North Korea's Laptop Farm Remote Job Scam: The Hidden Threat in Your Hiring Process

North Korea's Laptop Farm Remote Job Scam: The Hidden Threat in Your Hiring Process
Photo by Thomas Evans / Unsplash

The Billion-Dollar Deception Targeting Fortune 500 Companies

In January 2025, the U.S. Department of Justice delivered a sobering wake-up call to the business world: North Korean nationals Jin Sung-Il and Pak Jin-Song, along with three facilitators, were indicted for a fraudulent scheme to obtain remote information technology work with U.S. companies that generated revenue for the Democratic People's Republic of Korea. This wasn't an isolated incident—it's part of a massive, sophisticated operation that has infiltrated hundreds of Fortune 500 companies and generated hundreds of millions of dollars for North Korea's weapons programs.

Mandiant Consulting CTO Charles Carmakal revealed that "hundreds of Fortune 500 organizations have hired these North Korean IT workers," with "nearly every CISO that I've spoken to about the North Korean IT worker problem" admitting "they've hired at least one North Korean IT worker, if not a dozen or a few dozen." The scale is staggering: just one single group generated over $88 million in revenue for North Korea's weapons programs, operating undetected for over six years.

How the "Laptop Farm" Scam Works

The Perfect Digital Disguise

North Korea's IT worker scheme represents a new evolution in cybercrime—one that exploits the very foundation of remote work. The sophisticated scam involves North Korean IT workers running a covert operation where dozens of US-based laptops were remotely controlled using compromised identities, allowing them to pose as job seekers in the US tech sector while operating from abroad.

The process begins with identity theft. Starting in 2020, the operation exploited the identities of roughly 60 unsuspecting US citizens, with these stolen identities becoming the masks for North Korean IT workers seeking remote employment opportunities within the US. The sophistication extends to AI-enhanced applications: the picture used was AI "enhanced" and started out with stock photography, while HR teams conducted four video conference interviews confirming the individual matched the photo provided on their application.

The Laptop Farm Infrastructure

Central to this operation are U.S.-based "laptop farms"—locations where witting or unwitting Americans get paid menial fees to host the laptops, install remote access software and keep the lights on. FBI special agent Elizabeth Pelker noted that people running the U.S. laptop farms often don't know they are doing this on behalf of North Koreans, typically assuming they are running the laptops for businesses in China.

Once hired, the North Korean IT worker leverages "facilitators" to help obscure their identity, location, and intent by receiving company-issued devices and hosting them at an approved work location, installing remote administration tools onto the devices so the threat actor can access the network from another location undetected.

The Escalating Threat: From Wage Theft to Data Extortion

Evolution Beyond Simple Revenue Generation

What started as a scheme to generate steady income has evolved into something far more dangerous. Michael Barnhart from Mandiant noted that increased law enforcement pressure has resulted in "these threat actors becoming noticeably more aggressive in their tactics," with investigators "increasingly seeing North Korean IT workers infiltrating larger organizations to steal sensitive data and follow through on their extortion threats against these enterprises".

The FBI has observed North Korean IT workers leveraging unlawful access to company networks to exfiltrate proprietary and sensitive data, facilitate cyber-criminal activities, and conduct revenue-generating activity on behalf of the regime. After being discovered on company networks, North Korean IT workers have extorted victims by holding stolen proprietary data and code hostage until the companies meet ransom demands.

The Financial Impact

The numbers are staggering. The DPRK government withholds up to 90% of the wages earned by these overseas workers, thereby generating annual revenues of hundreds of millions of dollars for the Kim regime's weapons programs including weapons of mass destruction and ballistic missile programs. A thousand IT workers earning six-figure salaries that are funneled back to the North Korean government works out to $100 million a year, and many of these operatives are working multiple jobs at different organizations concurrently.

Red Flags: How to Spot North Korean IT Workers

Technical Indicators

CrowdStrike's counter-adversary team initially discovered DPRK activity in customers' environments when they noticed clusters of KVMs appearing on their platform—devices that enable a user to control multiple computers from a single console. Other technical warning signs include:

  • Use of VPNs to mask geolocations
  • Lagging internet connections from employees secretly working outside the U.S.
  • Multiple logins into one account in a short period from various IP addresses, often associated with different countries

Behavioral Red Flags

DPRK operatives might frequently make excuses for missing meetings, especially with little notice, and might have background noise during calls because North Korean IT workers operate in teams, making it sound like an employee is working in a call center rather than a home office.

The new hire asks to get their workstation sent to an address that is basically an "IT mule laptop farm," then VPN in from where they really physically are (North Korea or over the border in China) and work the night shift so that they seem to be working in US daytime.

Interview Process Anomalies

One cybersecurity expert has developed an unconventional but effective screening method: "My favorite question is something to the effect of, 'How fat is Kim Jong Un?'" said Adam Meyers from CrowdStrike, adding that he's seen this question cause "quite a few" candidates to hang up on their interviewers because "it's not worth the heat for them to say something negative about the geo leader there".

Critical Prevention Strategies

Enhanced Hiring Protocols

Organizations should schedule screening calls using company-approved software and require candidates to be on camera, while checking applicant resumes for typos and unusual nomenclature and using "soft" interview questions to ask applicants for specific details about their location or education background.

Companies should review each applicant's communication accounts as North Korean IT workers have reused phone numbers (particularly voice-over-IP numbers) and email addresses on multiple resumes purportedly belonging to different applicants.

