Extortion
Data Theft
FBI warns of North Korean IT workers infiltrating U.S. firms to steal data and e...
The FBI has raised an alarming security warning about a growing cyber threat: North Korean IT workers infiltrating companies in the United States and around the world to steal sensitive data, extort firms, and exploit vulnerabilities in remote work infrastructures. These workers, often posing as legitimate employees, use sophisticated tactics to conceal their true identities, steal company source code, and demand ransoms to prevent the leaked data from becoming public.
### North Korean Cyber Workers
North Korea's state-sponsored hacking operations have long been a subject of concern for global cybersecurity experts. Over the past few years, however, the FBI and other international security agencies have been monitoring a concerning trend—North Korean IT professionals (referred to as "IT warriors") infiltrating organizations by securing remote IT positions. These workers typically apply for jobs in U.S.-based companies, often through third-party staffing agencies, and leverage various methods, such as AI-powered face-swapping technology, to hide their identities during interviews.
Once hired, these individuals gain access to corporate systems, where they can exfiltrate data, steal intellectual property, and compromise sensitive company information. The FBI’s warning emphasized that the stolen data is often used for extortion, with these workers threatening to publicly leak the information unless a ransom is paid.
The scale and sophistication of these attacks go beyond typical data breaches. According to the FBI, the IT workers are exploiting the very mechanisms of remote work, such as virtual desktop infrastructures (VDI) and cloud services, which are becoming increasingly popular with companies. These tools, while designed to facilitate flexible working environments, inadvertently open doors for attackers to infiltrate networks with little detection.
North Korean IT workers often work in large teams, accessing enterprise networks via U.S.-based “laptop farms”—remote access systems that appear to be legitimate workstations but are, in fact, operated by these threat actors. The FBI's advisory pointed out that these workers frequently use multiple IP addresses within short timeframes to access the same company accounts, making it harder to track their activities and raise alarms.
The scale of this problem is significant. The FBI revealed that North Korean operatives have infiltrated at least 64 U.S. companies from April 2018 to August 2024. This long-term, coordinated effort highlights the persistence of these attacks and the sophistication with which North Korea’s IT army operates.
### Exfiltration & Extortion Tactics
Once infiltrated, North Korean IT workers often target proprietary data, including source code and software repositories. The FBI identified that these operatives have copied sensitive company code repositories, such as GitHub profiles, into their personal cloud accounts, leaving companies vulnerable to large-scale theft. This is especially concerning for tech firms, whose intellectual property is central to their business model.
But the threat doesn’t stop at data theft. North Korean IT workers have also been accused of using insider knowledge to extort their former employers. After being discovered and dismissed, these operatives leverage the data they exfiltrated to threaten companies with the public release of confidential or damaging information unless a ransom is paid. These extortion attempts are becoming more frequent, with firms being blackmailed into complying to avoid reputation damage.
“The extent to which North Korean IT workers are infiltrating organizations is increasingly troubling. Not only are they stealing valuable intellectual property, but they are also turning the stolen data into a weapon, holding companies hostage to their ransom demands,” said Michael Barnhart, a principal analyst at Mandiant.
### Protecting Against the Threat: FBI's Guidelines
To mitigate these risks, the FBI has outlined a series of best practices for organizations to follow. Central to these recommendations is the application of the principle of least privilege—ensuring that employees and contractors only have access to the data and systems necessary for their work. This includes disabling local administrator accounts, limiting the permissions for remote desktop applications, and implementing strong network monitoring systems to detect abnormal access patterns.
The FBI also advised organizations to regularly review network logs, looking for signs of data exfiltration, particularly from shared drives, cloud accounts, or code repositories. It also emphasized the need for robust hiring practices, including thorough identity verification during the interview and onboarding processes.
“The key to preventing these attacks is to scrutinize every aspect of the hiring process, especially for remote positions,” the FBI advisory noted. “Companies should cross-check resumes, verify educational claims, and ensure that applicants’ identities are genuine.”
### Hiring Protocols
With North Korean IT workers using advanced techniques to falsify their identities, organizations must bolster their hiring protocols. One of the most critical steps in preventing infiltration is ensuring that third-party staffing firms are performing rigorous background checks on all applicants. Additionally, companies are urged to use “soft” interview questions to ask applicants about specific details regarding their educational background or location, as North Korean IT workers often claim to have attended non-U.S. educational institutions.
Another strategy involves keeping the hiring process as in-person as possible, especially for candidates who will be working remotely. While this can be challenging in a remote-first environment, companies can use video calls and other technologies to verify the authenticity of applicants.
### Beyond the U.S.
The problem is not confined to the United States. North Korean IT workers have infiltrated organizations worldwide, with significant concerns in South Korea and Japan. Both countries have issued warnings about the growing risk posed by these operatives. As the FBI’s advisory indicates, it’s not just companies in North America that are being targeted—North Korea is expanding its operations into Europe, where it is easier to deceive candidates who are unfamiliar with such sophisticated ploys.
The global nature of the threat is also underscored by the growing number of countries offering rewards for information that could help disrupt the activities of North Korean front companies. The U.S. State Department has placed a reward of up to $5 million for information leading to the arrest or disruption of North Korean cybercriminals.
### A Coordinated Global Effort
In response to this escalating threat, the United States has coordinated with its allies, including South Korea and Japan, to enhance cybersecurity intelligence sharing and collaborative defense strategies. These efforts aim to dismantle North Korea’s cyber infrastructure, which has been used to fund the regime’s activities through illicit remote IT work schemes.
The joint statement issued by the three countries last week revealed that North Korean state-sponsored hackers were responsible for stealing over $659 million in cryptocurrency in 2024 alone, further emphasizing the scale and reach of their operations.