

Back in July 2024, cybersecurity vendor KnowBe4 began to observe suspicious activity linked to a new hire. The individual began manipulating and transferring potentially harmful files, and tried to execute unauthorized software. He was subsequently found out to be a North Korean worker who had tricked the firm’s HR team into gaining remote employment with the firm. In all, the individual managed to pass four video conference interviews as well as a background and pre-hiring check.
The incident underscores that no organization is immune from the risk of inadvertently hiring a saboteur. Identity-based threats aren’t limited to stolen passwords or account takeovers, but extend to the very people joining your workforce. As AI gets better at faking reality, it’s time to improve your hiring processes.
The scale of the challenge
You might be surprised at just how widespread this threat is. It’s been ongoing since at least April 2017, according to an FBI wanted poster. Tracked as WageMole by ESET Research, the activity overlaps with groups labelled UNC5267 and Jasper Sleet by other researchers. According to Microsoft, the US government has uncovered more than 300 companies, including some in the Fortune 500, that have been victimized in this way between 2020 and 2022 alone, The tech firm was forced in June to suspend 3,000 Outlook and Hotmail accounts created by North Korean jobseekers.
Separately, a US indictment charged two North Koreans and three “facilitators” with making over $860,000 from 10 of 60+ companies they worked at. But it’s not just a US problem. ESET researchers warned that the focus has recently shifted to Europe, including France, Poland and Ukraine. Meanwhile, Google has warned that UK companies are also being targeted.
How do they do it?
Thousands of North Korean workers may have found employment in this way. They create or steal identities matching the location of the targeted organization, and then open email accounts, social media profiles and fake accounts on developer platforms like GitHub to add legitimacy. During the hiring process, they may use deepfake images and video, or face swapping and voice changing software, to disguise their identity or create synthetic ones.
According to ESET researchers, the WageMole group is linked to another North Korean campaign it tracks as DeceptiveDevelopment. This is focused on tricking Western developers into applying for non-existent jobs. The scammers request that their victims participate in a coding challenge or pre-interview task. But the project they download to take part actually contains trojanized code. WageMole steals these developer identities to use in its fake worker schemes.
The key to the scam lies with the foreign facilitators. First, they help to:
Once the fake worker has been hired, these individuals take delivery of the corporate laptop and set it up in a laptop farm located in the hiring firm’s country. The North Korean IT worker then uses VPNs, proxy services, remote monitoring and management (RMM) and/or virtual private servers (VPS) to hide their true location.
The impact on duped organizations could be massive. Not only are they unwittingly paying workers from a heavily sanctioned country, but these same employees often get privileged access to critical systems. That’s an open invitation to steal sensitive data or even hold the company to ransom.
How to spot – and stop – them
Unknowingly funding a pariah state’s nuclear ambitions is almost as bad as it gets in terms of reputational damage, not to mention the financial exposure to breach risk that compromise entails. So how can your organization avoid becoming the next victim?
1. Identify fake workers during the hiring process
2. Monitor employees for potentially suspicious activity
3. Contain the threat
When the dust has settled, it’s also a good idea to update your cybersecurity awareness training programs. And ensure that all employees, especially IT hiring managers and HR staff, understand some of the red flags to watch out for in future. Threat actor tactics, techniques and procedures (TTPs) are evolving all the time, so this advice will also need to change periodically.
The best approaches to stop fake candidates becoming malicious insiders combine human know-how and technical controls. Make sure you cover all bases.