North Korean's 100k fake IT workers net $500M a year for Kim

Published: (March 18, 2026 at 11:59 AM EDT)
3 min read

Source: Hacker News

Researchers at IBM X‑Force and Flare Research have uncovered data that sheds light on how North Korea’s fake IT worker schemes operate and infiltrate companies in order to funnel money back to the regime and steal sensitive information.

In a published report, Inside the North Korean infiltrator threat, the pair detail evidence of the top‑level infrastructure used to manage the operations, how workers apply for and secure IT roles, and mitigation strategies businesses can use to avoid falling victim.

The threat of North Korean nationals operating as remote IT contractors or full‑time technology staff inside unsuspecting companies has come to light over the past several years, yet the report says security experts are only starting to realize the scale and sophistication of the operation.

Scale of the Operation

  • US government data indicates these IT workers can earn more than $300,000 a year.
  • Over 100,000 North Koreans are spread across 40 countries, generating approximately $500 million a year for Pyongyang.

Fake IT Worker Ecosystem

Roles

RoleDescription
RecruitersScreen potential IT staff, record interviews, and forward candidates to facilitators. Often present the job as an “early‑stage stealth startup” (e.g., “C Digital LLC”).
FacilitatorsDecide whether to accept or deny candidates, similar to hiring managers.
IT WorkersPerform the actual development work. Expected to have experience in full‑stack web app development, .NET, and WordPress.
Collaborators / BrokersWestern individuals who provide real identities for use in the fraud scheme and may assist in other ways.

Process

  1. Mentoring & Identity Creation – Candidates receive a US‑based identity and guidance on applying to Western companies.
  2. Freelance Activity – Timesheets show hours logged on “Bids” (daily bids on platforms like Upwork) and “Msg” (messages or connections on Upwork, LinkedIn, Freelancer).
  3. Full‑time Employment – Once hired, workers may have multiple helpers to produce work, aiming for promotions and greater system access.

Tools

  • Google Translate – Used for translating job descriptions, creating applications, and communicating.
  • OConnect / NetKey – A known North Korean VPN, likely used to connect to internal networks in Pyongyang.
  • IP Messenger (IPMsg) – Open‑source messaging app that operates without a central server, avoiding reliance on platforms like Discord or Google.

Mitigation Strategies

  • Watch for warning signs: fake backgrounds, AI‑generated face or voice changes during online interviews.
  • Resume vs. Interview Discrepancies: Verify claimed language skills, residence, and work history.
  • Interview Question: Ask an absurd question such as “How fat is Kim Jong Un?” – a North Korean participant is likely to terminate the call immediately.

References

Report source: “Inside the North Korean infiltrator threat” (Flare Research).

0 views
Back to Blog

Related posts

Read more »

Ghostling

Ghostling is a demo project meant to highlight a minimum functional terminal built on the libghostty C API in a single C filehttps://github.com/ghostty-org/ghos...