• Home
  • Politics
  • Health
  • World
  • Business
  • Finance
  • Tech
  • More
    • Sports
    • Entertainment
    • Lifestyle
What's Hot

Trump Announces First Post-Tariff Trade Deal

May 8, 2025

100 Funny Father’s Day Quotes for Hilariously Relatable Humor (and Plenty of Love Too)

May 8, 2025

Top 10 Benefits Of Acupuncture

May 8, 2025
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Thursday, May 8
Patriot Now NewsPatriot Now News
  • Home
  • Politics

    Security video shows brazen sexual assault of California woman by homeless man

    October 24, 2023

    Woman makes disturbing discovery after her boyfriend chases away home intruder who stabbed him

    October 24, 2023

    Poll finds Americans overwhelmingly support Israel’s war on Hamas, but younger Americans defend Hamas

    October 24, 2023

    Off-duty pilot charged with 83 counts of attempted murder after allegedly trying to shut off engines midflight on Alaska Airlines

    October 23, 2023

    Leaked audio of Shelia Jackson Lee abusively cursing staffer

    October 22, 2023
  • Health

    Disparities In Cataract Care Are A Sorry Sight

    October 16, 2023

    Vaccine Stocks—Including Pfizer, Moderna, BioNTech And Novavax—Slide Amid Plummeting Demand

    October 16, 2023

    Long-term steroid use should be a last resort

    October 16, 2023

    Rite Aid Files For Bankruptcy With More ‘Underperforming Stores’ To Close

    October 16, 2023

    Who’s Still Dying From Complications Related To Covid-19?

    October 16, 2023
  • World

    New York Democrat Dan Goldman Accuses ‘Conservatives in the South’ of Holding Rallies with ‘Swastikas’

    October 13, 2023

    IDF Ret. Major General Describes Rushing to Save Son, Granddaughter During Hamas Invasion

    October 13, 2023

    Black Lives Matter Group Deletes Tweet Showing Support for Hamas 

    October 13, 2023

    AOC Denounces NYC Rally Cheering Hamas Terrorism: ‘Unacceptable’

    October 13, 2023

    L.A. Prosecutors Call Out Soros-Backed Gascón for Silence on Israel

    October 13, 2023
  • Business

    Trump Announces First Post-Tariff Trade Deal

    May 8, 2025

    Electric Vehicle Sales Nosedive As GOP Takes Buzzsaw To Biden’s Mandate

    May 7, 2025

    Tyson Foods Announces It Will Bend The Knee To Trump Admin’s New Rules

    May 7, 2025

    Federal Reserve Holds Interest Rates Steady Despite Pressure From Trump

    May 7, 2025

    ‘Wait Them Out’: John Kennedy Tells Larry Kudlow One Lie He Suspects China’s Telling US

    May 7, 2025
  • Finance

    Ending China’s De Minimis Exception Brings 3 Benefits for Americans

    April 17, 2025

    The Trump Tariff Shock Should Push Indonesia to Reform Its Economy

    April 17, 2025

    Tariff Talks an Opportunity to Reinvigorate the Japan-US Alliance

    April 17, 2025

    How China’s Companies Are Responding to the US Trade War

    April 16, 2025

    The US Flip-flop Over H20 Chip Restrictions 

    April 16, 2025
  • Tech

    Cruz Confronts Zuckerberg on Pointless Warning for Child Porn Searches

    February 2, 2024

    FTX Abandons Plans to Relaunch Crypto Exchange, Commits to Full Repayment of Customers and Creditors

    February 2, 2024

    Elon Musk Proposes Tesla Reincorporates in Texas After Delaware Judge Voids Pay Package

    February 2, 2024

    Tesla’s Elon Musk Tops Disney’s Bob Iger as Most Overrated Chief Executive

    February 2, 2024

    Mark Zuckerberg’s Wealth Grew $84 Billion in 2023 as Pedophiles Target Children on Facebook, Instagram

    February 2, 2024
  • More
    • Sports
    • Entertainment
    • Lifestyle
Patriot Now NewsPatriot Now News
Home»Finance»Fox in the Henhouse: The Growing Harms of North Korea’s Remote IT Workforce
Finance

Fox in the Henhouse: The Growing Harms of North Korea’s Remote IT Workforce

May 21, 2024No Comments10 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Fox in the Henhouse: The Growing Harms of North Korea’s Remote IT Workforce
Share
Facebook Twitter LinkedIn Pinterest Email

North Korea has quietly seeded thousands of information technology (IT) professionals into contractors and subcontractors that serve the United States’ largest and most profitable companies. These workers operate under American or third country false identities. This IT army’s main objective is to earn money for the perpetually cash strapped Kim Jong Un regime. These funds support North Korea’s ballistic missile and nuclear programs and prop up Kim’s dictatorship.  

