‘Fake workers’ from North Korea use AI to exploit European companies

by Marcus Liu - Business Editor
0 comments

North Korean Cyber Operatives Leverage AI to Infiltrate European Companies

A growing number of North Korean IT operatives are utilizing artificial intelligence (AI) to pose as legitimate workers, secure employment, and generate revenue for the Pyongyang regime, with indications the scheme is expanding beyond the United States and into Europe. This “fake worker” phenomenon, driven by Kim Jong Un’s government, represents a sophisticated, large-scale deception operation aimed at circumventing international sanctions and funding North Korea’s nuclear ambitions.

The Expanding Threat: From US to Europe

Between 2020 and 2024, North Korean operatives infiltrated more than 300 US companies, generating at least $6.8 million for the North Korean government, according to the Department of Justice figures. Recent reports suggest this activity is now spreading to Europe, with “laptop farms” identified in the UK. Jamie Collier, lead advisor in Europe at Google Threat Intelligence Group, noted that recruitment processes have not traditionally been viewed as a security risk, creating a vulnerability exploited by these operatives according to the Financial Times.

AI-Powered Deception

The sophistication of the scheme has been significantly enhanced by the use of AI. Operatives are now leveraging large language models (LLMs) to generate culturally appropriate names and email addresses, avoiding linguistic or cultural “red flags” that previously exposed such scams. AI is also used to create digital masks and deepfake video filters for remote job interviews, bolstering the credibility of false applicants. Alex Laurie, chief technology officer at cyber security firm Ping Identity, emphasized that the future of UK national security depends on the corporate sector’s ability to authenticate its workforce against this “persistent, AI-enhanced adversarial impact.”

Evolving Tactics: From AI Prompts to Facilitators

As companies tightened their online recruitment processes to detect AI-generated applications, North Korean operatives adapted by paying real people, known as “facilitators,” to participate in interviews online. This second stage of the scam often involves intercepting laptops sent to modern hires, then remotely accessing them to perform work – sometimes simultaneously holding multiple jobs. Rafe Pilling, director of threat intelligence at Sophos’ counter-threat unit, described it as a state-backed enterprise: “A mini army of North Koreans have been targeting high-salary, fully remote tech jobs. Framing themselves as talent with around seven to 10 years’ experience, getting jobs, drawing a salary — rinse and repeat.”

Industry Response and Mitigation

Amazon has reported stopping more than 1,800 suspected North Korean operatives from gaining employment since April 2024, with a particular focus on targeting AI and machine learning roles according to the Financial Times. Cyber security firm KnowBe4 has also acknowledged falling victim to a similar scam, where a fake worker attempted to load malware before being detected.

North Korea’s Cyber Program and Nuclear Ambitions

These cyberattacks are a key component of North Korea’s strategy to fund its weapons programs. According to the Center for Strategic and International Studies (CSIS), cyberattacks are directly fueling North Korea’s nuclear ambitions according to CSIS. The illicit revenue generated through these schemes provides a critical source of funding for the regime, allowing it to circumvent international sanctions and continue developing its nuclear capabilities.

Key Takeaways

  • North Korean cyber operatives are increasingly using AI to infiltrate companies in the US and Europe.
  • The scheme generates significant revenue for the Pyongyang regime, funding its nuclear program.
  • Operatives are adapting their tactics to overcome security measures, including using facilitators for interviews.
  • Companies need to strengthen their recruitment processes and workforce authentication measures.

Related Posts

Leave a Comment