North Korean State Actors Exploit Fake Employee Schemes to Infiltrate Companies
Summary
Hide ▲
Show ▼
North Korean state actors continue to exploit fake employee schemes to infiltrate companies, particularly in blockchain and technology sectors, funneling stolen virtual currency and funds to North Korea's weapons program. The practice has escalated with remote work and AI, enabling fraudsters to impersonate employees and gain privileged access to company networks. Labyrinth Chollima, a prolific North Korean-linked cyber threat group, has evolved into three distinct hacking groups: Labyrinth Chollima (cyber espionage targeting industrial, logistics, and defense), Golden Chollima (smaller-scale cryptocurrency theft), and Pressure Chollima (high-value heists). Each group uses distinct toolsets derived from the same malware framework used by Labyrinth Chollima in the 2000s and 2010s. A joint investigation uncovered a network of remote IT workers tied to Lazarus Group's Famous Chollima division, with researchers capturing live activity of Lazarus operators on sandboxed laptops. The scheme, tracked as Jasper Sleet, PurpleDelta, and Wagemole, involves stealing or borrowing identities, using AI tools for interviews, and funneling salaries to the DPRK. Thousands of North Korean IT workers have infiltrated companies over the past two years, exploiting hiring processes and remote work environments. The U.S. Treasury has sanctioned individuals and entities involved, while Japan, South Korea, and the U.S. collaborate to combat the threat. Five U.S. citizens pleaded guilty to assisting North Korea's illicit revenue generation schemes, and two additional U.S. nationals, Kejia Wang and Zhenxing Wang, were sentenced to prison for operating a 'laptop farm' that facilitated the infiltration of over 100 companies, generating $5 million in illicit revenue and causing $3 million in damages to victim companies. Two more U.S. nationals, Matthew Isaac Knoot and Erick Ntekereze Prince, have now been sentenced to 18 months in prison each for operating laptop farms that enabled North Korean IT workers to fraudulently secure remote employment at nearly 70 American companies between 2020 and 2024. The operations resulted in over $1.2 million in illicit payments to North Korean operatives and caused significant remediation costs for victim companies.
Timeline
-
30.01.2026 17:40 2 articles · 3mo ago
Labyrinth Chollima evolves into three distinct hacking groups
Labyrinth Chollima has evolved into three distinct hacking groups: Labyrinth Chollima, Golden Chollima, and Pressure Chollima. Labyrinth Chollima continues to focus on cyber espionage, targeting industrial, logistics, and defense companies. Golden Chollima and Pressure Chollima have shifted towards targeting cryptocurrency entities. Each group uses distinct toolsets in their malware campaigns, all evolutions of the same malware framework used by Labyrinth Chollima in the 2000s and 2010s. The three groups share tools and infrastructure, indicating centralized coordination and resource allocation within the North Korean cyber ecosystem. Golden Chollima focuses on consistent, smaller-scale cryptocurrency thefts in economically developed regions, whereas Pressure Chollima pursues high-value heists with advanced implants to single out organizations with significant digital asset holdings. Labyrinth Chollima's operations are motivated by cyber espionage, using tools like the FudModule rootkit to achieve stealth.
Show sources
- Labyrinth Chollima Evolves into Three North Korean Hacking Groups — www.infosecurity-magazine.com — 30.01.2026 17:40
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
-
04.09.2025 04:00 4 articles · 8mo ago
Japan, South Korea, and the U.S. Collaborate to Combat North Korean IT Worker Schemes
The article underscores the ongoing collaboration between Japan, South Korea, and the U.S. to combat North Korean IT worker schemes, highlighting the sentencing of U.S. nationals involved in facilitating these operations. It also notes the expansion of the scheme's reach to Fortune 500 companies and the theft of sensitive data and source code from military contractors and AI companies.
Show sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- US Nationals Jailed for Operating Fake Remote Worker Laptop Farms for North Korea — www.infosecurity-magazine.com — 16.04.2026 19:00
-
28.08.2025 11:53 3 articles · 8mo ago
U.S. Treasury Sanctions Key Players in North Korean IT Worker Scheme
The US Treasury Department sanctioned Vitaliy Sergeyevich Andreyev, Kim Ung Sun, Shenyang Geumpungri Network Technology, and Korea Sinjin Trading Corp for their roles in the IT worker scheme. The two individuals and two companies allegedly acted as fronts for the North Korean government to facilitate the transfer of at least $1.6 million to the regime. The DoJ has also filed two civil complaints to forfeit cryptocurrency valued at more than $15 million seized from APT38 actors.
