North Korea's Laptop Farm Remote Job Scam: The Hidden Threat in Your Hiring Process
The Billion-Dollar Deception Targeting Fortune 500 Companies
In January 2025, the U.S. Department of Justice delivered a sobering wake-up call to the business world: North Korean nationals Jin Sung-Il and Pak Jin-Song, along with three facilitators, were indicted for a fraudulent scheme to obtain remote information technology work with U.S. companies that generated revenue for the Democratic People's Republic of Korea. This wasn't an isolated incident—it's part of a massive, sophisticated operation that has infiltrated hundreds of Fortune 500 companies and generated hundreds of millions of dollars for North Korea's weapons programs.
Mandiant Consulting CTO Charles Carmakal revealed that "hundreds of Fortune 500 organizations have hired these North Korean IT workers," with "nearly every CISO that I've spoken to about the North Korean IT worker problem" admitting "they've hired at least one North Korean IT worker, if not a dozen or a few dozen." The scale is staggering: just one single group generated over $88 million in revenue for North Korea's weapons programs, operating undetected for over six years.
How the "Laptop Farm" Scam Works
The Perfect Digital Disguise
North Korea's IT worker scheme represents a new evolution in cybercrime—one that exploits the very foundation of remote work. The sophisticated scam involves North Korean IT workers running a covert operation where dozens of US-based laptops were remotely controlled using compromised identities, allowing them to pose as job seekers in the US tech sector while operating from abroad.
The process begins with identity theft. Starting in 2020, the operation exploited the identities of roughly 60 unsuspecting US citizens, with these stolen identities becoming the masks for North Korean IT workers seeking remote employment opportunities within the US. The sophistication extends to AI-enhanced applications: the picture used was AI "enhanced" and started out with stock photography, while HR teams conducted four video conference interviews confirming the individual matched the photo provided on their application.
The Laptop Farm Infrastructure
Central to this operation are U.S.-based "laptop farms"—locations where witting or unwitting Americans get paid menial fees to host the laptops, install remote access software and keep the lights on. FBI special agent Elizabeth Pelker noted that people running the U.S. laptop farms often don't know they are doing this on behalf of North Koreans, typically assuming they are running the laptops for businesses in China.
Once hired, the North Korean IT worker leverages "facilitators" to help obscure their identity, location, and intent by receiving company-issued devices and hosting them at an approved work location, installing remote administration tools onto the devices so the threat actor can access the network from another location undetected.
The Escalating Threat: From Wage Theft to Data Extortion
Evolution Beyond Simple Revenue Generation
What started as a scheme to generate steady income has evolved into something far more dangerous. Michael Barnhart from Mandiant noted that increased law enforcement pressure has resulted in "these threat actors becoming noticeably more aggressive in their tactics," with investigators "increasingly seeing North Korean IT workers infiltrating larger organizations to steal sensitive data and follow through on their extortion threats against these enterprises".
The FBI has observed North Korean IT workers leveraging unlawful access to company networks to exfiltrate proprietary and sensitive data, facilitate cyber-criminal activities, and conduct revenue-generating activity on behalf of the regime. After being discovered on company networks, North Korean IT workers have extorted victims by holding stolen proprietary data and code hostage until the companies meet ransom demands.
The Financial Impact
The numbers are staggering. The DPRK government withholds up to 90% of the wages earned by these overseas workers, thereby generating annual revenues of hundreds of millions of dollars for the Kim regime's weapons programs including weapons of mass destruction and ballistic missile programs. A thousand IT workers earning six-figure salaries that are funneled back to the North Korean government works out to $100 million a year, and many of these operatives are working multiple jobs at different organizations concurrently.
Red Flags: How to Spot North Korean IT Workers
Technical Indicators
CrowdStrike's counter-adversary team initially discovered DPRK activity in customers' environments when they noticed clusters of KVMs appearing on their platform—devices that enable a user to control multiple computers from a single console. Other technical warning signs include:
- Use of VPNs to mask geolocations
- Lagging internet connections from employees secretly working outside the U.S.
- Multiple logins into one account in a short period from various IP addresses, often associated with different countries
Behavioral Red Flags
DPRK operatives might frequently make excuses for missing meetings, especially with little notice, and might have background noise during calls because North Korean IT workers operate in teams, making it sound like an employee is working in a call center rather than a home office.
The new hire asks to get their workstation sent to an address that is basically an "IT mule laptop farm," then VPN in from where they really physically are (North Korea or over the border in China) and work the night shift so that they seem to be working in US daytime.
