Fraud Management & Cybercrime,
Governance & Risk Management,
Remote Workforce
Encouraging Thorough Verification of Candidates’ Identities

Remote IT workers from North Korea present an intricate challenge for employers. Known for being skilled and efficient, these individuals pose significant security risks as they have infiltrated numerous Fortune 500 companies, reportedly generating up to $500 million in wages that support a repressive regime. This alarming trend raises serious concerns within the cybersecurity landscape.
North Korean IT professionals, operating under stolen identities and fabricated resumes, exploit advanced technologies including deepfakes to successfully secure positions within reputable organizations. According to Michael Barnhart, a nation-state threat investigator at a data loss prevention firm, there are approximately 3,000 active North Korean operatives at keyboards, utilizing around 30,000 distinct email accounts linked to multiple worker personas. This level of organization highlights a concerning trend in identity misuse on a global scale.
The United Nations has indicated that many of these workers are based in China, with others in Russia, Africa, and Southeast Asia, necessitating that they cloak their true locations. Techniques such as Virtual Private Networks (VPNs), proxies, and compromised servers are commonly employed to mask their actual whereabouts. Security experts suggest that employers should engage with network security vendors to leverage deep packet inspection (DPI) tools, which can help identify unusual VPN and proxy connections that may emanate from these fraudsters.
Employers are advised to adopt a proactive approach to verify candidates, particularly those using services known for anonymity, such as specific VPN providers highlighted by Microsoft as favored by North Korean actors. Detection of fabricated identities has proven difficult, especially on platforms like LinkedIn and GitHub, where profiles may feature unverifiable information, minimal activity, and AI-generated images. Experts recommend conducting thorough validations and personal outreach to candidates, aligning their profiles with observable behaviors and activities.
Employers should also be vigilant for indicators of deepfake technology during interviews. Candidates who exhibit reluctance to engage in live video or display unusually smooth interactions may warrant further scrutiny. The increasing sophistication of deepfake technology complicates identity verification efforts, making it challenging to differentiate genuine candidates from those employing deception tactics.
Moreover, questions pertaining to cultural knowledge or politically sensitive topics can effectively expose North Korean operatives posing as natives of other regions. Interview techniques that probe for familiarity with local customs or political landscapes can assist in identifying inconsistencies in responses that may indicate imposters.
In summary, the infiltration of North Korean operatives into legitimate job markets represents a multifaceted cybersecurity threat. By understanding the tactics outlined in the MITRE ATT&CK framework—such as initial access and identity deception—business owners can develop more effective risk management strategies. This heightened awareness positions companies to better gauge the risks associated with remote hiring practices and reinforces the necessity for robust verification processes.