Show sources
- U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits — thehackernews.com — 28.08.2025 11:53
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
21.08.2025 00:39 14 articles · 8mo ago
North Korean Actors Steal $900,000 in Virtual Currency Using Fake Employee Scheme
The article adds sentencing details for Matthew Isaac Knoot and Erick Ntekereze Prince, who were sentenced to 18 months in prison each for operating laptop farms that helped North Korean IT workers fraudulently obtain remote employment at nearly 70 American companies. Knoot ran a laptop farm from his Nashville residence between July 2022 and August 2023, receiving company-issued laptops addressed to a stolen identity and installing unauthorized remote desktop software to allow North Korean IT workers to appear as legitimate U.S.-based employees. Prince facilitated North Korean IT workers through his company, Taggcar Inc., from June 2020 to August 2024, resulting in over $1.2 million in illicit payments to operatives and causing more than $1.5 million in remediation costs at victim companies. The FBI has warned since at least 2023 about North Korea's large-scale IT worker infiltration schemes targeting hundreds of American companies annually.
Show sources
- Fake Employees Pose Real Security Risks — www.darkreading.com — 21.08.2025 00:39
- U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits — thehackernews.com — 28.08.2025 11:53
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
- Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Case — thehackernews.com — 20.02.2026 11:52
- US nationals behind DPRK IT worker 'laptop farm' sent to prison — www.bleepingcomputer.com — 16.04.2026 11:32
- US Nationals Jailed for Operating Fake Remote Worker Laptop Farms for North Korea — www.infosecurity-magazine.com — 16.04.2026 19:00
- Americans sentenced for running 'laptop farms' for North Korea — www.bleepingcomputer.com — 07.05.2026 16:45
Information Snippets
-
North Korean actors have used fake or stolen identities to secure IT jobs in blockchain and technology companies.
First reported: 21.08.2025 00:393 sources, 9 articlesShow sources
- Fake Employees Pose Real Security Risks — www.darkreading.com — 21.08.2025 00:39
- U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits — thehackernews.com — 28.08.2025 11:53
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Americans sentenced for running 'laptop farms' for North Korea — www.bleepingcomputer.com — 07.05.2026 16:45
-
These actors have stolen virtual currency worth over $900,000 from a blockchain research and development company.
First reported: 21.08.2025 00:393 sources, 4 articlesShow sources
- Fake Employees Pose Real Security Risks — www.darkreading.com — 21.08.2025 00:39
- U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits — thehackernews.com — 28.08.2025 11:53
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- Americans sentenced for running 'laptop farms' for North Korea — www.bleepingcomputer.com — 07.05.2026 16:45
-
The Justice Department has shut down laptop farms used by North Korean actors to impersonate US-based IT workers.
First reported: 21.08.2025 00:392 sources, 4 articlesShow sources
- Fake Employees Pose Real Security Risks — www.darkreading.com — 21.08.2025 00:39
- U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits — thehackernews.com — 28.08.2025 11:53
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
Fake employees often have privileged access to company networks, posing significant security risks.
First reported: 21.08.2025 00:392 sources, 5 articlesShow sources
- Fake Employees Pose Real Security Risks — www.darkreading.com — 21.08.2025 00:39
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
-
The growth in remote work and AI has facilitated the rise of fake employee schemes.
First reported: 21.08.2025 00:393 sources, 7 articlesShow sources
- Fake Employees Pose Real Security Risks — www.darkreading.com — 21.08.2025 00:39
- U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits — thehackernews.com — 28.08.2025 11:53
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Americans sentenced for running 'laptop farms' for North Korea — www.bleepingcomputer.com — 07.05.2026 16:45
-
Security experts recommend a multi-layered approach, including supervision, access governance, and AI-driven behavioral analytics, to counteract these threats.
First reported: 21.08.2025 00:392 sources, 3 articlesShow sources
- Fake Employees Pose Real Security Risks — www.darkreading.com — 21.08.2025 00:39
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
Only a small percentage of enterprises have adopted strict least-privilege access and just-in-time access frameworks.
First reported: 21.08.2025 00:392 sources, 3 articlesShow sources
- Fake Employees Pose Real Security Risks — www.darkreading.com — 21.08.2025 00:39
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
The U.S. Treasury's Office of Foreign Assets Control (OFAC) has sanctioned two individuals and two entities for their role in North Korean IT worker schemes.
First reported: 28.08.2025 11:534 sources, 7 articlesShow sources
- U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits — thehackernews.com — 28.08.2025 11:53
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
- Americans sentenced for running 'laptop farms' for North Korea — www.bleepingcomputer.com — 07.05.2026 16:45
-
The North Korean IT worker scheme is tracked as Famous Chollima, Jasper Sleet, UNC5267, and Wagemole, and is affiliated with the Workers' Party of Korea.
First reported: 28.08.2025 11:533 sources, 7 articlesShow sources
- U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits — thehackernews.com — 28.08.2025 11:53
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
-
The scheme involves embedding North Korean IT workers in legitimate companies using fraudulent documents, stolen identities, and false personas on various platforms.
First reported: 28.08.2025 11:532 sources, 5 articlesShow sources
- U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits — thehackernews.com — 28.08.2025 11:53
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
The actors have used AI-powered tools like Claude to create convincing professional backgrounds and technical portfolios.
First reported: 28.08.2025 11:533 sources, 6 articlesShow sources
- U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits — thehackernews.com — 28.08.2025 11:53
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
The actors have introduced malware into company networks to exfiltrate proprietary and sensitive data.