In addition, North Korean arms are now findings their way into conflicts around the world. Russia has started to use North Korean missiles to conduct strikes inside Ukraine and North Korean munitions have been used by Hamas in attacks against Israel forces in Gaza.  All of this is made possible because of funds flowing from IT workers into North Korean government coffers. 

Moreover, the access that these North Korean infiltrators have gained within U.S. companies provides the Kim regime multiple vectors for the theft of intellectual property (IP), the holding of U.S. data hostage for ransom, attacks on critical infrastructure, and the launching of cyber attacks. Thus, American companies are unknowingly funding an enemy state dedicated to their own degradation and destruction.

The Danger

Since at least 2015, North Korea has exploited the use of remote IT workers to gain employment with companies around the world. The main purpose of this army of IT professionals is to generate revenue that circumvents international sanctions. This is a large and systemic problem, as IT and software development outsourcing is a massive market, expected to exceed $500 billion in 2024. Nearly two-thirds of U.S. companies outsource at least some of their IT and software engineering needs. 

The danger goes beyond mere remittances to a dictator. Information technology is only one of many ways Kim Jong Un funds his regime. IT, however, is special. A North Korean remote IT worker has access to company networks, which means access to proprietary IP, data archives, production, internal tooling, plans, processes, and personnel. The North Korean infiltrators’ goal is to remain undiscovered; but if they are, they already have their hands on critical systems.  

One industry source reported that North Koreans who had been discovered and fired then responded with extortion. The fired workers had maintained access to high-value code or systems that the company could not lose. This is a little-discussed form of ransomware attack. 

Moreover, recent investigations by Palo Alto’s Unit 42 threat intelligence team uncovered evidence that North Korea’s traditional espionage and intrusion actor groups may now be cooperating. What does this mean? Imagine a Lazarus Heist-type theft or Sony hack enabled by malicious insiders operating as IT workers inside major U.S. companies.

Finally, U.S. companies that hire these workers face liability for evading sanctions. It is true that most U.S. firms employ North Korean IT support unwittingly. However, this is not a claim that the U.S. government can accept at face value. Running afoul of U.S. and international sanctions against North Korea can introduce a range of liabilities, including with the Treasury Department’s Office of Foreign Asset Control, as well as other national and international regulatory and law enforcement authorities.

See also  Community-based prevention system linked to reduced handgun carrying among youth growing up in rural areas

The Scope

Given the covert nature of this operation, determining the precise number of North Korean IT professionals operating inside U.S. systems is impossible. However, interviews with one purported North Korean worker suggested more than 4,000 North Korean IT and software workers are deployed globally. The FBI estimated that each of these workers can generate up to $300,000 annually, with teams collectively exceeding $3 million each year. 

Now that North Korea has reopened following the COVID-19 pandemic, it seems logical that the regime would send additional workers abroad, given previous successes.   

An industry source with knowledge of the threat claims that the number of deployed North Korean IT professionals is probably more in the neighborhood of 8,000-12,000. And while many of these workers originally started operations out of Russia and China, they have also been identified in Southeast Asia, Africa, and the Middle East. The industry source indicated that efforts to uncover these workers inside U.S. companies have found them operating on internet infrastructure in these locations. 

The Difficulty of Detection

The risk of hiring North Korean remote IT workers is not something most companies consider in their decision making. Corporate hiring and due diligence practices were never built to detect a nation-state using the full range of government resources for the sole purpose of seeding employees into foreign private companies. 

