North Korean State Actors Exploit Fake Employee Schemes to Infiltrate Companies
Summary
Hide ▲
Show ▼
North Korean state actors have been using fake or stolen identities to secure IT jobs in various companies, particularly in the blockchain and technology sectors. These actors have stolen virtual currency and funneled money to North Korea's weapons program. The practice has escalated with the rise of remote work and AI, enabling fraudsters to impersonate employees and gain privileged access to company networks. A joint investigation led by Mauro Eldritch, founder of BCA LTD, conducted together with threat-intel initiative NorthScan and ANY.RUN, uncovered a network of remote IT workers tied to Lazarus Group's Famous Chollima division. Researchers captured live activity of Lazarus operators on what they believed were real developer laptops, which were actually fully controlled, long-running sandbox environments created by ANY.RUN. Thousands of North Korean IT workers have infiltrated the job market over the past two years, exploiting vulnerabilities in hiring processes and remote work environments. Over 320 cases of North Korean operatives infiltrating companies by posing as remote IT workers were identified in August 2025. The Justice Department has shut down several laptop farms used by these actors, but the problem persists, with security experts warning of significant security risks and financial losses for affected companies. The U.S. Treasury's Office of Foreign Assets Control (OFAC) has recently sanctioned two individuals and two entities for their role in these schemes, identifying financial transfers worth nearly $600,000 and over $1 million in profits generated since 2021. Japan, South Korea, and the United States are collaborating to combat North Korean IT worker schemes. The three countries held a joint forum on August 26, 2025, in Tokyo to improve collaboration, with both Japan and South Korea issuing updated advisories on the threat. The United States sanctioned four entities for their roles in the IT worker fraud schemes, accusing them of working to help the Democratic People's Republic of Korea (DPRK) to generate revenue. Recently, five U.S. citizens pleaded guilty to assisting North Korea's illicit revenue generation schemes by enabling IT worker fraud. The scheme impacted more than 136 U.S. victim companies, generated more than $2.2 million in revenue for the DPRK regime, and compromised the identities of more than 18 U.S. persons. The US government has seized $15m worth of gains in Tether (USDT) from APT38 actors, seeking to return the funds to their rightful owners. North Korean IT recruiters target and lure developers into renting their identities for illicit fundraising. Famous Chollima, part of North Korea’s state-sponsored Lazarus group, uses deep fake videos and avoids appearing on camera during interviews. Legitimate engineers are recruited to act as figureheads in DPRK agents’ operations to secure remote jobs at targeted companies. Compromised engineers receive a percentage of the salary, between 20% and 35%, for the duration of the contract. DPRK agents use compromised engineers' computers as proxies for malicious activities to hide their location and traces. North Korean recruiters use AI-powered tools like AIApply, Simplify Copilot, Final Round AI, and Saved Prompts to autofill job applications and create resumes. The threat actor used Astrill VPN, a popular service among North Korean fake IT workers, for remote connections. The Famous Chollima team involved in this operation consisted of six members, who used the names Mateo, Julián, Aaron, Jesús, Sebastián, and Alfredo.
Timeline
-
04.09.2025 04:00 3 articles · 3mo ago
Japan, South Korea, and the U.S. Collaborate to Combat North Korean IT Worker Schemes
The threat actors often conceal their foreign location by using VPNs or remote desktop services. The scheme has expanded operations to Europe and deepened networks in the Asia Pacific, claiming residency in Japan, Malaysia, Singapore, and Vietnam. The main goal of these operations is for revenue generation back to the regime. The scheme poses serious risks, ranging from theft of intellectual property, data, and funds to reputational harm and legal consequences. The forum brought together government officials with private-sector experts, including from Google Cloud's Mandiant, to find additional strategies to combat the threat. Five U.S. citizens have pleaded guilty to assisting North Korea's illicit revenue generation schemes by enabling IT worker fraud.
Show sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
28.08.2025 11:53 3 articles · 3mo ago
U.S. Treasury Sanctions Key Players in North Korean IT Worker Scheme
The US Treasury Department sanctioned Vitaliy Sergeyevich Andreyev, Kim Ung Sun, Shenyang Geumpungri Network Technology, and Korea Sinjin Trading Corp for their roles in the IT worker scheme. The two individuals and two companies allegedly acted as fronts for the North Korean government to facilitate the transfer of at least $1.6 million to the regime. The DoJ has also filed two civil complaints to forfeit cryptocurrency valued at more than $15 million seized from APT38 actors.