Interview Process Anomalies
One cybersecurity expert has developed an unconventional but effective screening method: "My favorite question is something to the effect of, 'How fat is Kim Jong Un?'" said Adam Meyers from CrowdStrike, adding that he's seen this question cause "quite a few" candidates to hang up on their interviewers because "it's not worth the heat for them to say something negative about the geo leader there".
Critical Prevention Strategies
Enhanced Hiring Protocols
Organizations should schedule screening calls using company-approved software and require candidates to be on camera, while checking applicant resumes for typos and unusual nomenclature and using "soft" interview questions to ask applicants for specific details about their location or education background.
Companies should review each applicant's communication accounts as North Korean IT workers have reused phone numbers (particularly voice-over-IP numbers) and email addresses on multiple resumes purportedly belonging to different applicants.
Technical Security Measures
Organizations should monitor and restrict the use of IP-based KVM devices, which have been frequently used by North Korean IT workers to maintain persistent remote access to corporate devices, and implement behavioral analytics and user activity monitoring tools.
Companies should practice the Principle of Least Privilege on networks, including disabling local administrator accounts and limiting privileges for installing remote desktop applications, while monitoring and investigating unusual network traffic.
Identity Verification
Organizations should engage specialized firms that offer identity document verification services to mitigate the risks associated with manipulated identification documents, as these firms are equipped with tools and expertise to detect inconsistencies and signs of tampering in documents.
Global Expansion and Chinese Support Network
International Scope
The threat extends far beyond U.S. borders. North Korea's strategy of infiltrating remote jobs is not limited to the US; the country's IT workers have expanded their operations to target companies in the UK and Europe as well, with more aggressive tactics being deployed in these regions, including threatening to leak proprietary information if their contracts are terminated.
Chinese Infrastructure
Strider Technologies identified 35 China-based companies linked to North Korean IT worker operations, which are strongly believed to be affiliated with Liaoning China Trade Industry Co., a U.S.-sanctioned company that has shipped IT equipment to a North Korean government agency.
Government Response and Legal Consequences
Recent Enforcement Actions
The U.S. government has intensified its response. In December 2024, 14 DPRK nationals were indicted for long-running conspiracies to violate U.S. sanctions and commit wire fraud, money laundering, and identity theft, with conspirators generating at least $88 million throughout the approximately six-year conspiracy.
The U.S. Treasury Department announced sanctions against two individuals and four entities allegedly involved in generating revenue for North Korea through illicit remote IT workforce operations, with the North Korean government taking up to 90% of earnings from this labor.
Compliance Implications
Employers should be cognizant of the consequences of directly or indirectly providing aid or money to the DPRK, as a sanctioned entity listed on the Office of Foreign Asset Control Specially Designated Nationals and Blocked Persons list.
Lessons from Real-World Cases
The KnowBe4 Incident
KnowBe4's experience provides a sobering example: they needed a software engineer, posted the job, conducted interviews, performed background checks, verified references, and hired someone who immediately started loading malware the moment their Mac workstation was received.
The incident revealed that no AI was used in the interview process—only the picture provided for the employee HRIS system was modified, with the person who was 'on-video' during interviews being of Asian descent and speaking very good English with an Asian accent.
The Bottom Line: A New Reality for Remote Hiring
The North Korean laptop farm scam represents a fundamental shift in cybersecurity threats—one that exploits the trust and convenience of remote work. As one expert noted, "If you're hiring contract workers, you either are interviewing or have already hired a North Korean".
Organizations must recognize that traditional hiring practices are insufficient against this sophisticated threat. The combination of stolen identities, AI-enhanced applications, and professional-grade infrastructure makes these operations extremely difficult to detect without proper security measures.
Key Takeaways:
- Scale: Hundreds of Fortune 500 companies have been infiltrated
- Evolution: The threat has moved from wage theft to data extortion and ransomware
- Sophistication: Operations use professional infrastructure, stolen identities, and AI enhancement
- Financial Impact: Hundreds of millions in revenue for North Korea's weapons programs
- Global Reach: Expanding beyond the U.S. to target companies worldwide
The message is clear: in today's remote work environment, robust identity verification, enhanced technical monitoring, and security-aware hiring practices aren't optional—they're essential for protecting your organization from this evolving threat.
Organizations should consult with cybersecurity professionals and legal counsel to develop comprehensive strategies for detecting and preventing North Korean IT worker infiltration while ensuring compliance with employment laws and sanctions regulations.