Although many large U.S. corporations have built insider-threat programs designed to detect and mitigate both negligent and malicious activities, those programs vary widely in effectiveness. More importantly, few corporate insider-threat programs go so far as to apply their screening processes to contract employees. Many companies do not even know the identities or citizenship of remote contract employees, especially if those workers are offshore. Finally, once hired onto a project, the North Koreans take pains to avoid any activities that draw the attention of insider threat teams.

Some North Korean Tactics and Techniques

The first challenge infiltrators encounter is the hiring process. They need to get their foot in the door. The FBI’s two advisories on the topic provide us with some basic information on how this is accomplished, but industry sources tell us that North Koreans often pursue employment with contract IT companies. The number of these firms has grown dramatically since the COVID-19 pandemic, and they may not have as rigorous screening processes as larger corporations. Alternatively, North Koreans seek freelance IT work on major job platforms.

These workers operate under fake names using an array of stolen, forged, or fabricated identity documents from countries around the world, including the United States. They often use a combination of VPNs, noisy hosted IPs, and residential proxies to mask their real locations, as well as crafting complex scheduling and logistical programs to ensure they are present for remote calls and meetings in Western time zones.

See also  Credit Suisse to delay its 2022 annual report after a 'late call' from the SEC

North Korean workers rely to some degree on cryptocurrency and digital currency payment platforms for payment, thereby avoiding traditional financial industry fraud detection tools.

Recently, North Koreans are suspected to make use of generative AI tools like ChatGPT to build more realistic and understandable English-language content as well as develop identity verification documents that pass many counter-fraud tools.

The Adaptation and Evolution of the Threat

Industry sources argue that North Korea’s tradecraft and technological acumen are maturing. North Korea still sends manual laborers abroad, especially to Russia and China, but it has also expanded the skills repertoire of its workers. The first IT employees from North Korea were not very good compared to their colleagues from other countries. This has changed. Today, North Korean IT workers learn in-demand coding languages, including knowledge of leading-edge AI and ML products, to secure employment at prominent companies using the most advanced technologies.

Some IT workers fired by contract employers were considered to be excellent coders who delivered superior work products. Industry sources posit that some companies may be willing to overlook contract employment of a North Korean if their output significantly contributed to business operations.

Moreover, North Korean IT professionals have figured out new ways to conceal their identities. These workers frequently hire Western nationals to pose as them during job interviews or team meetings, and even operate their fake personas online using U.S. Internet infrastructure – all to avoid detection by insider threat and cybersecurity teams. 

Some North Korean IT workers have established legitimate businesses in foreign countries, hired local nationals, and operated as remote IT staffing firms. These firms never touch U.S. or Western businesses and focus entirely on generating revenue from operations inside those countries.

Other enterprising North Koreans have paid college students in Western countries to allow use of a laptop in their dorm rooms or virtual machines on their school laptops, all to circumvent security controls deployed to detect malicious network activity outside the United States.

North Koreans are able to secure work in a remote IT capacity because of the virtual nature of much engineering work. Working from obscure, varied, and widely dispersed locations is not unusual in this industry, and thus often does not raise alarms. However, many companies require all employees, even contractors, to use corporate devices so that the corporate customers can maintain control over their endpoints. In these instances, North Koreans must obtain corporate devices. They do this via mail or commercial delivery.

IT departments and externally sourced IT vendors routinely ship devices to personal addresses provided by talent acquisition. In some cases, those locations have to match the purported location of the employee. Obviously, northwestern China, Russia, and Southeast Asia will not suffice in these situations. To solve this problem, North Korea relies on proxies to receive these devices somewhere in the United States.  

See also  Stocks making biggest moves midday: Rivian, Orchard Therapeutics

An even more difficult problem is payment. Many employers require U.S. bank accounts to pay wages. It is not clear how North Korea evades the banking sector’s rigorous Know Your Customer regulations. One possibility is high quality counterfeit documents. Another is again the use of proxies to receive payment in exchange for a fee.

Mitigations

The North Korean IT worker threat poses a unique risk to U.S. firms and companies in Europe, Japan, South Korea, Australia, New Zealand, and elsewhere in the democratic developed world. Pyongyang has exploited a unique moment in the evolution of IT services’ business model to attack a target ill-suited to defend itself. 