Show sources
- U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits — thehackernews.com — 28.08.2025 11:53
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
21.08.2025 00:39 8 articles · 3mo ago
North Korean Actors Steal $900,000 in Virtual Currency Using Fake Employee Scheme
The US Department of Justice (DoJ) described the five individuals as 'facilitators' who assisted North Korean hackers with obtaining remote IT employment with US companies. The defendants allegedly provided personal, false or stolen identities and hosted laptops provided by the victim company at residences across the US to create the false appearance that the IT workers were employed domestically. The US government has seized $15m worth of gains in Tether (USDT) from APT38 actors, seeking to return the funds to their rightful owners. North Korean IT recruiters target and lure developers into renting their identities for illicit fundraising. Famous Chollima, part of North Korea’s state-sponsored Lazarus group, uses deep fake videos and avoids appearing on camera during interviews. Legitimate engineers are recruited to act as figureheads in DPRK agents’ operations to secure remote jobs at targeted companies. Compromised engineers receive a percentage of the salary, between 20% and 35%, for the duration of the contract. DPRK agents use compromised engineers' computers as proxies for malicious activities to hide their location and traces. North Korean recruiters use AI-powered tools like AIApply, Simplify Copilot, Final Round AI, and Saved Prompts to autofill job applications and create resumes. The threat actor used Astrill VPN, a popular service among North Korean fake IT workers, for remote connections. The Famous Chollima team involved in this operation consisted of six members, who used the names Mateo, Julián, Aaron, Jesús, Sebastián, and Alfredo. A joint investigation led by Mauro Eldritch, founder of BCA LTD, conducted together with threat-intel initiative NorthScan and ANY.RUN, uncovered a network of remote IT workers tied to Lazarus Group's Famous Chollima division. Researchers captured live activity of Lazarus operators on what they believed were real developer laptops, which were actually fully controlled, long-running sandbox environments created by ANY.RUN. The operation began when NorthScan's Heiner García impersonated a U.S. developer targeted by a Lazarus recruiter using the alias 'Aaron' (also known as 'Blaze'). The scheme involved stealing or borrowing an identity, passing interviews with AI tools and shared answers, working remotely via the victim's laptop, and funneling salary back to DPRK. The operators used AI-driven job automation tools, browser-based OTP generators, Google Remote Desktop, and performed routine system reconnaissance. Connections were consistently routed through Astrill VPN, a pattern tied to previous Lazarus infrastructure.
Show sources
- Fake Employees Pose Real Security Risks — www.darkreading.com — 21.08.2025 00:39
- U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits — thehackernews.com — 28.08.2025 11:53
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
Information Snippets
-
North Korean actors have used fake or stolen identities to secure IT jobs in blockchain and technology companies.
First reported: 21.08.2025 00:393 sources, 7 articlesShow sources
- Fake Employees Pose Real Security Risks — www.darkreading.com — 21.08.2025 00:39
- U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits — thehackernews.com — 28.08.2025 11:53
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
These actors have stolen virtual currency worth over $900,000 from a blockchain research and development company.
First reported: 21.08.2025 00:392 sources, 3 articlesShow sources
- Fake Employees Pose Real Security Risks — www.darkreading.com — 21.08.2025 00:39
- U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits — thehackernews.com — 28.08.2025 11:53
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
The Justice Department has shut down laptop farms used by North Korean actors to impersonate US-based IT workers.
First reported: 21.08.2025 00:392 sources, 4 articlesShow sources
- Fake Employees Pose Real Security Risks — www.darkreading.com — 21.08.2025 00:39
- U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits — thehackernews.com — 28.08.2025 11:53
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
Fake employees often have privileged access to company networks, posing significant security risks.
First reported: 21.08.2025 00:392 sources, 4 articlesShow sources
- Fake Employees Pose Real Security Risks — www.darkreading.com — 21.08.2025 00:39
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
The growth in remote work and AI has facilitated the rise of fake employee schemes.
