成人X站

TECHNOLOGY

Tech Talk: FBI warns U.S. of data extortion, espionage by fake North Korean IT workers

May 9, 2025, 9:23 AM | Updated: May 15, 2025, 10:59 am

north korea IT workers fbi...

Computer users at the Sci-Tech Complex in Pyongyang, North Korea. (Photo: Wong Maye-E, The Associated Press)

(Photo: Wong Maye-E, The Associated Press)

In recent days, the FBI warned American businesses that North Korean IT workers are escalating their malicious attacks on U.S. companies to steal sensitive data, intellectual property, and money (including cryptocurrency) to help fund the regime鈥檚 illegal weapons of mass destruction and ballistic missile programs.

According to the FBI, North Korean operatives, using stolen or fake identities to obtain IT jobs at U.S. companies, have exfiltrated proprietary data, conducted revenue-generating cybercrime, and in some cases, held stolen code hostage for ransom.

However, according to former Microsoft cybersecurity expert Cristin Flynn Goodwin, this type of infiltration by North Korean spies to conduct illegal activity, which has sparked recent headlines and concerns, is actually a decades-old issue that American companies have faced, whether they realize it or not.

“I spent 17 years at Microsoft, running a geopolitical intelligence team where we tracked North Korean behavior, and the North Koreans have been engaging in this sort of fraud against American companies and American individuals for over 10 years,” Goodwin said. “Hundreds of companies in the U.S. have fallen victim to this over the past few years.”

How North Korea intercepts American companies

According to the FBI, for years, companies across the U.S. have, unknowingly, hired thousands of software engineers who claimed to be American developers, but were actually North Korean spies using stolen or fake identities.

Through legitimate employment, they’ve been illegally funneling their salaries and stolen cryptocurrency to Kim Jong Un’s regime to fund weapons of mass destruction鈥攁 weapons program prohibited under United Nations Security Council Resolutions passed after North Korea conducted nuclear tests in 2006, 2009, 2013, 2016, and 2017.

“It’s important to keep in mind that the sanctions that the world has levied against North Korea, because of its behavior, mean that even some government agencies have to go out and raise their own money to fund their agencies and to help fund the government,” Goodwin said. “That means conducting cybercrime and these types of attacks against American businesses, showing up as fake IT workers applying for legitimate jobs in these companies is simply another part of the regime’s attack tactics to raise money and steal IP to benefit the North Korean government.”

In several cases, operatives also harvested sensitive credentials and session cookies to access company systems from non-corporate devices, the FBI said. Those tactics and others have enabled North Korean workers to move laterally through networks, steal additional data, and escalate their access鈥攑osing ongoing threats to affected companies. However, the espionage usually started with a simple job interview.

“North Koreans will use teams, so they’ll have an individual on the phone, and then teams of people on instant messenger, helping the applicant answer technical questions,” Goodwin said.

A high-profile cybersecurity company, SentinelOne, confirmed just this week that it has been approached by North Korean IT operatives posing as legitimate job applicants. The company said it uncovered about 360 fake personas and more than 1,000 fraudulent applications for various roles, including positions on its intelligence engineering team. However, the company said it did not hire any of the North Korean applicants, but admitted it interacted with some during the early stages of the recruitment process to collect intelligence on the tactics being used.

The FBI has also tracked cases of North Korean operatives planting malware in corporate systems to steal usernames, passwords, digital currencies, and other assets. In some cases, North Korean actors have publicly released stolen source code when companies refused to meet ransom demands.

“They may be trying to gain access to the intellectual property of your company…or if they are trying to get into your computer, it might be to use the resources of your machine to further cybercrime,” Goodwin said. “So they are persistent. They will wait. And if they have a way to get into a company and stay there for as long as possible, then that’s also part of their playbook.”

Goodwin, now a managing partner at Advance Cyber Law and a trusted adviser to former White House cyber experts, said companies should tighten hiring protocols and thoroughly verify candidate backgrounds. If suspicious, she shared one unusual tactic, something the top tech companies in the world use, to help confirm suspicions.

“If all else fails, one of the tricks that was talked about at the recent RSA Security Conference, and that the industry often discusses, is that ask if the individual is willing to insult the leader of North Korea, and if they are not willing to insult Kim Jong Un or they terminate the interview. Chances are you’ve got a North Korean government spy on the phone and they want to get away from that as fast as possible,” she said.

