top of page

Democratic People's Republic of Korea (DPRK) Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies


Since late 2024 and moving into early 2026, specialized North Korean groups have realized it is much easier to simply apply for a job. These operatives are posing as elite IT professionals to land remote roles at major companies, particularly in Singapore, Japan, and Malaysia. While they initially started these scams just to collect high-paying paychecks to fund their government’s weapons, they have now turned into dangerous insiders. They are currently hunting for access to international banking systems and crypto-vaults, turning a simple hiring mistake into a massive security nightmare.


The Art of the Digital Impersonation

These groups aren't exploiting computer bugs; they are exploiting the human trust involved in remote hiring. To get through the door, they "launder" identities by using AI-generated faces and stolen ID numbers to build flawless LinkedIn profiles. To pass an interview, they use real-time deepfake filters and voice changers to hide their true identity and accents. Once they are hired, they use "laptop farms"—local accomplices who plug in the company computer so the hacker can log in from across the world while appearing to be in a local apartment. In some aggressive cases, they even pretend to be recruiters, tricking real job seekers into downloading "testing tools" that actually infect their computers with spyware.


Why an "Employee" is Your Biggest Threat

The danger of hiring one of these operatives is layers deep. Beyond the fact that your company is unknowingly paying a six-figure salary to a criminal group, you are handing them the keys to your house. These fake employees gain administrative access to your private chat rooms and cloud storage, allowing them to quietly steal your most valuable code. They can even hide "backdoors" in your company's products to spy on your customers later. If they are ever caught or fired, they don't go quietly; they frequently pivot to extortion, threatening to leak your trade secrets unless you pay them a massive ransom in Bitcoin.


How to Stop the Infiltration

To fight back, companies must change how they vet remote talent. HR departments need to stop trusting static ID photos and start using "live" video checks where a candidate must move or show a physical ID on camera. Coding tests should never require a candidate to download software; instead, use secure, web-based platforms. It’s also vital to check if a candidate's digital footprint matches where they say they are living.

On the IT and Security side, teams should use tracking tools to make sure company laptops are actually located where the employee says they are. Any use of remote-control software like AnyDesk should be an immediate red flag. Finally, keep a close watch on payroll: if a new hire asks to send their salary to a third-party payment app or a crypto-linked card instead of a standard bank account, you might be looking at an infiltrator.


Reference



 
 
 

Comments


Address: Office B322, Level 3, Spaces, Platinum Sentral, KL Sentral, 50470 Kuala Lumpur.

  • Facebook
  • Instagram
  • LinkedIn

Hotline+60327224705

© 2025 Vardaan Sdn Bhd. All Rights Reserved.

bottom of page