First reported: 21.08.2025 00:392 sources, 5 articlesShow sources
- Fake Employees Pose Real Security Risks — www.darkreading.com — 21.08.2025 00:39
- U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits — thehackernews.com — 28.08.2025 11:53
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
Security experts recommend a multi-layered approach, including supervision, access governance, and AI-driven behavioral analytics, to counteract these threats.
First reported: 21.08.2025 00:392 sources, 3 articlesShow sources
- Fake Employees Pose Real Security Risks — www.darkreading.com — 21.08.2025 00:39
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
Only a small percentage of enterprises have adopted strict least-privilege access and just-in-time access frameworks.
First reported: 21.08.2025 00:392 sources, 3 articlesShow sources
- Fake Employees Pose Real Security Risks — www.darkreading.com — 21.08.2025 00:39
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
The U.S. Treasury's Office of Foreign Assets Control (OFAC) has sanctioned two individuals and two entities for their role in North Korean IT worker schemes.
First reported: 28.08.2025 11:533 sources, 4 articlesShow sources
- U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits — thehackernews.com — 28.08.2025 11:53
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
-
The North Korean IT worker scheme is tracked as Famous Chollima, Jasper Sleet, UNC5267, and Wagemole, and is affiliated with the Workers' Party of Korea.
First reported: 28.08.2025 11:533 sources, 6 articlesShow sources
- U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits — thehackernews.com — 28.08.2025 11:53
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
The scheme involves embedding North Korean IT workers in legitimate companies using fraudulent documents, stolen identities, and false personas on various platforms.
First reported: 28.08.2025 11:532 sources, 5 articlesShow sources
- U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits — thehackernews.com — 28.08.2025 11:53
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
The actors have used AI-powered tools like Claude to create convincing professional backgrounds and technical portfolios.
First reported: 28.08.2025 11:533 sources, 6 articlesShow sources
- U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits — thehackernews.com — 28.08.2025 11:53
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
The actors have introduced malware into company networks to exfiltrate proprietary and sensitive data.
First reported: 28.08.2025 11:533 sources, 6 articlesShow sources
- U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits — thehackernews.com — 28.08.2025 11:53
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
The Treasury Department has identified financial transfers worth nearly $600,000 by converting cryptocurrency to cash in U.S. dollars since December 2024.
First reported: 28.08.2025 11:531 source, 2 articlesShow sources
- U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits — thehackernews.com — 28.08.2025 11:53
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
Shenyang Geumpungri is a Chinese front company for Chinyong that has generated over $1 million in profits since 2021.
First reported: 28.08.2025 11:532 sources, 3 articlesShow sources
- U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits — thehackernews.com — 28.08.2025 11:53
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
Korea Sinjin Trading Corporation is a DPRK company subordinate to the U.S.-sanctioned DPRK Ministry of People's Armed Forces General Political Bureau.
First reported: 28.08.2025 11:532 sources, 3 articlesShow sources
- U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits — thehackernews.com — 28.08.2025 11:53
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
Japan, South Korea, and the United States are collaborating to combat North Korean IT worker schemes.
First reported: 04.09.2025 04:002 sources, 2 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
The three countries held a joint forum on August 26, 2025, in Tokyo to improve collaboration.
First reported: 04.09.2025 04:003 sources, 3 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
-
Japan and South Korea issued updated advisories on the threat.
First reported: 04.09.2025 04:002 sources, 2 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
The United States sanctioned four entities for their roles in the IT worker fraud schemes.
First reported: 04.09.2025 04:002 sources, 2 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
The scheme has collected more than $88 million over six years.
First reported: 04.09.2025 04:002 sources, 2 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
The threat actors often launder payroll through front companies and use remote-access tools to control employer-issued devices.
First reported: 04.09.2025 04:003 sources, 5 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
The scheme involves thousands of operatives and facilitators with distinct roles, such as setting up and running laptop farms in non-sanctioned countries.
First reported: 04.09.2025 04:002 sources, 4 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
The US Treasury Department sanctioned Vitaliy Sergeyevich Andreyev, Kim Ung Sun, Shenyang Geumpungri Network Technology, and Korea Sinjin Trading Corp for their roles in the IT worker scheme.
First reported: 04.09.2025 04:003 sources, 3 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
-
The two individuals and two companies allegedly acted as fronts for the North Korean government to facilitate the transfer of at least $1.6 million to the regime.
