North Korean IT Worker Infiltrations Surge Amid GenAI Tactics

North Korean IT infiltrations cybersecurity employment fraud CrowdStrike report AI tactics remote work schemes
Edward Zhou
Edward Zhou

CEO & Co-Founder

 
October 2, 2025
4 min read

The North Korean IT worker scheme has seen a significant increase, with infiltrations rising by 220% over the past year. CrowdStrike, a cybersecurity firm, highlights that they now investigate about one incident daily related to North Korean software developers acquiring jobs under false pretenses.

North Korean leader Kim Jong-Un attending a meeting about the test of a hydrogen bomb.

Trained North Korean operatives are being hired by companies globally, utilizing fake or stolen identities. In the past year, they infiltrated over 320 companies. The CrowdStrike 2025 Threat Hunting Report reveals that these infiltrations are facilitated through automated processes that optimize fraud in obtaining tech jobs. The scheme is a response to the financial sanctions imposed on North Korea, allowing the regime to generate revenue for its weapons programs, with estimates ranging between $250 million and $600 million annually.

Employment Fraud Tactics

North Korean operatives, referred to as "Famous Chollima," employ generative AI to enhance their infiltration tactics. They create thousands of synthetic identities, alter photos, and develop tools to research job postings. During interviews, they utilize AI to disguise their appearance and refine their responses to technical challenges.

They also rely on AI to improve their fluency in English and to assist with daily work tasks, such as responding in chat applications and drafting emails. The report notes that real-time deepfake technology is likely being used to mask identities during video calls, significantly increasing the chances of being hired.

CrowdStrike reports that operatives actively search for AI face-swapping applications and subscribe to deepfake services to facilitate their operations.

Laptop Farms and Global Operations

The expansion of "laptop farms" beyond U.S. borders is notable. Following increased scrutiny from U.S. law enforcement, North Korean workers have begun establishing operations in Europe, especially in Romania and Poland. Adam Meyers from CrowdStrike states that North Korean workers are now securing jobs in these regions and utilizing laptops shipped to various locations for remote access to U.S. companies.

In a high-profile case, Christina Chapman, a former Arizona resident, was sentenced to 8.5 years in prison for running a laptop farm that enabled North Korean workers to secure 309 jobs and generate $17.1 million in revenue. Companies like Nike found themselves victims of this scheme as their systems were compromised.

Law Enforcement Actions

The U.S. Department of Justice has initiated coordinated actions against North Korean remote IT work schemes. Recent efforts involved charges, arrests, and the seizure of numerous financial accounts and fraudulent websites. These actions led to significant disruptions in the operations of North Korean IT workers.

In a notable indictment, Zhenxing Wang and others conspired to obtain remote IT work, generating over $5 million in revenue. The scheme involved compromising the identities of U.S. citizens to facilitate employment with U.S. companies.

The FBI has executed searches at various laptop farms and seized laptops and remote access devices. The ongoing investigations highlight the necessity for companies to tighten their hiring and security practices.

Protecting Against North Korean IT Worker Schemes

To mitigate the risks posed by North Korean IT workers, businesses are advised to implement strict identity verification processes. This includes scrutinizing identity documents for irregularities and verifying employment and educational backgrounds directly with institutions.

Companies should also mandate in-person meetings when possible and be wary of virtual interviews. It's crucial to capture images for future comparison and analyze payment methods for any suspicious patterns.

For businesses employing contracted IT workers, educational outreach to third-party vendors about these threats is essential. Building relationships with local FBI offices can also enhance collaboration in mitigating these risks.

Reports of North Korean IT worker activities can be made to local FBI field offices or through the FBI's Internet Crime Complaint Center.

Image of FBI warning

U.S. authorities continue to emphasize the importance of vigilance in hiring practices, as North Korean operatives adapt their tactics and seek new opportunities globally. The ongoing collaboration between law enforcement and businesses aims to prevent the exploitation of the vulnerabilities in the hiring processes that allow these schemes to thrive.

For more information on the actions taken against North Korean remote IT workers, refer to the various advisories and resources available through the Department of Justice and the FBI.

Edward Zhou
Edward Zhou

CEO & Co-Founder

 

CEO & Co-Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions.

Related News

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits
vulnerability exploits

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits

Vulnerability exploits now account for 40% of cyber intrusions, surpassing phishing. Learn how shrinking patch windows and edge device targets are changing security.

By Brandon Woo April 6, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026
cybersecurity trends 2026

Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026

Vulnerability exploits now drive 40% of cyberattacks as hackers weaponize flaws within hours. Learn why traditional patching is failing and how to adapt. Read more.

By Divyansh Ingle March 30, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions
Vulnerability Exploitation

Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions

Hackers are weaponizing zero-days within hours of disclosure, leaving traditional patch cycles in the dust. Learn how to bridge the security gap with MFA and Zero-Trust.

By Alan V Gutnov March 23, 2026 4 min read
common.read_full_article
Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends
vulnerability exploits

Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends

Exploits are the leading cause of cyber intrusions, outpacing phishing. Discover the latest trends and essential strategies to protect your organization. Read now!

By Brandon Woo March 16, 2026 3 min read
common.read_full_article