Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Microsoft Graph CLI to be retired

      September 2, 2025

      The state of DevOps and AI: Not just hype

      September 1, 2025

      A Breeze Of Inspiration In September (2025 Wallpapers Edition)

      August 31, 2025

      10 Top Generative AI Development Companies for Enterprise Node.js Projects

      August 30, 2025

      I asked AI to modify mission-critical code, and what happened next haunts me

      September 3, 2025

      Why you should delete your browser extensions right now – or do this to stay safe

      September 3, 2025

      Dolby Vision 2 comes with big upgrades – here’s which TVs get them first

      September 3, 2025

      This one small feature makes this travel charger my favorite for business trips

      September 3, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Laracon AU 2025 Talk Titles Revealed

      September 3, 2025
      Recent

      Laracon AU 2025 Talk Titles Revealed

      September 3, 2025

      Stop Writing Bad Controllers: Laravel Custom Collections Transform Your Code

      September 3, 2025

      Handle ownership relationships between Eloquent models with Laravel Ownable

      September 3, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Lenovo Legion Go 2 confirmed with Ryzen Z2 Extreme, 1200p OLED 144Hz display & 74Wh battery

      September 2, 2025
      Recent

      Lenovo Legion Go 2 confirmed with Ryzen Z2 Extreme, 1200p OLED 144Hz display & 74Wh battery

      September 2, 2025

      How to Open Ports in Firewall on Windows Server

      September 2, 2025

      Google TV Remote Not Working? 5 Quick Fixes

      September 2, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»US, Japan, South Korea Meet Private Partners to Combat North Korea’s IT Work Fraud Scheme

    US, Japan, South Korea Meet Private Partners to Combat North Korea’s IT Work Fraud Scheme

    August 29, 2025

    IT Work Fraud, Job Fraud, North Korean IT Workers, IT Workers Fraud

    The U.S. State Department in collaboration with Japan, South Korea, and private cybersecurity partners met in Tokyo, last week, to draw plans for combating North Korea’s side hustle of infiltrating companies through fake IT workers – popularly known as their “IT work fraud scheme.” The coalition will take on the DPRK’s expanding cyber-fraud pipeline, which has already funneled millions of dollars into Pyongyang’s weapons program.

    At the Tokyo forum, diplomats and tech leaders from the three nations met with platforms, freelance job sites, crypto services, and AI firms to strategize countermeasures against a network that had masked North Korean nationals as skilled freelancers. The initiative aims to protect businesses and curtail a major revenue stream for the DPRK’s illicit weapons programs.

    Deception Fuels Regime Revenue

    North Korea’s fraud began as a covert job recruitment pipeline. The cybercriminal ring, as reported earlier, conned U.S. companies into hiring North Korean IT workers using forged or stolen identities. They set up “laptop farms” in the U.S., operated by intermediaries like an Arizona-based woman, to make it appear that work was performed from U.S. soil. The scheme generated at least $6.8 million between 2020 and 2023. These funds were channeled through Chinese banks and used to subsidize the regime’s weapons development.

    Read: US Charged North Korean Job Fraud Nexus Amassing Funds for Nuclear Program

    In some cases, as noted in a follow-up report, the scheme ensnared hundreds of U.S. firms and relied on over 300 stolen identities. These identities served as a cover, enabling North Koreans to penetrate networks with high-value credentials, all while evading sanctions.

    Security awareness firm KnowBe4 also fell victim to one such instance. A North Korean “employee” slipped into its AI engineering stream using an AI-enhanced, stolen U.S. identity. The moment their laptop began loading malware, internal tools alerted the SOC, halting the breach. A tell-tale of how even security firms can fall prey.

    Read: KnowBe4 Uncovers Fake Employee: How a North Korean Hacker Was Hired into the Team

    Building Collective Defense

    The Tokyo forum brought together over 130 stakeholders including government agencies, freelance platforms, payment services, cryptocurrency exchanges, and AI startups. Representatives shared intelligence and best practices to identify, block and prevent fraudulent North Korean IT employment — especially where infiltration can lead to access to sensitive data, reputational damage, or future cyberattacks.

    “North Korean state-directed IT workers generate revenue for North Korea’s weapons of mass destruction (WMD) and ballistic missile programs, violating U.S. sanctions and multiple UN Security Council resolutions.  Engaging with these workers exposes companies to theft of sensitive data and assets, reputational harm and legal consequences, as well as increased risk of targeting by malicious North Korean cyber actors.” – U.S. Department of State

    Japan, South Korea, and the U.S. have coordinated against the threat since 2022. The initiative now extends its reach, including crypto and fintech platforms — sectors where North Korea has previously harvested hundreds of millions of dollars in ill-gotten gains from entities like DMM Bitcoin, Upbit, and WazirX.

    Read: Indian Crypto Exchange WazirX Faces Uncertain Future After Cyberattack

    Mandiant will play a leading role in the operational effort. Its responsibilities include helping governments analyze the behaviors of fraudulent IT worker networks and enabling providers to implement intelligent red flags and detection rules. Though not disclosed publicly, these likely span AI-based identity vetting, anomalies in IP usage, credential-sharing patterns, and cross-border payment flows.

    This initiative represents a turning of the tide. North Korea’s job fraud scheme — once low-profile and opportunistic — has evolved into a refined mechanism for sanctions evasion and regime funding.

    Even companies that believed they were operating above suspicion have been targeted — as evidenced by KnowBe4’s compromise. That’s why the Tokyo forum’s multi-industry scope is essential. Platforms facilitating remote hiring, financial transactions, or identity validation all have a role to play.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleMalicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials
    Next Article Chinese State Hackers Target Global Critical Infrastructure, NSA Warns

    Related Posts

    Development

    Laracon AU 2025 Talk Titles Revealed

    September 3, 2025
    Development

    Stop Writing Bad Controllers: Laravel Custom Collections Transform Your Code

    September 3, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Mark Zuckerberg says Meta is developing AI friends to beat “the loneliness epidemic” — after Bill Gates claimed AI will replace humans for most things

    News & Updates

    CVE-2025-5407 – “Chaitak-Gorai Blogbook Cross-Site Scripting Vulnerability”

    Common Vulnerabilities and Exposures (CVEs)

    Kong AI Gateway 3.11 introduces new method for reducing token costs

    Tech & Work

    CVE-2025-23172 – “Versa Networks Director Webhook Command Execution”

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    Development

    Key Metrics That Can Make or Break Your Startup

    August 7, 2025

    If you’ve built something worth pitching – something more than a fancy hobby with a…

    CVE-2025-49826 – Next.js Cache Poisoning DoS Vulnerability

    July 3, 2025

    Google wraps up Beta testing for Android 16 with Beta 4. Here’s What You Can Expect

    April 20, 2025

    Android Spyware Disguised as Alpine Quest App Targets Russian Military Devices

    April 23, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.