Few private companies are even aware of the threat, let alone constituted to address it effectively. Those that do will need to master cyber defense, insider threat, employee screening, geopolitics, and a combination of legal and employee privacy regulations. 

But the threat can be mitigated. The development and maturation of fundamental security practices designed to protect companies from traditional risks is the place to start. Targeted investments in the following areas can increase the entry and operating costs for North Korean workers, and ultimately, put them out of business:

  • design, deploy, and regularly audit employee hiring and identify verification processes;
  • train talent acquisition and human resources on the threat and ensure they employ verification practices to weed out malicious actors;
  • ensure cybersecurity and IT network defense personnel are trained on the threat and possess the necessary monitoring tools to anomalous activity indicating a potential risk;
  • enable cybersecurity professionals to exchange approved threat intelligence with peers and through multilateral organizations like IT-ISAC;
  • empower insider threat teams to conduct regular reviews of contract workforces to detect potential compromise; and
  • instruct cybersecurity and insider threat teams to scrutinize government advisories on the North Korean threat, to ensure they have the most up-to-date information to perform investigations.

Geopolitical Implications

North Korea exists today only because of the support it receives from China. Beijing is aware of North Korea’s IT army and permits it to continue. Moreover, it is likely Beijing would use the thousands of deployed IT workers in a crisis if it served China’s national interests. The United States already suffers massive technology and IP theft from China; the North Korean IT workforce represents another potential weapon.  

More imminently for U.S. and other Western businesses, China’s support for North Korea and its IT worker program in particular means that no diplomatic or governmental solution is possible. The private sector must take the lead in its own defense.

Fox Growing harms Henhouse Koreas North Remote Workforce
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Ending China’s De Minimis Exception Brings 3 Benefits for Americans

April 17, 2025

The Trump Tariff Shock Should Push Indonesia to Reform Its Economy

April 17, 2025

Tariff Talks an Opportunity to Reinvigorate the Japan-US Alliance

April 17, 2025

How China’s Companies Are Responding to the US Trade War

April 16, 2025
Add A Comment

Leave A Reply Cancel Reply

Top Posts

Southeast Asia’s IPO market an investor favorite amid global headwinds: Deloitte

July 7, 2023

WGA Reaches Tentative Deal, Potentially Ending Hollywood Strike

September 25, 2023

Hamas, Iran Try to ‘Catfish’ IDF Soldiers with Fake Female Social Media Accounts

November 2, 2023

Republicans Are Now Trying To Defund Fani Willis And Jack Smith

August 30, 2023
Don't Miss

Trump Announces First Post-Tariff Trade Deal

Business May 8, 2025

President Donald Trump announced Thursday the U.S. has reached a trade agreement with the U.K.,…

100 Funny Father’s Day Quotes for Hilariously Relatable Humor (and Plenty of Love Too)

May 8, 2025

Top 10 Benefits Of Acupuncture

May 8, 2025

Electric Vehicle Sales Nosedive As GOP Takes Buzzsaw To Biden’s Mandate

May 7, 2025
About
About

This is your World, Tech, Health, Entertainment and Sports website. We provide the latest breaking news straight from the News industry.

We're social. Connect with us:

Facebook Twitter Instagram Pinterest
Categories
  • Business (4,110)
  • Entertainment (4,220)
  • Finance (3,202)
  • Health (1,938)
  • Lifestyle (1,626)
  • Politics (3,084)
  • Sports (4,036)
  • Tech (2,006)
  • Uncategorized (4)
  • World (3,944)
Our Picks

‘Taliban Flag Flies over Kabul…This Is Joe Biden’s Legacy’

April 23, 2023

‘Jesus Revolution’ Grosses More than 4 Oscar Nominees…Combined

March 16, 2023

Disney World in Orlando to Host Conference on Gay and Transgender Rights in the Workplace

March 29, 2023
Popular Posts

Trump Announces First Post-Tariff Trade Deal

May 8, 2025

100 Funny Father’s Day Quotes for Hilariously Relatable Humor (and Plenty of Love Too)

May 8, 2025

Top 10 Benefits Of Acupuncture

May 8, 2025
© 2025 Patriotnownews.com - All rights reserved.
  • Contact
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.