First reported: 28.08.2025 11:533 sources, 6 articlesShow sources
- U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits — thehackernews.com — 28.08.2025 11:53
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
-
The Treasury Department has identified financial transfers worth nearly $600,000 by converting cryptocurrency to cash in U.S. dollars since December 2024.
First reported: 28.08.2025 11:531 source, 2 articlesShow sources
- U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits — thehackernews.com — 28.08.2025 11:53
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
Shenyang Geumpungri is a Chinese front company for Chinyong that has generated over $1 million in profits since 2021.
First reported: 28.08.2025 11:532 sources, 3 articlesShow sources
- U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits — thehackernews.com — 28.08.2025 11:53
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
Korea Sinjin Trading Corporation is a DPRK company subordinate to the U.S.-sanctioned DPRK Ministry of People's Armed Forces General Political Bureau.
First reported: 28.08.2025 11:532 sources, 3 articlesShow sources
- U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits — thehackernews.com — 28.08.2025 11:53
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
Japan, South Korea, and the United States are collaborating to combat North Korean IT worker schemes.
First reported: 04.09.2025 04:002 sources, 2 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
The three countries held a joint forum on August 26, 2025, in Tokyo to improve collaboration.
First reported: 04.09.2025 04:003 sources, 3 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
-
Japan and South Korea issued updated advisories on the threat.
First reported: 04.09.2025 04:002 sources, 2 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
The United States sanctioned four entities for their roles in the IT worker fraud schemes.
First reported: 04.09.2025 04:002 sources, 2 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
The scheme has collected more than $88 million over six years.
First reported: 04.09.2025 04:002 sources, 2 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
The threat actors often launder payroll through front companies and use remote-access tools to control employer-issued devices.
First reported: 04.09.2025 04:003 sources, 7 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
- Americans sentenced for running 'laptop farms' for North Korea — www.bleepingcomputer.com — 07.05.2026 16:45
-
The scheme involves thousands of operatives and facilitators with distinct roles, such as setting up and running laptop farms in non-sanctioned countries.
First reported: 04.09.2025 04:003 sources, 6 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
- Americans sentenced for running 'laptop farms' for North Korea — www.bleepingcomputer.com — 07.05.2026 16:45
-
The US Treasury Department sanctioned Vitaliy Sergeyevich Andreyev, Kim Ung Sun, Shenyang Geumpungri Network Technology, and Korea Sinjin Trading Corp for their roles in the IT worker scheme.
First reported: 04.09.2025 04:004 sources, 5 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
- Americans sentenced for running 'laptop farms' for North Korea — www.bleepingcomputer.com — 07.05.2026 16:45
-
The two individuals and two companies allegedly acted as fronts for the North Korean government to facilitate the transfer of at least $1.6 million to the regime.
First reported: 04.09.2025 04:002 sources, 2 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
The Japanese government warned companies to take precautions to verify identities and requested that freelance-platform providers reinforce their anti-fraud efforts.
First reported: 04.09.2025 04:003 sources, 3 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
The threat actors often conceal their foreign location by using VPNs or remote desktop services.
First reported: 04.09.2025 04:003 sources, 6 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
The scheme has expanded operations to Europe and deepened networks in the Asia Pacific, claiming residency in Japan, Malaysia, Singapore, and Vietnam.
First reported: 04.09.2025 04:003 sources, 3 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
The main goal of these operations is for revenue generation back to the regime.
First reported: 04.09.2025 04:003 sources, 6 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
The scheme poses serious risks, ranging from theft of intellectual property, data, and funds to reputational harm and legal consequences.
First reported: 04.09.2025 04:003 sources, 4 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
The forum brought together government officials with private-sector experts, including from Google Cloud's Mandiant, to find additional strategies to combat the threat.
First reported: 04.09.2025 04:004 sources, 4 articlesShow sources
- Japan, South Korea Take Aim at North Korean IT Worker Scam — www.darkreading.com — 04.09.2025 04:00
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
-
Over 320 cases of North Korean operatives infiltrating companies by posing as remote IT workers were identified in August 2025.
First reported: 08.09.2025 12:201 source, 2 articlesShow sources
- You Didn’t Get Phished — You Onboarded the Attacker — thehackernews.com — 08.09.2025 12:20
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
-
Five U.S. citizens have pleaded guilty to assisting North Korea's illicit revenue generation schemes by enabling IT worker fraud.
First reported: 15.11.2025 12:212 sources, 2 articlesShow sources
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
Audricus Phagnasay, Jason Salazar, and Alexander Paul Travis pleaded guilty to wire fraud conspiracy for allowing IT workers to use their U.S. identities to secure jobs at American firms.
First reported: 15.11.2025 12:213 sources, 3 articlesShow sources
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
The three defendants also served as facilitators, hosting company-issued laptops at their residences and installing remote desktop software without authorization.
