FBI warns of North Korean hackers using VPNs to infiltrate businesses

Hacker silhouette working on a laptop with North Korean flag on the background
(Image credit: Getty Images)

VPN services, stolen identification documents and fake social media accounts: these are some of the methods North Korean hackers have been using to deceive US companies into hiring them as IT remote workers, the FBI warns.

Despite not being certain when such a campaign began, investigators believe thousands of IT freelancers from North Korea have been managing to get a job in US firms over the last 5 years, at least, by concealing their identities. Workers are believed to use this money to finance Kim Jong Un’s weapons, steal company secrets and plant malware.

Following the latest evidence, both US and South Korean authorities have updated their guidelines to help employers avoid hiring North Korean agents as freelance workers.    

FBI guidance on DPRK IT workers

"North Korea has flooded the global marketplace with ill-intentioned information technology workers," said Jay Greenberg, FBI agent in charge of the St. Louis Division—The Register reported.

As the latest effort to clamp down on North Korean hackers' activities, Greenberg's division managed to seize around $1.5 million and 17 web domain names used in the deceptive campaign as part of the investigation. However, workers linked to the Democratic People's Republic of Korea (SPRK) infiltrating companies is believed to still be ongoing.

"This scheme is so prevalent that companies must be vigilant to verify whom they're hiring," he said.

According to authorities, malicious North Korean IT workers have been using several techniques to deceive employers while concealing their real identity. Stolen or counterfeited identity documents were used for passing online identity checks with ease. Hackers are thought to have even paid US individuals to attend online interviews and video-conferences in their place.

On a more techy level, they use virtual private networks to spoof their IP address location and boost their anonymity. Alongside this, they might also create fake social media accounts and/or fake company websites to make them appear more legitimate.

"At a minimum, the FBI recommends that employers take additional proactive steps with remote IT workers to make it harder for bad actors to hide their identities," went on saying Greenberg.

As part of the new recommendations, authorities suggest to watch out for any suspicious behaviors. These include repeated requests for prepayment accompanied by threats to release proprietary source code, continuing refusal to appear on camera or to take drug tests, use of ever-changing freight addresses instead of their home addresses, and more.

The FBI also recommends employers to do a background check online to assess if the same identity is associated with multiple different profiles, while keeping records of all interactions with potential employees.

At an online security level, employers should always require their freelancers to turn off their private VPN when accessing company networks. Firm owners are also urged to put in place a strict zero-trust cybersecurity approach, which refrains from granting access to sensitive proprietary information to remote workers whenever possible.

It's also worth reminding that, despite the tech sector being the biggest target due to higher average salaries, it's just one of the fields among which North Korean hackers operate—John Hultquist, the head of threat intelligence at the cybersecurity firm Mandiant, told the Associated Press.

Greenberg said: "Without due diligence, companies risk losing money or being compromised by insider threats they unknowingly invited inside their systems."

Chiara Castro
News Editor (Tech Software)

Chiara is a multimedia journalist committed to covering stories to help promote the rights and denounce the abuses of the digital side of life – wherever cybersecurity, markets, and politics tangle up. She writes news, interviews, and analysis on data privacy, online censorship, digital rights, cybercrime, and security software, with a special focus on VPNs, for TechRadar and TechRadar Pro. Got a story, tip-off, or something tech-interesting to say? Reach out to chiara.castro@futurenet.com

Read more
Hacker silhouette working on a laptop with North Korean flag on the background
FBI claims North Korean workers are hacking the US companies which hired them
A hand reaching out to touch a futuristic rendering of an AI processor.
North Korean fake job hackers are going the extra mile to make sure their scams seem legit
Hacker silhouette working on a laptop with North Korean flag on the background
North Korean hackers are targeting LinkedIn jobseekers with new malware - here's how to stay safe
A digital representation of a lock
Looking for a new job? Watch out you don't fall for this new malware scam
North Korean flag with a hooded hacker
North Korean hackers are posing as software development recruiters to target freelancers
Hacker silhouette working on a laptop with North Korean flag on the background
North Korean Lazarus hackers are targeting nuclear workers
Latest in VPN Privacy & Security
Close up of PS5 DualSense controller leaning on a PS5
5 reasons your PS5 needs a VPN
Tor
What is Onion over VPN?
 In this photo illustration a Google Play logo seen displayed on a smartphone.
Why is there so much spyware hidden in the Play Store?
PrivadoVPN running on an iPhone during TechRadar's VPN tests
Why PrivadoVPN Free is still the best free VPN for streaming
Homepage of CloudFlare website on the display of PC, url - CloudFlare.com.
"Network blocking is never going to be the solution" – Cloudflare slams anti-piracy tactics
Panels at RightsCon 2025 during a press briefing about the latest Access Now report of internet shutdowns
2024 was the worst year on record for internet freedoms – again
Latest in News
Brad Pitt looks over his right shoulder with 'F1' written behind him
Apple Original Films will take you behind-the-scenes of a racing cockpit in this new thrilling F1 movie trailer
AI writer
Coding AI tells developer to write it himself
Reacher looking down at another character from the Prime Video TV series Reacher
Reacher season 3 becomes Prime Video’s biggest returning show thanks to Hollywood’s biggest heavyweight
Image showing detail of the Leica D-Lux 8
Still can't get a Fujifilm X100VI? This premium Leica compact costs less, and it's in stock
Man using iMessage on an iPhone
Apple will finally enable encrypted RCS messages between iOS and Android, and it's about time
Google Messages update
Google Messages could soon follow WhatsApp with an upgrade that makes it much easier to join group chats