³ÉÈËXÕ¾

TECHNOLOGY

TechTalk: FBI warns U.S. of data extortion, espionage by fake North Korean IT workers

May 9, 2025, 9:23 AM | Updated: 10:16 am

north korea IT workers fbi...

Computer users at the Sci-Tech Complex in Pyongyang, North Korea. (Photo: Wong Maye-E, The Associated Press)

(Photo: Wong Maye-E, The Associated Press)

In recent days, the FBI warned American businesses that North Korean IT workers are escalating their malicious attacks on U.S. companies to steal sensitive data, intellectual property, and money (including cryptocurrency) to help fund the regime’s illegal weapons of mass destruction and ballistic missile programs.

According to the FBI, North Korean operatives, using stolen or fake identities to obtain IT jobs at U.S. companies, have exfiltrated proprietary data, conducted revenue-generating cybercrime, and in some cases, held stolen code hostage for ransom.

However, according to former Microsoft cybersecurity expert Cristin Flynn Goodwin, this type of infiltration by North Korean spies to conduct illegal activity, which has sparked recent headlines and concerns, is actually a decades-old issue that American companies have faced, whether they realize it or not.

“I spent 17 years at Microsoft, running a geopolitical intelligence team where we tracked North Korean behavior, and the North Koreans have been engaging in this sort of fraud against American companies and American individuals for over 10 years,” Goodwin said. “Hundreds of companies in the U.S. have fallen victim to this over the past few years.”

How North Korea intercepts American companies

According to the FBI, for years, companies across the U.S. have, unknowingly, hired thousands of software engineers who claimed to be American developers, but were actually North Korean spies using stolen or fake identities.

Through legitimate employment, they’ve been illegally funneling their salaries and stolen cryptocurrency to Kim Jong Un’s regime to fund weapons of mass destruction—a weapons program prohibited under United Nations Security Council Resolutions passed after North Korea conducted nuclear tests in 2006, 2009, 2013, 2016, and 2017.

“It’s important to keep in mind that the sanctions that the world has levied against North Korea, because of its behavior, mean that even some government agencies have to go out and raise their own money to fund their agencies and to help fund the government,” Goodwin said. “That means conducting cybercrime and these types of attacks against American businesses, showing up as fake IT workers applying for legitimate jobs in these companies is simply another part of the regime’s attack tactics to raise money and steal IP to benefit the North Korean government.”

In several cases, operatives also harvested sensitive credentials and session cookies to access company systems from non-corporate devices, the FBI said. Those tactics and others have enabled North Korean workers to move laterally through networks, steal additional data, and escalate their access—posing ongoing threats to affected companies. However, the espionage usually started with a simple job interview.

“North Koreans will use teams, so they’ll have an individual on the phone, and then teams of people on instant messenger, helping the applicant answer technical questions,” Goodwin said.

A high-profile cybersecurity company, SentinelOne, confirmed just this week that it has been approached by North Korean IT operatives posing as legitimate job applicants. The company said it uncovered about 360 fake personas and more than 1,000 fraudulent applications for various roles, including positions on its intelligence engineering team. However, the company said it did not hire any of the North Korean applicants, but admitted it interacted with some during the early stages of the recruitment process to collect intelligence on the tactics being used.

The FBI has also tracked cases of North Korean operatives planting malware in corporate systems to steal usernames, passwords, digital currencies, and other assets. In some cases, North Korean actors have publicly released stolen source code when companies refused to meet ransom demands.

“They may be trying to gain access to the intellectual property of your company…or if they are trying to get into your computer, it might be to use the resources of your machine to further cybercrime,” Goodwin said. “So they are persistent. They will wait. And if they have a way to get into a company and stay there for as long as possible, then that’s also part of their playbook.”

Goodwin, now a managing partner at Advance Cyber Law and a trusted adviser to former White House cyber experts, said companies should tighten hiring protocols and thoroughly verify candidate backgrounds. If suspicious, she shared one unusual tactic, something the top tech companies in the world use, to help confirm suspicions.

“If all else fails, one of the tricks that was talked about at the recent RSA Security Conference, and that the industry often discusses, is that ask if the individual is willing to insult the leader of North Korea, and if they are not willing to insult Kim Jong Un or they terminate the interview. Chances are you’ve got a North Korean government spy on the phone and they want to get away from that as fast as possible,” she said.