First reported: 15.11.2025 12:213 sources, 3 articlesShow sources
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
Oleksandr Didenko pleaded guilty to wire fraud conspiracy and aggravated identity theft for stealing U.S. citizens' identities and selling them to IT workers.
First reported: 15.11.2025 12:212 sources, 2 articlesShow sources
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
Didenko ran a website called 'Upworksell.com' designed to help overseas IT workers buy or rent stolen or borrowed identities.
First reported: 15.11.2025 12:213 sources, 3 articlesShow sources
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
Didenko managed as many as 871 proxy identities and facilitated the operation of at least three U.S.-based laptop farms.
First reported: 15.11.2025 12:213 sources, 3 articlesShow sources
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
Erick Ntekereze Prince pleaded guilty to wire fraud conspiracy for operating a company called Taggcar Inc. to supply 'certified' IT workers to U.S. companies.
First reported: 15.11.2025 12:213 sources, 4 articlesShow sources
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
- Americans sentenced for running 'laptop farms' for North Korea — www.bleepingcomputer.com — 07.05.2026 16:45
-
The scheme impacted more than 136 U.S. victim companies, generated more than $2.2 million in revenue for the DPRK regime, and compromised the identities of more than 18 U.S. persons.
First reported: 15.11.2025 12:213 sources, 5 articlesShow sources
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
- US Nationals Jailed for Operating Fake Remote Worker Laptop Farms for North Korea — www.infosecurity-magazine.com — 16.04.2026 19:00
- Americans sentenced for running 'laptop farms' for North Korea — www.bleepingcomputer.com — 07.05.2026 16:45
-
The DoJ has filed two civil complaints to forfeit cryptocurrency valued at more than $15 million seized from APT38 actors.
First reported: 15.11.2025 12:213 sources, 3 articlesShow sources
- Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies — thehackernews.com — 15.11.2025 12:21
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
The US Department of Justice (DoJ) described the five individuals as 'facilitators' who assisted North Korean hackers with obtaining remote IT employment with US companies.
First reported: 17.11.2025 13:152 sources, 3 articlesShow sources
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
- Americans sentenced for running 'laptop farms' for North Korea — www.bleepingcomputer.com — 07.05.2026 16:45
-
The defendants allegedly provided personal, false or stolen identities and hosted laptops provided by the victim company at residences across the US to create the false appearance that the IT workers were employed domestically.
First reported: 17.11.2025 13:152 sources, 3 articlesShow sources
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
- Americans sentenced for running 'laptop farms' for North Korea — www.bleepingcomputer.com — 07.05.2026 16:45
-
The US government managed to seize $15m worth of gains in Tether (USDT), a stable cryptocurrency pegged to the US dollar and backed by cash and cash-equivalent reserves held by Tether Limited.
First reported: 17.11.2025 13:152 sources, 2 articlesShow sources
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
The US government now seeks to return these $15m to the rightful owners.
First reported: 17.11.2025 13:152 sources, 2 articlesShow sources
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
The DoJ identified the North Korean hacking collective that received support from the five defendants as APT38, a nation-state group active since at least 2014 and attributed to the Pyongyang’s Reconnaissance General Bureau. The group is commonly known as also known as the Lazarus Group.
First reported: 17.11.2025 13:152 sources, 3 articlesShow sources
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
The US government has seized $15m worth of gains in Tether (USDT) from APT38 actors.
First reported: 17.11.2025 13:152 sources, 2 articlesShow sources
- US: Five Plead Guilty in North Korean IT Worker Fraud Scheme — www.infosecurity-magazine.com — 17.11.2025 13:15
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
North Korean IT recruiters target and lure developers into renting their identities for illicit fundraising.
First reported: 02.12.2025 16:572 sources, 3 articlesShow sources
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
Famous Chollima, part of North Korea’s state-sponsored Lazarus group, uses deep fake videos and avoids appearing on camera during interviews.
First reported: 02.12.2025 16:572 sources, 4 articlesShow sources
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
Legitimate engineers are recruited to act as figureheads in DPRK agents’ operations to secure remote jobs at targeted companies.
First reported: 02.12.2025 16:572 sources, 4 articlesShow sources
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
Compromised engineers receive a percentage of the salary, between 20% and 35%, for the duration of the contract.
First reported: 02.12.2025 16:572 sources, 4 articlesShow sources
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
DPRK agents use compromised engineers' computers as proxies for malicious activities to hide their location and traces.
First reported: 02.12.2025 16:572 sources, 4 articlesShow sources
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
North Korean recruiters use AI-powered tools like AIApply, Simplify Copilot, Final Round AI, and Saved Prompts to autofill job applications and create resumes.
First reported: 02.12.2025 16:572 sources, 4 articlesShow sources
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
The threat actor used Astrill VPN, a popular service among North Korean fake IT workers, for remote connections.
First reported: 02.12.2025 16:572 sources, 4 articlesShow sources
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
The Famous Chollima team involved in this operation consisted of six members, who used the names Mateo, Julián, Aaron, Jesús, Sebastián, and Alfredo.
