North Korean Hackers Use Fake Remote Jobs to Steal Identities

  • A joint investigation uncovered a North Korean infiltration scheme using remote IT workers linked to the Lazarus Group’s Famous Chollima division.
  • Researchers observed operators live through virtual Sandbox machines simulating real developer laptops.
  • The attackers use AI-based tools and identity takeover tactics rather than deploying Malware.
  • The operation exploits remote hiring to gain access to sensitive sectors such as finance and healthcare.
  • Companies are cautioned to raise awareness of suspicious remote hiring activities to prevent internal compromises.

A collaborative investigation led by Mauro Eldritch, founder of BCA LTD, along with NorthScan and ANY.RUN, revealed an extensive infiltration campaign by North Korea. The scheme involves remote IT workers connected to the Lazarus Group’s Famous Chollima division targeting Western companies mainly in finance, crypto, healthcare, and engineering, as stated in the findings released on December 2, 2025.

- Advertisement -

Investigators created a false developer identity and engaged with a recruiter using the alias “Aaron” or “Blaze,” impersonating a U.S. developer. The recruiter attempted to employ the fake candidate as a frontman to enable North Korean operatives access remotely. The process included stealing or borrowing identities, passing interviews using AI assistance, working through the victim’s laptop, and funneling salaries back to North Korea.

Instead of providing real laptops, the investigation deployed the ANY.RUN Sandbox, a virtual machine simulating active personal workstations with developer tools and U.S.-based proxy routing. This allowed the team to monitor operators live, control system crashes, and record activities covertly.

Inside these controlled environments, operators used a minimal but effective range of tools focusing on identity theft and remote access. The toolkit included AI-driven job automation tools such as Simplify Copilot and AiApply for auto-filling applications and generating interview responses. They also used browser-based one-time password (OTP) generators like OTP.ee and Authenticator.cc to bypass two-factor authentication after collecting personal documents. Persistent access was maintained through Google Remote Desktop configured with a fixed PIN via PowerShell commands. Routine system reconnaissance commands were executed to verify hardware legitimacy. Connections were consistently routed through Astrill VPN, a known Lazarus Group infrastructure.

In one instance, an operator left a Notepad message requesting sensitive details such as identification, social security numbers, and bank information, demonstrating the operation’s focus on full identity and workstation takeover without malware deployment.

- Advertisement -

This investigation highlights a growing threat vector through remote hiring. Attackers may gain entry via targeted interview requests, risking broad access to sensitive company data and managerial accounts. Raising employee awareness and providing channels for verifying suspicious activities can prevent infiltration and subsequent internal damage.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Stablecoin Pegs at Risk From Market, Tech

New research from MIT warns stablecoins could depeg during market stress due to underlying...

Solo Miner Spends $75, Wins $200K Bitcoin Block Reward

A solo Bitcoin miner rented $75 of mining power from Braiins and earned a...

Citron shorts SanDisk, citing market woes

Citron Research announced a short position against Sandisk Corp. (SNDK), sending its shares down...

Fundstrat’s Tom Lee Loses Over FTX-Sized $8.8B on ETH

Fundstrat founder Tom Lee, via his treasury company Bitmine Immersion Technologies, has incurred $8.8...

WisdomTree launches round-the-clock tokenized fund trading

WisdomTree has launched the first registered tokenized mutual fund in the U.S. to offer...

Must Read

9 Best Books On Ethereum And Blockchain Technology

QUICK LINKSHow to Choose Your First Blockchain Book: A Simple Framework1. Define Your Goal: Are you looking to Build, Invest, or Understand?2. Assess Your...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!