Technical Security Measures

Organizations should monitor and restrict the use of IP-based KVM devices, which have been frequently used by North Korean IT workers to maintain persistent remote access to corporate devices, and implement behavioral analytics and user activity monitoring tools.

Companies should practice the Principle of Least Privilege on networks, including disabling local administrator accounts and limiting privileges for installing remote desktop applications, while monitoring and investigating unusual network traffic.

Identity Verification

Organizations should engage specialized firms that offer identity document verification services to mitigate the risks associated with manipulated identification documents, as these firms are equipped with tools and expertise to detect inconsistencies and signs of tampering in documents.

Global Expansion and Chinese Support Network

International Scope

The threat extends far beyond U.S. borders. North Korea's strategy of infiltrating remote jobs is not limited to the US; the country's IT workers have expanded their operations to target companies in the UK and Europe as well, with more aggressive tactics being deployed in these regions, including threatening to leak proprietary information if their contracts are terminated.

Chinese Infrastructure

Strider Technologies identified 35 China-based companies linked to North Korean IT worker operations, which are strongly believed to be affiliated with Liaoning China Trade Industry Co., a U.S.-sanctioned company that has shipped IT equipment to a North Korean government agency.

Recent Enforcement Actions

The U.S. government has intensified its response. In December 2024, 14 DPRK nationals were indicted for long-running conspiracies to violate U.S. sanctions and commit wire fraud, money laundering, and identity theft, with conspirators generating at least $88 million throughout the approximately six-year conspiracy.

The U.S. Treasury Department announced sanctions against two individuals and four entities allegedly involved in generating revenue for North Korea through illicit remote IT workforce operations, with the North Korean government taking up to 90% of earnings from this labor.

Compliance Implications

Employers should be cognizant of the consequences of directly or indirectly providing aid or money to the DPRK, as a sanctioned entity listed on the Office of Foreign Asset Control Specially Designated Nationals and Blocked Persons list.

Lessons from Real-World Cases

The KnowBe4 Incident

KnowBe4's experience provides a sobering example: they needed a software engineer, posted the job, conducted interviews, performed background checks, verified references, and hired someone who immediately started loading malware the moment their Mac workstation was received.

The incident revealed that no AI was used in the interview process—only the picture provided for the employee HRIS system was modified, with the person who was 'on-video' during interviews being of Asian descent and speaking very good English with an Asian accent.

The Bottom Line: A New Reality for Remote Hiring

The North Korean laptop farm scam represents a fundamental shift in cybersecurity threats—one that exploits the trust and convenience of remote work. As one expert noted, "If you're hiring contract workers, you either are interviewing or have already hired a North Korean".

Organizations must recognize that traditional hiring practices are insufficient against this sophisticated threat. The combination of stolen identities, AI-enhanced applications, and professional-grade infrastructure makes these operations extremely difficult to detect without proper security measures.

Key Takeaways:

  • Scale: Hundreds of Fortune 500 companies have been infiltrated
  • Evolution: The threat has moved from wage theft to data extortion and ransomware
  • Sophistication: Operations use professional infrastructure, stolen identities, and AI enhancement
  • Financial Impact: Hundreds of millions in revenue for North Korea's weapons programs
  • Global Reach: Expanding beyond the U.S. to target companies worldwide

The message is clear: in today's remote work environment, robust identity verification, enhanced technical monitoring, and security-aware hiring practices aren't optional—they're essential for protecting your organization from this evolving threat.

Organizations should consult with cybersecurity professionals and legal counsel to develop comprehensive strategies for detecting and preventing North Korean IT worker infiltration while ensuring compliance with employment laws and sanctions regulations.

Read more

The Complete Guide to Luxury & High-Net-Worth Privacy Protection: Elite Security for Ultra-Wealthy Individuals in 2025

The Complete Guide to Luxury & High-Net-Worth Privacy Protection: Elite Security for Ultra-Wealthy Individuals in 2025

Ultra-high-net-worth individuals face privacy and security challenges that most people cannot imagine. Your wealth, assets, and lifestyle create unique targeting opportunities for sophisticated threat actors ranging from organized criminal enterprises and corporate espionage teams to nation-state actors and specialized kidnapping syndicates. The same luxury assets and exclusive experiences that define

lock-1 By My Privacy Blog
The Complete Guide to Aviation Privacy Protection: Secure Your Private Aircraft Operations in 2025

The Complete Guide to Aviation Privacy Protection: Secure Your Private Aircraft Operations in 2025

Private aviation represents the ultimate in travel convenience and luxury, offering unprecedented freedom from commercial airline schedules, security lines, and public exposure. Yet this freedom comes with a hidden cost that most aircraft owners and operators never fully understand: comprehensive surveillance of your travel patterns, business relationships, and personal activities

lock-1 By My Privacy Blog
The Complete Guide to Influencer & Content Creator Privacy: Protect Your Digital Life While Building Your Brand in 2025

The Complete Guide to Influencer & Content Creator Privacy: Protect Your Digital Life While Building Your Brand in 2025

Content creation has democratized fame, allowing ordinary people to build audiences of millions and create substantial income through their online presence. Yet with this opportunity comes a dark reality that most creators never anticipate: the more successful you become, the more vulnerable you are to stalking, doxxing, account takeovers, and

lock-1 By My Privacy Blog