First reported: 02.12.2025 16:572 sources, 4 articlesShow sources
- North Korea lures engineers to rent identities in fake IT worker scheme — www.bleepingcomputer.com — 02.12.2025 16:57
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
A joint investigation led by Mauro Eldritch, founder of BCA LTD, conducted together with threat-intel initiative NorthScan and ANY.RUN, uncovered a network of remote IT workers tied to Lazarus Group's Famous Chollima division.
First reported: 02.12.2025 17:022 sources, 2 articlesShow sources
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
Researchers captured live activity of Lazarus operators on what they believed were real developer laptops, which were actually fully controlled, long-running sandbox environments created by ANY.RUN.
First reported: 02.12.2025 17:022 sources, 2 articlesShow sources
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
The operation began when NorthScan's Heiner García impersonated a U.S. developer targeted by a Lazarus recruiter using the alias 'Aaron' (also known as 'Blaze').
First reported: 02.12.2025 17:022 sources, 2 articlesShow sources
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
The scheme involved stealing or borrowing an identity, passing interviews with AI tools and shared answers, working remotely via the victim's laptop, and funneling salary back to DPRK.
First reported: 02.12.2025 17:022 sources, 3 articlesShow sources
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
- Americans sentenced for running 'laptop farms' for North Korea — www.bleepingcomputer.com — 07.05.2026 16:45
-
The operators used AI-driven job automation tools (Simplify Copilot, AiApply, Final Round AI) to auto-fill applications and generate interview answers.
First reported: 02.12.2025 17:022 sources, 2 articlesShow sources
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
The operators used browser-based OTP generators (OTP.ee / Authenticator.cc) for handling victims' 2FA once identity documents were collected.
First reported: 02.12.2025 17:022 sources, 2 articlesShow sources
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
The operators used Google Remote Desktop, configured via PowerShell with a fixed PIN, providing persistent control of the host.
First reported: 02.12.2025 17:022 sources, 2 articlesShow sources
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
The operators performed routine system reconnaissance (dxdiag, systeminfo, whoami) to validate the hardware and environment.
First reported: 02.12.2025 17:022 sources, 2 articlesShow sources
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
Connections were consistently routed through Astrill VPN, a pattern tied to previous Lazarus infrastructure.
First reported: 02.12.2025 17:022 sources, 2 articlesShow sources
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
In one session, the operator left a Notepad message asking the 'developer' to upload their ID, SSN, and banking details, confirming the operation's goal: full identity and workstation takeover without deploying a single piece of malware.
First reported: 02.12.2025 17:022 sources, 2 articlesShow sources
- Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera — thehackernews.com — 02.12.2025 17:02
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
Labyrinth Chollima has evolved into three distinct hacking groups: Labyrinth Chollima, Golden Chollima, and Pressure Chollima.
First reported: 30.01.2026 17:403 sources, 3 articlesShow sources
- Labyrinth Chollima Evolves into Three North Korean Hacking Groups — www.infosecurity-magazine.com — 30.01.2026 17:40
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
Labyrinth Chollima continues to focus on cyber espionage, targeting industrial, logistics, and defense companies.
First reported: 30.01.2026 17:403 sources, 3 articlesShow sources
- Labyrinth Chollima Evolves into Three North Korean Hacking Groups — www.infosecurity-magazine.com — 30.01.2026 17:40
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
Golden Chollima and Pressure Chollima have shifted towards targeting cryptocurrency entities.
First reported: 30.01.2026 17:403 sources, 3 articlesShow sources
- Labyrinth Chollima Evolves into Three North Korean Hacking Groups — www.infosecurity-magazine.com — 30.01.2026 17:40
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
Each group uses distinct toolsets in their malware campaigns, all evolutions of the same malware framework used by Labyrinth Chollima in the 2000s and 2010s.
First reported: 30.01.2026 17:403 sources, 3 articlesShow sources
- Labyrinth Chollima Evolves into Three North Korean Hacking Groups — www.infosecurity-magazine.com — 30.01.2026 17:40
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
The three groups share tools and infrastructure, indicating centralized coordination and resource allocation within the North Korean cyber ecosystem.
First reported: 30.01.2026 17:403 sources, 3 articlesShow sources
- Labyrinth Chollima Evolves into Three North Korean Hacking Groups — www.infosecurity-magazine.com — 30.01.2026 17:40
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
Labyrinth Chollima is responsible for notable intrusions, including destructive attacks against South Korean and US entities and the global WannaCry ransomware incident.
First reported: 30.01.2026 17:403 sources, 3 articlesShow sources
- Labyrinth Chollima Evolves into Three North Korean Hacking Groups — www.infosecurity-magazine.com — 30.01.2026 17:40
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
The name 'Lazarus Group' has been abandoned by cyber threat intelligence analysts as it encompasses too many distinct teams within the North Korean hacking ecosystem.