First reported: 04.09.2025 04:002 sources, 2 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
The Japanese government warned companies to take precautions to verify identities and requested that freelance-platform providers reinforce their anti-fraud efforts.
First reported: 04.09.2025 04:002 sources, 2 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
The threat actors often conceal their foreign location by using VPNs or remote desktop services.
First reported: 04.09.2025 04:003 sources, 5 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
The scheme has expanded operations to Europe and deepened networks in the Asia Pacific, claiming residency in Japan, Malaysia, Singapore, and Vietnam.
First reported: 04.09.2025 04:002 sources, 2 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
The main goal of these operations is for revenue generation back to the regime.
First reported: 04.09.2025 04:003 sources, 5 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
The scheme poses serious risks, ranging from theft of intellectual property, data, and funds to reputational harm and legal consequences.
First reported: 04.09.2025 04:002 sources, 3 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
The forum brought together government officials with private-sector experts, including from Google Cloud's Mandiant, to find additional strategies to combat the threat.
First reported: 04.09.2025 04:004 sources, 4 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
-
Over 320 cases of North Korean operatives infiltrating companies by posing as remote IT workers were identified in August 2025.
First reported: 08.09.2025 12:201 source, 2 articlesShow sources
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
Five U.S. citizens have pleaded guilty to assisting North Korea's illicit revenue generation schemes by enabling IT worker fraud.
First reported: 15.11.2025 12:211 source, 1 articleShow sources
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
Audricus Phagnasay, Jason Salazar, and Alexander Paul Travis pleaded guilty to wire fraud conspiracy for allowing IT workers to use their U.S. identities to secure jobs at American firms.
First reported: 15.11.2025 12:212 sources, 2 articlesShow sources
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
-
The three defendants also served as facilitators, hosting company-issued laptops at their residences and installing remote desktop software without authorization.
First reported: 15.11.2025 12:212 sources, 2 articlesShow sources
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
-
Oleksandr Didenko pleaded guilty to wire fraud conspiracy and aggravated identity theft for stealing U.S. citizens' identities and selling them to IT workers.
First reported: 15.11.2025 12:211 source, 1 articleShow sources
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
Didenko ran a website called 'Upworksell.com' designed to help overseas IT workers buy or rent stolen or borrowed identities.
First reported: 15.11.2025 12:212 sources, 2 articlesShow sources
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
-
Didenko managed as many as 871 proxy identities and facilitated the operation of at least three U.S.-based laptop farms.
First reported: 15.11.2025 12:212 sources, 2 articlesShow sources
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
-
Erick Ntekereze Prince pleaded guilty to wire fraud conspiracy for operating a company called Taggcar Inc. to supply 'certified' IT workers to U.S. companies.
First reported: 15.11.2025 12:212 sources, 2 articlesShow sources
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
-
The scheme impacted more than 136 U.S. victim companies, generated more than $2.2 million in revenue for the DPRK regime, and compromised the identities of more than 18 U.S. persons.
First reported: 15.11.2025 12:212 sources, 2 articlesShow sources
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
-
The DoJ has filed two civil complaints to forfeit cryptocurrency valued at more than $15 million seized from APT38 actors.
First reported: 15.11.2025 12:212 sources, 2 articlesShow sources
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
-
The US Department of Justice (DoJ) described the five individuals as 'facilitators' who assisted North Korean hackers with obtaining remote IT employment with US companies.
First reported: 17.11.2025 13:151 source, 1 articleShow sources
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
-
The defendants allegedly provided personal, false or stolen identities and hosted laptops provided by the victim company at residences across the US to create the false appearance that the IT workers were employed domestically.
First reported: 17.11.2025 13:151 source, 1 articleShow sources
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
-
The US government managed to seize $15m worth of gains in Tether (USDT), a stable cryptocurrency pegged to the US dollar and backed by cash and cash-equivalent reserves held by Tether Limited.
First reported: 17.11.2025 13:151 source, 1 articleShow sources
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
-
The US government now seeks to return these $15m to the rightful owners.
First reported: 17.11.2025 13:151 source, 1 articleShow sources
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
-
The DoJ identified the North Korean hacking collective that received support from the five defendants as APT38, a nation-state group active since at least 2014 and attributed to the Pyongyang’s Reconnaissance General Bureau. The group is commonly known as also known as the Lazarus Group.
