Top News

By impersonating VCs, recruiters, and IT professionals, North Korean hackers have stolen billions of dollars' worth of cryptocurrency

At first glance, a venture capitalist, a recruiter at a major corporation, and a newly hired remote IT employee may seem unrelated. However, security experts have discovered all three have been used as cover identities by imposters working covertly for North Korea.

At Cyberwarcon, an annual Washington DC event addressing cyber threats, researchers highlighted the evolving threat posed by North Korean hackers. These hackers are increasingly impersonating job seekers at multinational firms, aiming to fund their government and acquire sensitive corporate information to support North Korea’s weapons programs. Over the past decade, these operations have stolen billions in cryptocurrency, bypassing extensive global sanctions.


North Korean hackers


Microsoft’s cybersecurity expert, James Elliott, shared that North Korean IT operatives have penetrated hundreds of organizations globally. They create fake profiles and use U.S.-based intermediaries to manage their corporate-issued devices and earnings, avoiding sanctions.

Researchers view North Korea's cyber efforts as a complex network of hacking groups with diverse tactics but a shared focus on cryptocurrency theft. With little risk involved due to existing sanctions, the regime continues its activities unabated.

One group, dubbed “Ruby Sleet” by Microsoft, targeted aerospace and defense firms to steal technical data for advancing weapons and navigation technologies. Another, named “Sapphire Sleet,” conducted phishing campaigns by posing as venture capitalists and recruiters to steal cryptocurrency. They would lure victims into downloading malware, disguised as meeting tools or skills assessments, to access sensitive data, including cryptocurrency wallets. Over six months, they netted at least $10 million through these schemes.

The most persistent challenge, however, is North Korea's exploitation of the remote work boom since the COVID-19 pandemic. Hackers secure legitimate employment at large companies, earning money for the regime while stealing trade secrets and extorting their employers.

Microsoft describes these operatives as a “triple threat,” combining deceptive employment, intellectual property theft, and extortion. While hundreds of companies have unknowingly hired North Korean operatives, only a few, like cybersecurity firm KnowBe4, have publicly disclosed incidents. KnowBe4 quickly blocked a North Korean hire’s access upon discovery, ensuring no data loss.

The typical strategy of North Korean IT operatives involves creating convincing online profiles using platforms like LinkedIn and GitHub. They employ AI tools for generating fake identities, complete with altered faces and voices. Once hired, companies unknowingly ship work laptops to U.S.-based facilitators, who then prepare the devices for remote use by North Korean spies. These spies often operate from North Korea, Russia, or China, complicating detection.

Microsoft stumbled upon critical intelligence when they accessed a publicly exposed repository linked to a North Korean operative. The repository contained detailed instructions, including fake resumes and financial records, outlining the scale of their operations.

While these hackers sometimes make errors that expose them, such as using language inconsistent with their claimed identities, their tactics remain highly effective. For instance, one operative posing as Japanese made linguistic errors and had conflicting information about their location and bank accounts.

The U.S. government has sanctioned North Korea-linked entities and warned about the use of deepfake technologies in job applications. In 2024, several individuals managing the “laptop farms” used in these schemes faced legal action. Still, researchers emphasize the need for companies to strengthen their hiring processes to detect such fraud.

“They’re not going away,” Elliott cautioned. “This threat will persist for years to come.”

Post a Comment

Previous Post Next Post

ad5

ad4