First reported: 30.01.2026 17:403 sources, 3 articlesShow sources
- Labyrinth Chollima Evolves into Three North Korean Hacking Groups — www.infosecurity-magazine.com — 30.01.2026 17:40
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
Labyrinth Chollima was first tracked by CrowdStrike when it discovered the KorDLL malware framework used between 2009 and 2015.
First reported: 30.01.2026 17:403 sources, 3 articlesShow sources
- Labyrinth Chollima Evolves into Three North Korean Hacking Groups — www.infosecurity-magazine.com — 30.01.2026 17:40
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
KorDLL is a source code repository containing implant templates, C2 protocols, libraries for common tasks, and code for various obfuscation techniques.
First reported: 30.01.2026 17:403 sources, 3 articlesShow sources
- Labyrinth Chollima Evolves into Three North Korean Hacking Groups — www.infosecurity-magazine.com — 30.01.2026 17:40
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
The KorDLL framework spawned several epoch-defining malware families, including Dozer, Brambul, Joanap, KorDLL Bot, and Koredos.
First reported: 30.01.2026 17:403 sources, 3 articlesShow sources
- Labyrinth Chollima Evolves into Three North Korean Hacking Groups — www.infosecurity-magazine.com — 30.01.2026 17:40
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
The framework later evolved into the Hawup and TwoPence malware frameworks, leading to the split into Labyrinth Chollima and Stardust Chollima.
First reported: 30.01.2026 17:403 sources, 3 articlesShow sources
- Labyrinth Chollima Evolves into Three North Korean Hacking Groups — www.infosecurity-magazine.com — 30.01.2026 17:40
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
DPRK operatives are now using real LinkedIn accounts of individuals they are impersonating to apply for remote positions.
First reported: 10.02.2026 19:442 sources, 3 articlesShow sources
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
- Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Case — thehackernews.com — 20.02.2026 11:52
-
These profiles often include verified workplace emails and identity badges to appear legitimate.
First reported: 10.02.2026 19:441 source, 1 articleShow sources
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
-
The DPRK IT worker scheme is also tracked as Jasper Sleet, PurpleDelta, and Wagemole.
First reported: 10.02.2026 19:442 sources, 2 articlesShow sources
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
The scheme aims to generate revenue, conduct espionage, and in some cases, demand ransoms.
First reported: 10.02.2026 19:442 sources, 2 articlesShow sources
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
DPRK IT workers transfer cryptocurrency through various money laundering techniques, including chain-hopping and token swapping.
First reported: 10.02.2026 19:442 sources, 2 articlesShow sources
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
Norwegian businesses have been impacted by IT worker schemes, with salaries likely funding North Korea's weapons and nuclear programs.
First reported: 10.02.2026 19:442 sources, 2 articlesShow sources
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
A campaign dubbed Contagious Interview uses fake hiring flows to lure targets into executing malicious code.
First reported: 10.02.2026 19:442 sources, 2 articlesShow sources
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
The campaign employs EtherHiding, a technique using blockchain smart contracts to host and retrieve command-and-control infrastructure.
First reported: 10.02.2026 19:442 sources, 2 articlesShow sources
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
New variants of the Contagious Interview campaign use malicious Microsoft VS Code task files to execute JavaScript malware.
First reported: 10.02.2026 19:442 sources, 2 articlesShow sources
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
The Koalemos RAT campaign involves malicious npm packages to deploy a modular JavaScript remote access trojan (RAT) framework.
First reported: 10.02.2026 19:442 sources, 2 articlesShow sources
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
Labyrinth Chollima has evolved into three separate clusters: Labyrinth Chollima, Golden Chollima, and Pressure Chollima.
First reported: 10.02.2026 19:442 sources, 2 articlesShow sources
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
Golden Chollima focuses on smaller-scale cryptocurrency thefts, while Pressure Chollima pursues high-value heists.
First reported: 10.02.2026 19:442 sources, 2 articlesShow sources
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
Labyrinth Chollima's operations are motivated by cyber espionage, using tools like the FudModule rootkit.
First reported: 10.02.2026 19:442 sources, 2 articlesShow sources
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies — thehackernews.com — 10.02.2026 19:44
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
-
Oleksandr Didenko, a 39-year-old Ukrainian national, was sentenced to five years in prison for providing North Korean IT workers with stolen identities to infiltrate U.S. companies.
First reported: 20.02.2026 11:002 sources, 2 articlesShow sources
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
- Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Case — thehackernews.com — 20.02.2026 11:52
-
Didenko pleaded guilty to aggravated identity theft and wire fraud conspiracy in November 2025 and was arrested in Poland in May 2024.
First reported: 20.02.2026 11:002 sources, 2 articlesShow sources
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
- Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Case — thehackernews.com — 20.02.2026 11:52
-
Didenko provided North Korean remote workers with at least 871 proxy identities and proxy accounts on three freelance IT hiring platforms.
First reported: 20.02.2026 11:002 sources, 2 articlesShow sources
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
- Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Case — thehackernews.com — 20.02.2026 11:52
-
Didenko facilitated the operation of at least eight 'laptop farms' in Virginia, Tennessee, California, Florida, Ecuador, Poland, and Ukraine.