First reported: 17.11.2025 13:152 sources, 2 articlesShow sources
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
-
The US government has seized $15m worth of gains in Tether (USDT) from APT38 actors.
First reported: 17.11.2025 13:151 source, 1 articleShow sources
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
-
North Korean IT recruiters target and lure developers into renting their identities for illicit fundraising.
First reported: 02.12.2025 16:571 source, 1 articleShow sources
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
-
Famous Chollima, part of North Korea’s state-sponsored Lazarus group, uses deep fake videos and avoids appearing on camera during interviews.
First reported: 02.12.2025 16:572 sources, 2 articlesShow sources
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
Legitimate engineers are recruited to act as figureheads in DPRK agents’ operations to secure remote jobs at targeted companies.
First reported: 02.12.2025 16:572 sources, 2 articlesShow sources
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
Compromised engineers receive a percentage of the salary, between 20% and 35%, for the duration of the contract.
First reported: 02.12.2025 16:572 sources, 2 articlesShow sources
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
DPRK agents use compromised engineers' computers as proxies for malicious activities to hide their location and traces.
First reported: 02.12.2025 16:572 sources, 2 articlesShow sources
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
North Korean recruiters use AI-powered tools like AIApply, Simplify Copilot, Final Round AI, and Saved Prompts to autofill job applications and create resumes.
First reported: 02.12.2025 16:572 sources, 2 articlesShow sources
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
The threat actor used Astrill VPN, a popular service among North Korean fake IT workers, for remote connections.
First reported: 02.12.2025 16:572 sources, 2 articlesShow sources
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
The Famous Chollima team involved in this operation consisted of six members, who used the names Mateo, Julián, Aaron, Jesús, Sebastián, and Alfredo.
First reported: 02.12.2025 16:572 sources, 2 articlesShow sources
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
A joint investigation led by Mauro Eldritch, founder of BCA LTD, conducted together with threat-intel initiative NorthScan and ANY.RUN, uncovered a network of remote IT workers tied to Lazarus Group's Famous Chollima division.
First reported: 02.12.2025 17:021 source, 1 articleShow sources
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
Researchers captured live activity of Lazarus operators on what they believed were real developer laptops, which were actually fully controlled, long-running sandbox environments created by ANY.RUN.
First reported: 02.12.2025 17:021 source, 1 articleShow sources
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
The operation began when NorthScan's Heiner García impersonated a U.S. developer targeted by a Lazarus recruiter using the alias 'Aaron' (also known as 'Blaze').
First reported: 02.12.2025 17:021 source, 1 articleShow sources
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
The scheme involved stealing or borrowing an identity, passing interviews with AI tools and shared answers, working remotely via the victim's laptop, and funneling salary back to DPRK.
First reported: 02.12.2025 17:021 source, 1 articleShow sources
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
The operators used AI-driven job automation tools (Simplify Copilot, AiApply, Final Round AI) to auto-fill applications and generate interview answers.
First reported: 02.12.2025 17:021 source, 1 articleShow sources
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
The operators used browser-based OTP generators (OTP.ee / Authenticator.cc) for handling victims' 2FA once identity documents were collected.
First reported: 02.12.2025 17:021 source, 1 articleShow sources
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
The operators used Google Remote Desktop, configured via PowerShell with a fixed PIN, providing persistent control of the host.
First reported: 02.12.2025 17:021 source, 1 articleShow sources
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
The operators performed routine system reconnaissance (dxdiag, systeminfo, whoami) to validate the hardware and environment.
First reported: 02.12.2025 17:021 source, 1 articleShow sources
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
Connections were consistently routed through Astrill VPN, a pattern tied to previous Lazarus infrastructure.
First reported: 02.12.2025 17:021 source, 1 articleShow sources
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
In one session, the operator left a Notepad message asking the 'developer' to upload their ID, SSN, and banking details, confirming the operation's goal: full identity and workstation takeover without deploying a single piece of malware.
First reported: 02.12.2025 17:021 source, 1 articleShow sources
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
Similar Happenings
Manufacturing Sector Faces Persistent OT Security Challenges
The manufacturing sector continues to grapple with significant operational technology (OT) security challenges, including legacy systems, lack of visibility, and human factors. The industry's focus on IT security often overshadows OT security, despite the growing attack surface and interconnected nature of modern manufacturing environments. Recent incidents, such as the ransomware attack on Asahi, highlight the financial and supply chain risks associated with OT breaches. Experts emphasize the need for better awareness, identity-focused security strategies, and comprehensive governance to improve OT security in manufacturing.