FBI tips to protect your business

The FBI’s recommendations for data monitoring include:

  • Practicing the Principle of Least Privilege on your networks, which includes disabling local administrator accounts and limiting privileges for installing remote desktop applications.
  • Monitoring and investigating unusual network traffic, to include remote connections to devices or the installation/presence of prohibited remote desktop protocols or software.
  • North Korean IT workers often have multiple logins into one account in a short period of time from various IP addresses, often associated with different countries.
  • Monitoring network logs and browser session activity to identify data exfiltration through easily accessible means such as shared drives, cloud accounts, and private code repositories.
  • Monitoring endpoints for the use of software that allows for multiple audio/video calls to take place concurrently.

FBI’s recommendations for strengthening remote-hiring processes include:

  • Implementing identity-verification processes during interviewing, onboarding, and throughout the employment of any remote worker. Cross-check HR systems for other applicants with the same resume content and/or contact information. North Korean IT workers have been observed using artificial intelligence and face-swapping technology during video job interviews to obfuscate their true identities.
  • Educating HR staff, hiring managers, and development teams regarding the North Korean IT worker threat, specifically focusing on changes in address or payment platforms during the onboarding process.
  • Reviewing each applicant’s communication accounts, as North Korean IT workers have reused phone numbers (particularly voice-over-IP numbers) and email addresses, on multiple resumes purportedly belonging to different applicants.
  • Verifying that third-party staffing firms conduct robust hiring practices and routinely audit those practices.
  • Using “soft” interview questions to ask applicants for specific details about their location or educational background. North Korean IT workers often claim to have attended non-US educational institutions.
  • Check applicant resumes for typos and unusual nomenclature.
  • Complete as much of the hiring and onboarding process as possible in person.

Follow Luke Duecy on  Read more of his stories here. Submit news tips here

Technology

Associated Press

‘DA POPE!’ Leo XIV’s Chicago roots unleash spate of holy humor

A Chicago-born cardinal walks into a conclave. The rest of the joke tells itself. In the breathless day since Pope Leo XIV’s election as the first American pontiff, the memes, doctored images and tongue-in-cheek references have piled up deeper than Chicago’s pizza and more loaded than its hot dog, seemingly irresistible to comics and commoners […]

3 hours ago

The Army dress uniform and photo of the late Christopher Pelkey is shown at his mother's home, Wedn...

Associated Press

From AI avatars to virtual reality crime scenes, courts are grappling with AI in the justice system

Stacey Wales gripped the lectern, choking back tears as she asked the judge to give the man who shot and killed her brother the maximum possible sentence for manslaughter. What appeared next stunned those in the Phoenix courtroom last week: An AI-generated video with a likeness of her brother, Christopher Pelkey, told the shooter he […]

5 hours ago

Associated Press

San Francisco region’s commuter trains are running again after hours-long stoppage

Thousands of commuters in the San Francisco Bay Area were scrambling for alternate routes after its regional commuter rail system known as BART shut down systemwide for several hours Friday morning. Bay Area Rapid Transit said it could not run its train control system due to a malfunction. A BART spokesperson said on its media […]

5 hours ago

north korea IT workers fbi...

Luke Duecy

TechTalk: FBI warns U.S. of data extortion, espionage by fake North Korean IT workers

The FBI warned American businesses that North Korean IT workers are escalating their malicious attacks on U.S. companies to steal sensitive data, intellectual property, and money.

6 hours ago

FILE - Students listen to instruction from instructor Ben McLane, right, during a wildland firefigh...

Associated Press

Forest and park service worker cuts leave wildland firefighting crews short-staffed

SEATTLE (AP) — Trump administration funding cuts and a loss of federal workers who help support wildland firefighting continues to make planning for the upcoming wildfire season a challenge, according to forest and fire officials in Washington state and Oregon. The biggest issue they’re facing is a lack of communication from the federal government as […]

24 hours ago

A United Airlines jetliner prepares to push off from a gate at Denver International Airport Wednesd...

Associated Press

Officials plan to revamp the US air traffic control system. Here’s a breakdown by the numbers

The Trump administration on Thursday announced an ambitious three-year plan to replace the United State’s aging air traffic control system. Officials did not provide an exact cost estimate but said it would require billions of dollars to put in place. They said a $12.5 billion budget proposal that a House committee drafted last week represents […]

1 day ago

TechTalk: FBI warns U.S. of data extortion, espionage by fake North Korean IT workers