Special Features

Cybersecurity Month

‘How not to hire a North Korean plant posing as a techie’ guide updated by US and South Korean authorities

Advise turning off and never using remote desktop protocol, prohibiting private VPNs, not trusting recruiters’ due diligence


US and South Korean authorities have updated their guidance on how to avoid hiring North Korean agents seeking work as freelance IT practitioners.

Thousands of North Korean techies are thought to prowl the world’s freelance platforms seeking work outside the Republic. Kim Jong Un’s regime uses the workers to earn hard currency, and infiltrate organizations they work for to steal secrets and plant malware. The FBI has previously warned employers to watch for suspicious behavior such as logging in from multiple IP addresses, working odd hours, and inconsistencies in name spellings across different online platforms.

The updated advice adds other indicators that freelancer you are thinking about hiring could be a North Korean plant, including:

The updated guidance suggests requiring recruitment companies to document their background checking processes, to be sure that they can screen out North Korean stooges. Conducting your own due diligence on workers suggested by recruiters is also recommended.

Another piece of advice recommends you should “Keep records, including recordings of video interviews, of all interactions with potential employees.” North Korean freelancers, per previous advice, will be shy of video interviews.

The agencies also recommend technological measures including:

Plenty of that is solid advice for any IT shop under any circumstances.

The advice was published a day after the US Justice department announced the seizure of 17 website domains used by North Korean information technology workers in a scheme to defraud US and foreign businesses, evade sanctions, and fund the development of the North’s weapons program.

US authorities have previously seized $1.5 million of revenue generated by those sites.

North Korea has “flooded the global marketplace with ill-intentioned information technology workers,” said Special Agent in Charge Jay Greenberg of the FBI St. Louis Division.

“This scheme is so prevalent that companies must be vigilant to verify whom they're hiring. At a minimum, the FBI recommends that employers take additional proactive steps with remote IT workers to make it harder for bad actors to hide their identities. Without due diligence, companies risk losing money or being compromised by insider threats they unknowingly invited inside their systems.”

Check Chinese professors, too

The updated advice was issued the day after the nations of the Five Eyes alliance – Australia, Canada, New Zealand, the UK and the USA – warned at a summit that China’s industrial espionage efforts have again increased.

As part of the Five Eyes announcement, Mike Burgess, director-general of security at the Australian Security Intelligence Organisation, revealed that the agency recently detected and disrupted a Chinese operation involving a visiting professor who came to work at an unnamed Australian research institution but was first recruited by Chinese intelligence.

“The spymasters gave him money and a shopping list of intelligence requirements and sent him to Australia,” Burgess revealed.

“The academic set his Australian students research assignments that specifically covered many of the intelligence requirements," he recounted.

“ASIO intervened and removed the professor from the country before any harm could be done,” Burgess said, adding “This sort of thing happens every day in Australia, just as it happens in all our countries.” ®

Send us news
51 Comments

Arizona laptop farmer pleads guilty for funneling $17M to Kim Jong Un

300+ US companies, 70+ individuals hit by the fraudsters

Reclassification is making US tech job losses look worse than they are

IT hiring ticks up in January, but unemployment climbs to 5.7%

DARPA asking for ideas on automating money laundering detection

With all the AI hype swirling around, you'd think someone would've cracked this one already

North Koreans clone open source projects to plant backdoors, steal credentials

Stealing crypto is so 2024. Supply-chain attacks leading to data exfil pays off better?

Trump’s tariffs, cuts may well put tech in a chokehold, say analysts

Forrester's take on President's economic agenda offers little optimism for the industry

North Korean dev who renamed himself 'Bane' accused of IT worker fraud caper

5 indicted as FBI warns North Korea dials up aggression, plus Russian devs allegedly get in on the act

Crypto klepto North Korea stole $659M over just 5 heists last year

US, Japan, South Korea vow to intensify counter efforts

Datacus extractus: Harry Potter publisher breached without resorting to magic

PLUS: Allstate sued for allegedly tracking drivers; Dutch DDoS; More fake jobs from Pyongyang; and more

When food delivery apps reached Indonesia, everyone put on weight

PLUS: Salt Typhoon and IT worker scammers sanctioned; Alibaba Cloud’s K8s go global; Amazon acquires Indian BNPL company

IT job market is still shrinking but not as quickly as last year

Half the number of roles axed, and yes – you can keep blaming AI

Megan, AI recruiting agent, is on the job, giving bosses fewer reasons to hire in HR

She doesn't feel pity, remorse, or fear, but she'll craft a polite email message as she turns you down

In AI agent push, Microsoft re-orgs to create 'CoreAI – Platform and Tools' team

Nad lad says 30 years of change happening in 3 years ... we're certainly feeling the compression of time