US sanctions North Korean entities and individuals for cybercrime and IT worker fraud
The U.S. Treasury Department has imposed sanctions on ten North Korean individuals and entities involved in laundering $12.7 million in cryptocurrency and IT worker fraud. The sanctions target Ryujong Credit Bank and Korea Mangyongdae Computer Technology Company (KMCTC), along with their respective executives and financial representatives. The move aims to disrupt North Korea's ability to fund its weapons programs and other illicit activities through cybercrime and financial fraud. The Treasury Department has identified $12.7 million in transactions linked to North Korean financial institutions over the past two years. North Korean IT workers have been using foreign freelance programmers to establish business partnerships and split revenue. The Treasury Department has accused North Korea of leveraging its IT army to gain employment at companies by obfuscating their nationality and identities, funneling income back to the DPRK.
North Korean Threat Actor BlueNoroff Targets Web3 Sector
The North Korean threat actor BlueNoroff, also known as APT38 and TA444, has launched two new campaigns targeting the Web3 sector. These campaigns, dubbed GhostCall and GhostHire, focus on executives, Web3 developers, and blockchain professionals. The attacks use social engineering techniques on platforms like Telegram and LinkedIn to initiate multi-stage malware chains that compromise Windows, Linux, and macOS hosts. BlueNoroff is a financially motivated sub-cluster of the Lazarus Group, North Korea's state-sponsored cyber unit linked to the Reconnaissance General Bureau (RGB). The group is known for the long-running SnatchCrypto campaign, which has evolved to include comprehensive data acquisition across a range of assets. The harvested data is used to facilitate subsequent attacks, enabling supply chain attacks and leveraging established trust relationships to impact a broader range of users.
Sophisticated Investment Scam Impersonates Singapore Officials
A large-scale scam operation impersonating Singapore’s top officials has been uncovered. The operation uses verified Google Ads, fake news websites, and deepfake videos to lure victims into a fraudulent investment platform. The scam falsely associates itself with Singapore prime minister Lawrence Wong and coordinating minister for national security K Shanmugam to appear credible. The campaign specifically targeted Singapore residents by configuring Google Ads to appear only to local IP addresses. Victims who clicked on the ads were funneled through a chain of redirect sites designed to conceal the final fraudulent destination – a Mauritius-registered forex investment platform. The scam involved 28 verified advertiser accounts, mostly registered to individuals in Bulgaria, with others in Romania, Latvia, Argentina, and Kazakhstan. These accounts ran malicious Google Ads promising lucrative returns. The ads led users to 52 intermediary domains that redirected them to fake news pages impersonating outlets like CNA and Yahoo! News. The Mauritius-registered platform appeared legitimate due to its regulatory license, but its Cyprus-based parent company had faced multiple suspensions and lost its UK authorization in 2022.
North Korean Hackers Steal $2 Billion in Cryptocurrency in 2025
North Korean hackers have stolen approximately $2 billion in cryptocurrency in 2025, the highest annual total recorded. This theft is part of a broader campaign to fund nuclear weapons development. The largest single heist was the Bybit hack in February, which accounted for $1.46 billion. The tactics used by these hackers have evolved to include more sophisticated laundering techniques and a shift towards targeting individuals and exchange employees through social engineering. The 2025 total so far is triple last year’s figure and beats 2022’s record of $1.35bn, which came on the back of attacks against Ronin Network and Harmony Bridge. The total amount stolen by North Korean hackers since 2017 exceeds $6 billion. Other notable breaches include LND.fi, WOO X, Seedify, and BitoPro. The Lazarus Group stole an estimated $11 million from BitoPro. The actual stolen amount may be higher due to difficulties in attribution and unreported incidents. Recently, five individuals pleaded guilty to aiding North Korea's illicit revenue generation schemes, including remote IT worker fraud and cryptocurrency theft. The U.S. authorities seek the forfeiture of $15 million in cryptocurrency from heists carried out by the APT38 threat group, which is linked to the Lazarus hacking group.