News: 1773842227

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

North Korea's 100,000-strong fake IT worker army rake in $500M a year for Kim Jong Un

(2026/03/18)


Researchers at IBM X‑Force and Flare Research have uncovered data that sheds light on how North Korea's fake IT worker schemes operate and infiltrate companies in order to funnel money back to the regime and steal sensitive information.

In a [1]published report , "Inside the North Korean infiltrator threat," the pair detail evidence of the top-level infrastructure used to manage the operations, how workers apply for and secure IT roles, and mitigation strategies businesses can use to avoid falling victim.

The threat of North Korean nationals [2]operating as remote IT contractors or full-time technology staff inside unsuspecting companies has come to light over the past several years, yet the report says security experts are only starting to realize the scale and sophistication of the operation.

[3]

It cites information from the US Government that these IT workers can earn more than $300,000 a year, and upwards of 100,000 North Koreans are spread across 40 countries generating approximately $500 million a year for Pyongyang.

[4]

[5]

The researchers found documents and spreadsheets revealing the roles within the fake IT worker ecosystem, comprising recruiters, facilitators, IT Workers and collaborators/brokers.

Recruiters are, like bona fide recruitment staff, responsible for screening potential IT staff and recording interviews. These are sent to facilitators who decide whether to accept or deny them for employment, much like a hiring manager.

[6]

However, it is unclear whether many candidates realize they are being recruited to work for the Norks. Recruiters may tell them the company they are applying to is an "early-stage stealth startup" with no published corporate information, often using the name "C Digital LLC."

Candidates are mentored in applying for employment at western-based companies and given a US-based identity to use.

Facilitators and IT workers are the most important roles within the system. These are expected to have experience in full stack web app development, .NET and Wordpress. Collaborators are Westerners that provide their identities for use in the IT worker fraud scheme, and may assist in other ways.

[7]

Timesheets found by the researchers detail hours worked on "Bids" and "Msg" by the fake workers, where "Bids" is how many bids in a day they made on freelancing sites such as Upwork, and Msg likely refers to how many messages or connections a worker made on UpWork, LinkedIn, or Freelancer.

The workers make use of fake identities to pursue work opportunities -counterfeit accounts or verified accounts linked to real individuals who may have unwillingly given the worker access.

Once employed in a full-time role, fake workers are often very successful, since they sometimes have multiple people helping them to produce their work, with the hope of getting a promotion and gaining more privileged access to the IT systems.

One of the most essential tools for North Korean IT workers is Google Translate, the report says. This is used in nearly every part of their online activity, including for translating job descriptions, creating applications and communicating with others as part of their work.

[8]Fake North Korean IT workers sneaking into healthcare, finance, and AI

[9]North Korea's Lazarus Group targets healthcare orgs with Medusa ransomware

[10]Ukrainian gets five years for helping North Koreans secure US tech jobs

[11]The one interview question that will protect you from North Korean fake workers

The report identifies some tools associated with fake workers, which companies can watch out for. One is known as OConnect and/or NetKey, - a known North Korean VPN - likely used to connect to internal networks in Pyongyang.

Also common is IP Messenger, or IPMsg, an open-source messaging application that does not require a central server, meaning it doesn't rely on centralized platforms operated by US companies such as Discord or Google.

The report outlines some mitigation strategies, including warning signs like fake backgrounds, AI face changers, or AI voice changers during online interviews. Employers should also watch for discrepancies between the candidate's resume and what they say in interviews, such as what languages they claim to speak and where they claim to reside.

Alternatively, there is a [12]killer interview question , as reported by The Register previously: ask them something like "How fat is Kim Jong Un?" and if they are a North Korean, they will terminate the call instantly. ®

Get our [13]Tech Resources



[1] https://flare.io/learn/resources/north-korean-infiltrator-threat

[2] https://www.theregister.com/2022/05/17/fbi_korea_freelancers/

[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2abraM5GeiW4Oa0YAJkENjwAAAlA&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44abraM5GeiW4Oa0YAJkENjwAAAlA&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33abraM5GeiW4Oa0YAJkENjwAAAlA&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[6] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44abraM5GeiW4Oa0YAJkENjwAAAlA&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[7] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33abraM5GeiW4Oa0YAJkENjwAAAlA&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[8] https://www.theregister.com/2025/09/30/north_korean_it_workers_okta/

[9] https://www.theregister.com/2026/02/24/north_koreas_lazarus_group_healthcare_medusa_ransomware/

[10] https://www.theregister.com/2026/02/20/north_korean_it_worker_prison/

[11] https://www.theregister.com/2025/04/29/north_korea_worker_interview_questions/

[12] https://www.theregister.com/2025/04/29/north_korea_worker_interview_questions/

[13] https://whitepapers.theregister.com/



Anonymous Coward

$500,000,000 / 100,000 workers == $5000 / worker / year == $417 / worker / month.

Guess now we know where the PHBs get all their quality.

AVR

"these IT workers can earn more than $300,000 a year, and upwards of 100,000 North Koreans are spread across 40 countries generating approximately $500 million a year"

Divide that out and you can see a ceiling on how many of these North Koreans are earning more than 300 grand in a year. It's not a lot.

KittenHuffer

The article does say that once one has secured a position many may be involved in doing the work. This makes them seem like an employee that should be promoted, giving access to more money and stealable information.

So it may be a $300K position, but that then has to be split across multiple Norks actually doing the work.

Idaho state law makes it illegal for a man to give his sweetheart
a box of candy weighing less than fifty pounds.