North Korea’s scamming, thieving, and AI-abusing fake IT workers are increasingly targeting European employers.
The hermit kingdom (DPRK) runs a corps of operatives who apply for remote tech jobs and, if they get them, funnel their salaries to Kim Jong Un’s coffers. Some also run malware on company computers, steal their employers’ data, then demand ransom payments. Many just do a bad job – sometimes for several employers at a time – so they can be paid multiple salaries.
The workers submit impressive CVs and, if they score an interview, try to disguise their accents and appearance. Claiming their webcam is broken, and therefore being unable to appear in interviews, is a favourite tactic. So is using generative AI to create portraits, or even answers in interviews.
Sometimes the fake workers slip up after they get a job, by asking that company laptops be sent to an address that doesn’t match the one used in their applications. That can be a sign they’ve recruited a local facilitator who will keep the laptop connected to the grid and the net. The North Koreans then use VPNs to connect to the employer-provided laptops, and make sure they work – or appear to be working – the appropriate local hours. Facilitators also help to shift salaries to Pyongyang.

I’m a security expert, and I almost fell for a North Korea-style deepfake job applicant …Twice
The scam is sophisticated: Even infosec businesses have interviewed and hired North Korean techies.
A Tuesday post penned by Jamie Collier, lead adviser at Google’s Threat Intelligence Group, reports “an increase of active operations in Europe” by such workers.
“DPRK IT workers’ activity across multiple countries now establishes them as a global threat,” the post states. “While the United States remains a key target, over the past months, DPRK IT workers have encountered challenges in seeking and maintaining employment in the country. This is likely due to increased awareness of the threat through public reporting, United States Department of Justice indictments, and right-to-work verification challenges,” the post states.
“These factors have instigated a global expansion of IT worker operations, with a notable focus on Europe,” Collier added.
Google, and un-named partners, have spotted North Korean IT workers “seeking employment in Germany and Portugal” and also found “login credentials for user accounts of European job websites and human capital management platforms.”
Investigators also found “fabricated personas, including resumes listing degrees from Belgrade University in Serbia and residences in Slovakia, as well as instructions for navigating European job sites.”
“One document provided specific guidance on seeking employment in Serbia, including the use of a Serbian time zone during communications.
Info on how to acquire false passports was also found. presumably so the fake techies can provide credentials that allow them to establish a right to work or open bank accounts.
The North Korean operatives sought work on platforms including Upwork, Telegram, and Freelancer. Some sought payment in cryptocurrency, or through services like TransferWise and Payoneer.
Google also thinks its found evidence of sophisticated facilitators in the UK.
“One incident involved a DPRK IT worker using facilitators located in both the United States and the United Kingdom. Notably, a corporate laptop, ostensibly intended for use in New York, was found to be operational in London, indicating a complex logistical chain,” Collier wrote.
The Googler thinks the fake workers are now targeting companies that operate a Bring Your Own Device (BOYD) policy, because if they can use their own hardware it’s unlikely corporate management tools can touch it. BYOD also means employers don’t need to send workers a laptop, so there’s no postal address that investigators can use to start probing a worker if things go pear-shaped.
Google thinks investigations will be needed, because it’s also seen North Korean fakers increasingly targeting larger employers and more often attempting extortion.
“In these incidents, recently fired IT workers threatened to release their former employers’ sensitive data or to provide it to a competitor. This data included proprietary data and source code for internal projects,” Collier wrote, before suggesting the increase in extortion attempts may be linked to increased US action against fake workers that make them desperate to maintain their ill-gotten revenues.
Avoiding this scam isn’t easy, because the perps are sophisticated, but the FBI has issued guidance about how to spot fake North Korean techies. Telltale signs include evading in-person meetings, changing preferred payment methods on freelance work platforms, and online profiles that don’t include an image. ®