. Retrieved 2025-06-11.