North Korean IT Workers: Schemes, Tactics & How to Spot Them

by Chief Editor

North Korea’s IT Army: A Growing Global Threat

A sophisticated operation employing tens of thousands of IT workers is generating hundreds of millions of dollars annually for the North Korean regime, according to recent research from IBM X-Force and Flare Research. These aren’t typical remote workers; they are strategically deployed to infiltrate companies worldwide, not just for financial gain, but also for potential corporate espionage and data theft.

The Scale of the Operation

The report, “Inside the North Korean Infiltrator Threat,” details a highly organized ecosystem. US Government estimates suggest over 100,000 North Korean IT workers are operating in approximately 40 countries, collectively earning around $500 million per year. This revenue stream is a critical component of North Korea’s economic strategy.

How They Operate: Roles and Recruitment

The operation isn’t a chaotic free-for-all. Researchers have uncovered a clear structure with defined roles: recruiters, facilitators, IT workers, and collaborators. Recruiters screen candidates, while facilitators act as hiring managers, deciding who gets deployed. IT workers, often skilled in full stack web app development, .NET, and WordPress, are the frontline operatives. Collaborators, often Westerners, provide identities – sometimes unknowingly – to facilitate the fraud.

A common tactic involves presenting candidates as working for an “early-stage stealth startup” named “C Digital LLC,” often lacking a public online presence. Candidates are coached on creating convincing online profiles and are provided with US-based identities to use during the application process.

Tools of the Trade: From VPNs to Google Translate

North Korean IT workers rely on a specific toolkit to maintain their cover, and communicate. OConnect/NetKey, a known North Korean VPN, is used to connect to internal networks within Pyongyang. IP Messenger (IPMsg), an open-source messaging app that doesn’t rely on centralized servers, provides a secure communication channel. Perhaps surprisingly, Google Translate is a crucial tool, used for everything from translating job descriptions to crafting applications and communicating with colleagues.

Measuring Success: Bids, Messages, and Promotions

The researchers analyzed timesheets revealing how workers are measured. “Bids” represent the number of applications submitted on freelancing platforms like Upwork, while “Msg” likely tracks the number of messages sent on platforms like Upwork, LinkedIn, and Freelancer. Once embedded within a company, these workers often strive for promotions, seeking greater access to sensitive IT systems.

Protecting Your Organization: Red Flags and Mitigation

Identifying these infiltrators isn’t easy, but several warning signs can raise suspicion. Employers should be wary of candidates with fabricated backgrounds, those using AI-powered face or voice changers during interviews, or inconsistencies between their resume and interview responses. Discrepancies in claimed language skills or residency can also be indicators.

One particularly effective interview technique, previously reported by The Register, involves a direct question: “How fat is Kim Jong Un?” A genuine North Korean operative will immediately terminate the call.

Pro Tip:

Don’t rely solely on technical security measures. A coordinated approach involving HR, security teams, hiring managers, and interviewers is essential to effectively defend against this threat.

Future Trends: AI and Evolving Tactics

As detection methods improve, North Korean IT workers will likely adapt their tactics. Increased reliance on sophisticated AI tools for identity creation and communication is a likely trend. We can also expect to see more creative methods for obscuring their origins and blending into the global workforce. The use of deepfakes and advanced language models could make it even harder to distinguish between legitimate applicants and infiltrators.

FAQ

  • What is the primary goal of these North Korean IT workers? Financial gain for the regime, but also potential corporate espionage and data theft.
  • How many North Korean IT workers are estimated to be operating globally? Over 100,000.
  • What tools do they commonly use? OConnect/NetKey VPN, IP Messenger, and Google Translate.
  • Is there a “tell” during an interview? Asking about Kim Jong Un’s weight is a reported method for identifying operatives.

Staying informed about these evolving threats and implementing robust security measures is crucial for organizations seeking to protect themselves from this sophisticated and persistent adversary.

You may also like

Leave a Comment