Is Your New Hire a North Korean Hacker? Perhaps, According to Google

Image provided by Pixabay

This post is also available in: עברית (Hebrew)

North Korean hackers recently have expanded their operations by posing as legitimate remote workers to infiltrate Western companies, with the aim of generating revenue for the regime. According to a new report from Google’s Threat Intelligence Group (GTIG), these covert activities have grown significantly, extending beyond the U.S. to Europe.

The tactic involves North Korean operatives creating fake identities and posing as job seekers to secure remote work opportunities, primarily in the tech and programming sectors. The money they earn through these roles is funneled back to the North Korean government to support its activities. Over the years, U.S. authorities have repeatedly warned about this scheme, with the Department of Justice recently indicting five individuals involved in the operation. These individuals were found to have fraudulently obtained work with at least 64 American companies.

Despite increasing awareness and legal actions, such as the indictment, this scheme continues to thrive. The GTIG report confirms that North Korean IT workers are actively targeting organizations in both the U.S. and Europe. While the U.S. remains a primary target, the report highlights that these operations are growing more sophisticated, with a notable shift towards European countries. This expansion is likely a response to mounting challenges faced by North Korean operatives in securing and maintaining jobs in the U.S.

Along with the geographic expansion, North Korean IT workers are evolving their tactics. The report notes an increase in extortion campaigns and a shift towards conducting operations within corporate virtualized infrastructures, which allows for greater anonymity and control. Some workers have even been detected managing multiple personas across both Europe and the U.S., targeting sensitive sectors such as defense and government organizations.

For companies that unknowingly hire these workers, the risks are significant, including potential espionage, data theft, and operational disruption. The report emphasizes the growing complexity of these schemes, with facilitators located in multiple countries helping to circumvent identity verification and facilitate the movement of corporate assets across borders.