Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The state of DevOps and AI: Not just hype

      September 1, 2025

      A Breeze Of Inspiration In September (2025 Wallpapers Edition)

      August 31, 2025

      10 Top Generative AI Development Companies for Enterprise Node.js Projects

      August 30, 2025

      Prompting Is A Design Act: How To Brief, Guide And Iterate With AI

      August 29, 2025

      Look out, Meta Ray-Bans! These AI glasses just raised over $1M in pre-orders in 3 days

      September 2, 2025

      Samsung ‘Galaxy Glasses’ powered by Android XR are reportedly on track to be unveiled this month

      September 2, 2025

      The M4 iPad Pro is discounted $100 as a last-minute Labor Day deal

      September 2, 2025

      Distribution Release: Linux From Scratch 12.4

      September 1, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Enhanced Queue Job Control with Laravel’s ThrottlesExceptions failWhen() Method

      September 2, 2025
      Recent

      Enhanced Queue Job Control with Laravel’s ThrottlesExceptions failWhen() Method

      September 2, 2025

      August report 2025

      September 2, 2025

      Fake News Detection using Python Machine Learning (ML)

      September 1, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Installing Proxmox on a Raspberry Pi to run Virtual Machines on it

      September 2, 2025
      Recent

      Installing Proxmox on a Raspberry Pi to run Virtual Machines on it

      September 2, 2025

      Download Transcribe! for Windows

      September 1, 2025

      Microsoft Fixes CertificateServicesClient (CertEnroll) Error in Windows 11

      September 1, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»US, Japan, South Korea Meet Private Partners to Combat North Korea’s IT Work Fraud Scheme

    US, Japan, South Korea Meet Private Partners to Combat North Korea’s IT Work Fraud Scheme

    August 29, 2025

    IT Work Fraud, Job Fraud, North Korean IT Workers, IT Workers Fraud

    The U.S. State Department in collaboration with Japan, South Korea, and private cybersecurity partners met in Tokyo, last week, to draw plans for combating North Korea’s side hustle of infiltrating companies through fake IT workers – popularly known as their “IT work fraud scheme.” The coalition will take on the DPRK’s expanding cyber-fraud pipeline, which has already funneled millions of dollars into Pyongyang’s weapons program.

    At the Tokyo forum, diplomats and tech leaders from the three nations met with platforms, freelance job sites, crypto services, and AI firms to strategize countermeasures against a network that had masked North Korean nationals as skilled freelancers. The initiative aims to protect businesses and curtail a major revenue stream for the DPRK’s illicit weapons programs.

    Deception Fuels Regime Revenue

    North Korea’s fraud began as a covert job recruitment pipeline. The cybercriminal ring, as reported earlier, conned U.S. companies into hiring North Korean IT workers using forged or stolen identities. They set up “laptop farms” in the U.S., operated by intermediaries like an Arizona-based woman, to make it appear that work was performed from U.S. soil. The scheme generated at least $6.8 million between 2020 and 2023. These funds were channeled through Chinese banks and used to subsidize the regime’s weapons development.

    Read: US Charged North Korean Job Fraud Nexus Amassing Funds for Nuclear Program

    In some cases, as noted in a follow-up report, the scheme ensnared hundreds of U.S. firms and relied on over 300 stolen identities. These identities served as a cover, enabling North Koreans to penetrate networks with high-value credentials, all while evading sanctions.

    Security awareness firm KnowBe4 also fell victim to one such instance. A North Korean “employee” slipped into its AI engineering stream using an AI-enhanced, stolen U.S. identity. The moment their laptop began loading malware, internal tools alerted the SOC, halting the breach. A tell-tale of how even security firms can fall prey.

    Read: KnowBe4 Uncovers Fake Employee: How a North Korean Hacker Was Hired into the Team

    Building Collective Defense

    The Tokyo forum brought together over 130 stakeholders including government agencies, freelance platforms, payment services, cryptocurrency exchanges, and AI startups. Representatives shared intelligence and best practices to identify, block and prevent fraudulent North Korean IT employment — especially where infiltration can lead to access to sensitive data, reputational damage, or future cyberattacks.

    “North Korean state-directed IT workers generate revenue for North Korea’s weapons of mass destruction (WMD) and ballistic missile programs, violating U.S. sanctions and multiple UN Security Council resolutions.  Engaging with these workers exposes companies to theft of sensitive data and assets, reputational harm and legal consequences, as well as increased risk of targeting by malicious North Korean cyber actors.” – U.S. Department of State

    Japan, South Korea, and the U.S. have coordinated against the threat since 2022. The initiative now extends its reach, including crypto and fintech platforms — sectors where North Korea has previously harvested hundreds of millions of dollars in ill-gotten gains from entities like DMM Bitcoin, Upbit, and WazirX.

    Read: Indian Crypto Exchange WazirX Faces Uncertain Future After Cyberattack

    Mandiant will play a leading role in the operational effort. Its responsibilities include helping governments analyze the behaviors of fraudulent IT worker networks and enabling providers to implement intelligent red flags and detection rules. Though not disclosed publicly, these likely span AI-based identity vetting, anomalies in IP usage, credential-sharing patterns, and cross-border payment flows.

    This initiative represents a turning of the tide. North Korea’s job fraud scheme — once low-profile and opportunistic — has evolved into a refined mechanism for sanctions evasion and regime funding.

    Even companies that believed they were operating above suspicion have been targeted — as evidenced by KnowBe4’s compromise. That’s why the Tokyo forum’s multi-industry scope is essential. Platforms facilitating remote hiring, financial transactions, or identity validation all have a role to play.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleMalicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials
    Next Article Chinese State Hackers Target Global Critical Infrastructure, NSA Warns

    Related Posts

    Development

    Enhanced Queue Job Control with Laravel’s ThrottlesExceptions failWhen() Method

    September 2, 2025
    Artificial Intelligence

    Scaling Up Reinforcement Learning for Traffic Smoothing: A 100-AV Highway Deployment

    September 2, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    The Microsoft 365 renewal dance

    Web Development

    NetPeek – discover devices on your local network

    Linux

    The Xbox app on PC is showing Xbox Series X|S and Xbox One console games, and uh, even Xbox 360 and Windows Phone games — Why?

    News & Updates

    This new Wi-Fi 7 router is small enough to fit in your pocket – and priced well

    News & Updates

    Highlights

    Linux

    Rilasciata Debian 12.11: Aggiornamento di Sicurezza e Stabilità

    May 18, 2025

    Debian è una delle distribuzioni GNU/Linux più longeve, apprezzata per la sua stabilità, sicurezza e…

    CVE-2025-37980 – Linux Kernel Block Driver Resource Leak Vulnerability

    May 20, 2025

    Reducing Barriers Across Industries Through Inclusive Design

    June 23, 2025

    JsonTree v4.7.1 – Added new UI control options!

    April 7, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.