top of page
Search

North Korea Is Using Fake Employees to Get Hired into Companies

  • Dell D.C. Carvalho
  • Apr 1
  • 2 min read

Fake IT Worker Exposed

In 2022, a U.S. company unknowingly hired a North Korean IT worker. The employee, using a stolen identity, worked remotely and funneled earnings back to North Korea. Authorities caught the scheme when the worker accessed a system from an IP address linked to North Korea. The FBI later found that the worker was part of a broader operation involving hundreds of fake employees placed in companies worldwide.


Two men, one pulling off a mask revealing another's angry face, in a comic-style art. Red star badge, bold colors, industrial backdrop.

North Korea’s Strategy

The U.S. government estimates that North Korea earns at least $500 million annually by placing IT workers in foreign companies¹. These workers often use false identities, stolen Social Security numbers, and forged resumes. Many work remotely, making detection difficult.


A 2023 report from the U.S. Department of Treasury found that North Korean workers primarily seek jobs in software development, blockchain technology, and artificial intelligence². By securing these roles, they access sensitive corporate data and sometimes deploy malware or facilitate cyberattacks.


Global Impact

The United Nations reported that North Korea has over 6,000 cyber operatives dedicated to financial crimes³. In 2022, North Korean hackers stole $1.7 billion in cryptocurrency⁴. Many of these operations begin with fake employees securing legitimate jobs in tech firms.


Governments have responded by tightening hiring regulations. In May 2023, the U.S. Department of Homeland Security issued guidelines to help companies spot fraudulent applicants, advising employers to verify IP addresses, conduct live interviews, and use third-party identity verification services⁵.


Preventing Future Infiltrations

Businesses can reduce risk by implementing strict hiring checks. They should verify identity documents, use multiple verification steps, and monitor remote access logs for suspicious activity. Training HR and IT teams to recognize red flags can help stop North Korean operations before they cause damage.


References

  1. U.S. Department of Treasury, 2023 Report on North Korean Sanctions

  2. FBI Cyber Division, 2023 Advisory on North Korean IT Workers

  3. United Nations Security Council, 2023 Report on North Korea’s Cyber Activities

  4. Chainalysis, 2023 Cryptocurrency Crime Report

  5. U.S. Department of Homeland Security, May 2023 Hiring Security Guidelines


 
 
 

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating

© 2024 Dailectics Lab

bottom of page