FBI tips to protect your business

The FBI’s recommendations for data monitoring include:

  • Practicing the Principle of Least Privilege on your networks, which includes disabling local administrator accounts and limiting privileges for installing remote desktop applications.
  • Monitoring and investigating unusual network traffic, to include remote connections to devices or the installation/presence of prohibited remote desktop protocols or software.
  • North Korean IT workers often have multiple logins into one account in a short period of time from various IP addresses, often associated with different countries.
  • Monitoring network logs and browser session activity to identify data exfiltration through easily accessible means such as shared drives, cloud accounts, and private code repositories.
  • Monitoring endpoints for the use of software that allows for multiple audio/video calls to take place concurrently.

FBI’s recommendations for strengthening remote-hiring processes include:

  • Implementing identity-verification processes during interviewing, onboarding, and throughout the employment of any remote worker. Cross-check HR systems for other applicants with the same resume content and/or contact information. North Korean IT workers have been observed using artificial intelligence and face-swapping technology during video job interviews to obfuscate their true identities.
  • Educating HR staff, hiring managers, and development teams regarding the North Korean IT worker threat, specifically focusing on changes in address or payment platforms during the onboarding process.
  • Reviewing each applicant’s communication accounts, as North Korean IT workers have reused phone numbers (particularly voice-over-IP numbers) and email addresses, on multiple resumes purportedly belonging to different applicants.
  • Verifying that third-party staffing firms conduct robust hiring practices and routinely audit those practices.
  • Using “soft” interview questions to ask applicants for specific details about their location or educational background. North Korean IT workers often claim to have attended non-US educational institutions.
  • Check applicant resumes for typos and unusual nomenclature.
  • Complete as much of the hiring and onboarding process as possible in person.

Follow Luke Duecy on聽聽Read more of his stories聽here. Submit news tips聽here

Technology

FILE - Arkansas Gov. Sarah Huckabee Sanders signs a bill requiring age verification before creating...

Associated Press

Tech industry group sues Arkansas over new social media laws

LITTLE ROCK, Ark. (AP) 鈥 A tech industry trade group sued Arkansas Friday over two new laws that would place limits on content on social media platforms and would allow parents of children who killed themselves to sue over content on the platforms. The lawsuit by NetChoice filed in federal court in Fayetteville, Arkansas, comes […]

2 days ago

FILE - A property owner, who preferred not to give his name, peers into the remains of the second f...

Associated Press

The government cuts key data used in hurricane forecasting, and experts sound an alarm

Weather experts are warning that hurricane forecasts will be severely hampered by the upcoming cutoff of key data from U.S. Department of Defense satellites, the latest Trump administration move with potential consequences for the quality of forecasting. The National Oceanic and Atmospheric Administration said it would discontinue the 鈥渋ngest, processing and distribution鈥 of data collected […]

2 days ago

FILE - The Supreme Court is seen on Capitol Hill in Washington, Dec. 17, 2024. (AP Photo/J. Scott A...

Associated Press

Supreme Court OKs fee that subsidizes phone, internet services in schools, libraries and rural areas

WASHINGTON (AP) 鈥 The Supreme Court on Friday upheld the fee that is added to phone bills to provide billions of dollars a year in subsidized phone and internet services in schools, libraries and rural areas. The justices, by a 6-3 vote, reversed an appeals court ruling that had struck down as unconstitutional the Universal […]

2 days ago

FILE - This combination of photos from 2017 to 2022 shows the logos of Facebook, YouTube, TikTok an...

Associated Press

Judge blocks Georgia’s social media age verification law, citing free speech concerns

ATLANTA (AP) 鈥 Georgia has become the latest state where a federal judge has blocked a law requiring age verification for social media accounts. Like in seven other states where such laws have been blocked, a federal judge ruled Thursday that the Georgia law infringes on free speech rights. The ruling by U.S. District Judge […]

3 days ago

Eric Trump, Don Hendrickson, Eric Thomas, Patrick O'Brien and Donald Trump Jr., left to right, part...

Associated Press

Trumps drop ‘Made in the USA’ label for new phone and a debate ensues: How to define ‘made’?

NEW YORK (AP) 鈥 When the Trump family unveiled a new phone before a giant American flag at its headquarters earlier this month, the pitch was simple and succinct, packed with pure patriotism: 鈥淢ade in the U.S.A.鈥 The Trumps are apparently having second thoughts. How about 鈥減roudly American鈥? Those are the two words that have […]

3 days ago

Associated Press

More refunds are being sent to Fortnite players ‘tricked’ into unwanted purchases. How you can apply

PHILADELPHIA (AP) 鈥 The U.S. Federal Trade Commission is sending out the latest round of refunds to consumers it says were 鈥渢ricked鈥 into purchases they didn鈥檛 want from Fortnite maker Epic Games 鈥 and eligible players who haven’t been compensated yet still have time to apply. According to an FTC went out in December 2024. […]

3 days ago

Tech Talk: FBI warns U.S. of data extortion, espionage by fake North Korean IT workers