Tuesday, September 23, 2025
  • Login
Forbes 40under40
  • Home
  • Technology
  • Innovation
  • Real Estate
  • Leadership
  • Money
  • Lifestyle
No Result
View All Result
  • Home
  • Technology
  • Innovation
  • Real Estate
  • Leadership
  • Money
  • Lifestyle
No Result
View All Result
Forbes 40under40
No Result
View All Result
Home Innovation

North Korean Hackers Disguised as IT Workers Targeting UK, European Companies

by Riah Marton
in Innovation
North Korean Hackers Disguised as IT Workers Targeting UK, European Companies
Share on FacebookShare on Twitter


North Korean hackers who disguise themselves as IT workers are applying for work in the U.K., according to Google Threat Intelligence Group. Success in the U.S. is declining due to rising awareness of their tactics, indictments, and right-to-work verification challenges, prompting them to turn elsewhere.

The attackers pose as legitimate remote workers, looking to generate revenue, access sensitive company data, or perform espionage operations through employment. Researchers observed them seeking out login credentials for job sites and human capital management platforms.

“Europe needs to wake up fast,” Jamie Collier, Lead Threat Intelligence Advisor, Europe, Google Threat Intelligence Group, told TechRepublic in an email. “Despite being in the crosshairs of IT worker operations, too many perceive this as a U.S. problem. North Korea’s recent shifts likely stem from U.S. operational hurdles, showing IT workers’ agility and ability to adapt to changing circumstances.”

SEE: UK Cyber Risks Are ‘Widely Underestimated,’ Warns Country’s Security Chief

Hackers are targeting larger organisations and new territories

Activity has increased since late October, according to Google, with attackers from the Democratic People’s Republic of Korea targeting larger organisations and new territories. It’s not just the U.K., either, as researchers have discovered evidence of a rise in activity in Germany, Portugal, Serbia, and elsewhere in Europe.

Google’s researchers uncovered a fake CV listing degrees from Belgrade University in Serbia and fabricated residential addresses in Slovakia. Additionally, they found detailed instructions on how to navigate European job sites and secure employment in Serbia, including using the Serbian time zone for communication, as well as a broker facilitating the creation of fake passports.

More aggressive tactics stem from desperation

The North Korean IT workers are also using more aggressive tactics, such as moving operations within corporate virtualised infrastructure and threatening to release proprietary corporate data after being fired unless a ransom is paid.

The researchers link this to desperation to maintain their revenue stream while law enforcement cracks down on their operations in the US. While workers once avoided burning bridges with employers after termination in the hope of being rehired, they now likely believe their dismissal stems from being caught, prompting them to threaten employers instead.

“A decade of diverse cyberattacks precedes North Korea’s latest surge — from SWIFT targeting and ransomware, to cryptocurrency theft and supply chain compromise,” Collier told TechRepublic. “This relentless innovation demonstrates a longstanding commitment to fund the regime through cyber operations.”

How the North Korean IT worker operations work

Targeted industries include defence and government sectors, with the fake workers “providing fabricated references, building a rapport with job recruiters, and using additional personas they controlled to vouch for their credibility.” They are recruited through online platforms including Upwork, Telegram, and Freelancer.

North Korean workers pretend to be from a diverse set of countries, including Italy, Japan, Malaysia, Singapore, Ukraine, the U.S., and Vietnam, using a combination of stolen personal details from real individuals and fabricated information. They have even been known to use AI to generate profile photos, create deepfakes for video interviews, and translate communications into target languages using AI writing tools.

In exchange for employment, the North Korean infiltrators offer services in the development of web solutions, such as job marketplaces, bots, content management systems, blockchain, and AI apps, indicating a broad range of expertise. Payment is made in cryptocurrency and through cross-border transfer platforms like Payoneer and TransferWise, helping to obscure its origin and destination.

The IT workers use certain “facilitators” to aid them in their pursuits. These are individuals or entities based in the target territories that help them find jobs, bypass verification checks, and receive funds fraudulently. The Google team has found evidence of facilitators in both the U.S. and U.K., locating a corporate laptop from New York that was operational in London.

Must-read security coverage

Bring Your Own Device environments are making life easier for the workers

Many businesses with distributed workforces implement Bring Your Own Device policies, where employees can use their personal devices for work. The Google team believes that, since January, the North Korean IT workers have been identifying these companies as prime targets to gain employment.

SEE: BYOD and Personal Apps: A Recipe for Data Breaches

A company-owned device will likely be rife with security features, such as activity monitoring, and can be traced back to its user by the address the company shipped it to and its endpoint software inventories. Therefore, the attacker will be more likely to evade detection by using their own laptop to access internal systems through their employer’s virtual machines.

Tags: Companiescyber securityCybersecuritydisguisedemeaEspionageEuropeEuropeanHackersit industryKoreanNorthnorth koreaSecurityTargetingUKWorkers
Riah Marton

Riah Marton

I'm Riah Marton, a dynamic journalist for Forbes40under40. I specialize in profiling emerging leaders and innovators, bringing their stories to life with compelling storytelling and keen analysis. I am dedicated to spotlighting tomorrow's influential figures.

Next Post
TikTok must find non-Chinese owner by Saturday to avert US ban

TikTok must find non-Chinese owner by Saturday to avert US ban

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Forbes 40under40 stands as a distinguished platform revered for its commitment to honoring and applauding the remarkable achievements of exceptional individuals who have yet to reach the age of 40. This esteemed initiative serves as a beacon of inspiration, spotlighting trailblazers across various industries and domains, showcasing their innovation, leadership, and impact on a global scale.

 
 
 
 

NEWS

  • Forbes Magazine
  • Technology
  • Innovation
  • Money
  • Leadership
  • Real Estate
  • Lifestyle
Instagram Facebook Youtube

© 2025 Forbes 40under40. All Rights Reserved.

  • About Us
  • Advertise
  • Contact Us
No Result
View All Result
  • Home
  • Technology
  • Innovation
  • Real Estate
  • Leadership
  • Money
  • Lifestyle

© 2024 Forbes 40under40. All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In