Skip to content

China aids North Korean IT specialists in securing employment, evading international sanctions

Chinese corporation with a minimum of 35 subsidiaries delivered information technology hardware to a North Korean state-supported institution.

China facilitates the employment of North Korean IT specialists, bypassing the imposed restrictions
China facilitates the employment of North Korean IT specialists, bypassing the imposed restrictions

China aids North Korean IT specialists in securing employment, evading international sanctions

In the digital age, global technology companies are increasingly aware of the risks associated with accidentally hiring North Korean IT workers, and the potential sanctions, reputational damage, and cyber threats that come with it. A multi-layered approach is essential to guard against these significant risks.

Firstly, strengthening pre-hiring verification and due diligence is crucial. This includes rigorous background checks and identity verification processes that can detect fake or stolen identities, often used by North Korean workers who impersonate U.S. citizens to gain employment remotely. Biometric verification and cross-referencing with government and international watchlists are essential components of this process. AI and forensic tools are also employed to authenticate identity documents and photos, as North Korean workers have been known to use AI-enhanced fake images and voice-changing software to mask their identities.

Secondly, enhancing remote work monitoring and cybersecurity controls is vital. Advanced cybersecurity solutions like endpoint detection and response (EDR), network monitoring, and behaviour analytics are used to detect suspicious activity. VPNs and remote access management tools must be used carefully, as North Korean operatives use these tools to conceal their real locations and access sensitive corporate data stealthily.

Thirdly, collaboration with government and security agencies is key. Law enforcement and intelligence agencies can share threat intelligence, such as lists of known or suspected North Korean operatives and fraudulent identities. Staying updated on sanctions and regulatory compliance is also crucial to avoid inadvertently engaging with entities or individuals linked to North Korea’s cyber workforce.

Fourthly, implementing employee education and reporting mechanisms is essential. HR and recruitment teams should be trained to recognise red flags associated with remote hires, such as inconsistent or unverifiable employment histories, suspicious payment routing, or unusual communication patterns. Confidential channels for employees to report suspicious activities or concerns related to colleagues’ identities or behaviours should also be established.

Lastly, using technology to detect and block malicious activity is vital. AI and machine learning tools are deployed to identify anomalous patterns that might indicate fraud, data theft, or extortion attempts linked to insider threats. Regular audits and penetration testing are also conducted to assess vulnerabilities exploited by such insider threats.

In summary, global tech firms need a comprehensive approach that combines robust identity verification, enhanced cybersecurity vigilance, collaboration with authorities, and ongoing employee awareness to guard against the risks posed by North Korean remote IT workers. Failure to do so can result in severe legal sanctions, financial losses, and long-term reputational harm while inadvertently supporting North Korea’s illicit weapons programs through payroll and data theft schemes.

Notably, North Korean operatives often slip through due to gaps between hiring and post-hire security. These IT workers send stolen sensitive data for use in espionage operations and sometimes sell the information on the dark web. Security teams should train HR interviewers to look for red flags in applicants, thoroughly verify identities, and set up tripwires to detect suspicious activity.

The network of organisations linked to North Korean operations poses a significant risk to Western businesses, potentially exposing them to sanctions violations and reputational harm. Companies that hire North Korean IT workers face reputational damage, particularly those in sensitive industries such as defence, finance, and technology. North Korean IT workers conduct ransomware operations, manipulate cryptocurrency markets, develop commercial software with malicious code, and steal intellectual property and sensitive data.

The sophistication of North Korean IT worker schemes has attracted significant attention from threat intelligence researchers. Simple and personalised interview questions can often trip up IT workers and uncover inconsistencies. Chinese front companies are also helping North Korean IT workers get jobs and evade international sanctions.

Experts, such as Evan Gordenker, consulting senior manager for the Unit 42 threat intelligence team at Palo Alto Networks, and Ben Read, senior manager of Google's Threat Intelligence Group, agree on the need for a unified response from recruiting, human resources, IT, and security. They suggest improving HR and security teams' collaboration to avoid North Korean IT worker scams. Read also recommends training HR departments to spot inconsistencies and teaching them IT worker tactics, techniques, and procedures (TTPs) to uncover potential North Korean operatives quickly.

This story has been updated to include comments from Palo Alto Networks and Google.

1) To prevent potential cyber threats from North Korean IT workers, technology companies should invest in threat intelligence and collaborate with government and security agencies to access information on known North Korean operatives and fraudulent identities.

2) Employing advanced cybersecurity solutions like endpoint detection and response (EDR), network monitoring, and behavior analytics can help detect suspicious activities that might indicate ransomware attacks or data theft by North Korean IT workers.

Read also:

    Latest