First reported: 20.02.2026 11:002 sources, 2 articlesShow sources
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
- Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Case — thehackernews.com — 20.02.2026 11:52
-
Christina Marie Chapman, a 50-year-old woman from Arizona, was sentenced to 102 months in prison for running a 'laptop farm' from her home between October 2020 and October 2023.
First reported: 20.02.2026 11:003 sources, 3 articlesShow sources
- Ukrainian gets 5 years for helping North Koreans infiltrate US firms — www.bleepingcomputer.com — 20.02.2026 11:00
- Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Case — thehackernews.com — 20.02.2026 11:52
- US Nationals Jailed for Operating Fake Remote Worker Laptop Farms for North Korea — www.infosecurity-magazine.com — 16.04.2026 19:00
-
Oleksandr Didenko ran a website named Upworksell[.]com to help overseas IT workers buy or rent stolen or borrowed identities since the start of 2021.
First reported: 20.02.2026 11:521 source, 1 articleShow sources
- Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Case — thehackernews.com — 20.02.2026 11:52
-
Didenko paid individuals in the U.S. to receive and host laptops at their residences in Virginia, Tennessee, and California to give the impression that the workers were located in the country.
First reported: 20.02.2026 11:522 sources, 2 articlesShow sources
- Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Case — thehackernews.com — 20.02.2026 11:52
- US Nationals Jailed for Operating Fake Remote Worker Laptop Farms for North Korea — www.infosecurity-magazine.com — 16.04.2026 19:00
-
Didenko enabled his North Korean clients to access the U.S. financial system through Money Service Transmitters instead of having to open an account at a bank within the U.S.
First reported: 20.02.2026 11:522 sources, 2 articlesShow sources
- Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Case — thehackernews.com — 20.02.2026 11:52
- US Nationals Jailed for Operating Fake Remote Worker Laptop Farms for North Korea — www.infosecurity-magazine.com — 16.04.2026 19:00
-
Didenko's clients were paid hundreds of thousands of dollars for their work.
First reported: 20.02.2026 11:522 sources, 2 articlesShow sources
- Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Case — thehackernews.com — 20.02.2026 11:52
- US Nationals Jailed for Operating Fake Remote Worker Laptop Farms for North Korea — www.infosecurity-magazine.com — 16.04.2026 19:00
-
The website Upworksell[.]com was seized by authorities on May 16, 2024.
First reported: 20.02.2026 11:521 source, 1 articleShow sources
- Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Case — thehackernews.com — 20.02.2026 11:52
-
Two U.S. nationals, Kejia Wang (42) and Zhenxing Wang (39), were sentenced to 108 months and 92 months in prison respectively for facilitating North Korean remote IT worker schemes that infiltrated over 100 companies, including Fortune 500 firms.
First reported: 16.04.2026 11:322 sources, 2 articlesShow sources
- US nationals behind DPRK IT worker 'laptop farm' sent to prison — www.bleepingcomputer.com — 16.04.2026 11:32
- US Nationals Jailed for Operating Fake Remote Worker Laptop Farms for North Korea — www.infosecurity-magazine.com — 16.04.2026 19:00
-
Two U.S. nationals, Kejia Wang and Zhenxing Wang, were sentenced to 108 months and 92 months in prison respectively for operating a 'laptop farm' that facilitated the infiltration of over 100 companies, including Fortune 500 firms.
First reported: 16.04.2026 19:001 source, 1 articleShow sources
- US Nationals Jailed for Operating Fake Remote Worker Laptop Farms for North Korea — www.infosecurity-magazine.com — 16.04.2026 19:00
-
Two U.S. nationals, Matthew Isaac Knoot and Erick Ntekereze Prince, were sentenced to 18 months in prison each for operating laptop farms that helped North Korean IT workers fraudulently obtain remote employment at nearly 70 American companies between 2020 and 2024.
First reported: 07.05.2026 16:451 source, 1 articleShow sources
- Americans sentenced for running 'laptop farms' for North Korea — www.bleepingcomputer.com — 07.05.2026 16:45
Similar Happenings
Global disruption of pig-butchering cryptocurrency scam networks with 276 arrests
A coordinated international law enforcement operation dismantled nine cryptocurrency investment fraud centers across Dubai and Southeast Asia, arresting 276 suspects linked to pig-butchering (romance baiting) schemes that defrauded victims through fake investment platforms. Scammers cultivated trust with targets via fabricated relationships before redirecting victims to counterfeit cryptocurrency investment portals where deposited funds were immediately siphoned and laundered through layered crypto accounts. Victims were coerced into borrowing money and taking loans to increase investments, exacerbating financial losses. The operation targeted operations including Ko Thet Company, Sanduo Group, and Giant Company, with fugitives still at large. Additional developments include the seizure of over $701 million in illicit funds, charges against key figures in forced labor scam compounds, sanctions on a Cambodian senator tied to cyber scam networks, and the disruption of an Android banking trojan linked to scam operations in Cambodia. U.S. authorities also expanded victim notification efforts and launched new cybersecurity initiatives to counter evolving fraud tactics.
