Close Menu
    Facebook LinkedIn YouTube Instagram X (Twitter)
    Blue Tech Wave Media
    Facebook LinkedIn YouTube Instagram X (Twitter)
    • Home
    • Leadership Alliance
    • Exclusives
    • Internet Governance
      • Regulation
      • Governance Bodies
      • Emerging Tech
    • IT Infrastructure
      • Networking
      • Cloud
      • Data Centres
    • Company Stories
      • Profiles
      • Startups
      • Tech Titans
      • Partner Content
    • Others
      • Fintech
        • Blockchain
        • Payments
        • Regulation
      • Tech Trends
        • AI
        • AR/VR
        • IoT
      • Video / Podcast
    Blue Tech Wave Media
    Home » North Korean hackers infiltrate firms as IT workers and recruiters
    Hacker-implements-attack
    Hacker-implements-attack
    Fintech

    North Korean hackers infiltrate firms as IT workers and recruiters

    By Tanee ShaoNovember 29, 2024No Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email
    • North Korean hackers are posing as job seekers and recruiters to infiltrate multinational companies, aiming to steal cryptocurrency and corporate secrets to fund the regime’s nuclear programme.
    • The rise of remote work has enabled hackers to create fake identities on platforms like LinkedIn and GitHub, gaining access to company laptops and working remotely without detection.

    What happened

    North Korean hackers are increasingly posing as job seekers, recruiters, and venture capitalists to infiltrate multinational companies, security researchers at Cyberwarcon 2024 in Washington, DC, have warned. Their goal is to fund North Korea’s nuclear programme by stealing cryptocurrency and corporate secrets.

    Over the past decade, these hackers have stolen billions of dollars in cryptocurrency. They use fake identities to secure jobs with companies worldwide. Two key hacker groups, “Ruby Sleet” and “Sapphire Sleet,” are behind attacks on aerospace, defence, and tech firms. These groups use social engineering tactics to trick victims into downloading malware, often disguised as tools for fixing virtual meetings or completing job assessments.

    The rise of remote work during the COVID-19 pandemic has provided new opportunities for hackers. North Korean operatives create fake profiles on LinkedIn and GitHub to gain access to company-issued laptops. Facilitators based in the US, Russia, and China set up the laptops, allowing hackers to work remotely without being detected. Microsoft’s James Elliott revealed that many companies, including KnowBe4, have unknowingly hired North Korean spies. While some firms have blocked attackers once discovered, others remain vulnerable. Researchers also pointed to the use of AI tools, including deepfakes, to make false identities appear more legitimate.

    Despite sanctions and increased scrutiny, North Korean hackers continue exploiting weaknesses in recruitment processes. Experts urge companies to strengthen vetting procedures and stay alert to increasingly sophisticated cyber threats.

    Also read: Pro-Russian hacker groups are launching cyberattacks on S Korea
    Also read: Chinese hackers target U.S. telecoms and steal confidential wiretap data

    Why it is important

    This issue is critical because North Korean hackers are exploiting vulnerabilities in global recruitment processes to fund the regime’s nuclear programme. By posing as job seekers or recruiters, they infiltrate companies and steal valuable cryptocurrency and corporate secrets. Over the past decade, these hackers have stolen billions of dollars, targeting sectors like aerospace, defence, and technology. The rise of remote work during the COVID-19 pandemic has further facilitated their operations, enabling them to work from locations such as the US, Russia, and China without detection. The use of AI tools, including deepfakes, makes it even harder to spot these false identities. As companies continue to hire these infiltrators unknowingly, they not only face financial losses but also risk exposing sensitive intellectual property. Strengthening employee vetting processes and increasing cybersecurity vigilance are now essential to preventing further exploitation of these tactics.

    hacker North Korean
    Tanee Shao

    Tanee Shao is an intern reporter at BTW Media, having studied at Kings College of London. She specialises in fintech. Contact her at t.shao@btw.media.

    Related Posts

    Could a public audit save AFRINIC from collapse?

    July 14, 2025

    What happens after you submit an IP request to AFRINIC

    July 14, 2025

    Interview with Ram Kumar, Cofounder of OpenLedger: Harnessing the $25M funding to shape the future of decentralized AI in China

    July 14, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    CATEGORIES
    Archives
    • July 2025
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023

    Blue Tech Wave (BTW.Media) is a future-facing tech media brand delivering sharp insights, trendspotting, and bold storytelling across digital, social, and video. We translate complexity into clarity—so you’re always ahead of the curve.

    BTW
    • About BTW
    • Contact Us
    • Join Our Team
    TERMS
    • Privacy Policy
    • Cookie Policy
    • Terms of Use
    Facebook X (Twitter) Instagram YouTube LinkedIn

    Type above and press Enter to search. Press Esc to cancel.