Drift Protocol administrative takeover and $285 million loss via Security Council manipulation on Solana
The April 1, 2026, $285 million Drift Protocol loss was part of a broader campaign by North Korea-linked Lazarus Group (TraderTraitor) targeting DeFi protocols. On April 18, 2026, the group executed a $290 million heist against KelpDAO by exploiting its cross-chain verification layer (DVN) via compromised RPC nodes, falsified data injection, and DDoS attacks, laundering funds through Tornado Cash. The attack paused KelpDAO’s rsETH contracts, froze Aave’s rsETH collateral usage, and was isolated to rsETH without broader contagion. Drift Protocol’s Security Council hijacking, attributed to UNC4736 (AppleJeus/Labyrinth Chollima), and KelpDAO’s DVN compromise both align with Lazarus Group’s pattern of sophisticated state-sponsored attacks on DeFi infrastructure.
Supply chain compromise in Trivy scanner triggers CanisterWorm propagation across CI/CD pipelines
Supply chain compromise in the Trivy vulnerability scanner triggered the CanisterWorm propagation across CI/CD pipelines, now expanding to additional open-source ecosystems and involving multiple advanced threat actors. The TeamPCP threat group continues to monetize stolen supply chain secrets through partnerships with extortion groups including Lapsus$ and the Vect ransomware operation, with Wiz (Google Cloud) and Cisco confirming collaboration and horizontal movement across cloud environments. A new npm supply chain malware campaign discovered on April 24, 2026, shows self-propagating worm-like behavior via @automagik/genie and pgserve packages, stealing credentials and spreading across developer ecosystems while using Internet Computer Protocol (ICP) canisters for command and control. The malware shares technical similarities with prior TeamPCP campaigns, including post-install scripts and canister-based infrastructure, potentially indicating ongoing evolution of the threat actor's tactics or a new campaign leveraging established infrastructure. The Axios NPM package compromise via malicious versions 0.27.5 and 0.28.0 delivered a multi-platform RAT through a malicious dependency impersonating crypto-js, with attribution disputes suggesting either TeamPCP involvement or North Korean actor UNC1069 (Google's Threat Intelligence Group). Cisco's internal development environment was breached using stolen Trivy-linked credentials via a malicious GitHub Action, resulting in the theft of over 300 repositories including proprietary AI product code and customer data from banks, BPOs, and US government agencies. Multiple AWS keys were abused across a subset of Cisco's cloud accounts, with multiple threat actors participating in the breach.
North Korean APTs Leverage AI to Enhance IT Worker Scams
North Korea's state-linked APTs—particularly Jasper Sleet and Coral Sleet—continue to expand their IT worker scams using AI to fabricate identities, automate social engineering, and deploy malware, while simultaneously diversifying revenue streams to fund weapons programs. OFAC sanctions now confirm the scheme's scale and structure, revealing a multi-tiered network of recruiters, facilitators, IT workers, and collaborators that has infiltrated U.S. and international companies to steal sensitive data and extort victims. The use of AI tools like Faceswap for identity fabrication and Astrill VPN for geographic obfuscation underscores the sophistication of these operations, which are deeply embedded in North Korea's sanctions-evasion and revenue-generation machinery. Initial reporting by Microsoft documented how Jasper Sleet and Coral Sleet leverage AI to research job postings, generate fake resumes, create culturally tailored digital personas, and develop web infrastructure for malicious purposes. These groups use AI coding tools to refine malware and jailbreak LLMs to generate malicious code, complicating detection while enabling long-term persistence as insider threats. The scheme's expansion into malware deployment and extortion activities further increases its impact, with a significant portion of earnings funneled back to North Korea to support its missile programs.
Lazarus Group Linked to Medusa Ransomware Attacks on U.S. Healthcare
North Korean state-backed hackers from the Lazarus group are targeting U.S. healthcare organizations and entities in the Middle East with Medusa ransomware in financially motivated extortion attacks. The Medusa ransomware-as-a-service (RaaS) operation has impacted over 366 organizations since its launch in 2023, with at least four additional healthcare and non-profit organizations in the U.S. targeted since November 2025. This is the first time Lazarus has been linked to Medusa ransomware, though they have been associated with other ransomware strains. The attacks use a toolset that includes both custom and commodity tools, some of which are linked to another North Korean group, Diamond Sleet. The average ransom recorded in these attacks is $260,000, which is reportedly used to fund espionage operations against defense, technology, and government sectors in the U.S., Taiwan, and South Korea. Symantec has provided indicators of compromise (IoCs) to help defenders prevent these attacks. The Stonefly sub-group of Lazarus, also known as Andariel, has been involved in ransomware operations for the past five years. Rim Jong Hyok, an alleged Stonefly member, was indicted by the US Justice Department for ransomware campaigns targeting US hospitals and healthcare providers. The US Justice Department announced a $10m reward for information related to Rim Jong Hyok.