“He has developed a Mita chat tool. His entire identity was fake,” said Anthony from Statin Island.

Photo of author

By [email protected]



  • An identity provider And fraud tools It was recently targeted by North Korea information technology workers running dozens of personalities. CV flowing to social software development, all explosive experience in brand technology companies such as Amazonand GoogleAnd Netflix. It turns out that they were all fake.

“Anthony from Statin Island” had a polished set of credentials and claimed that he had previously worked Definition platforms. during Enlargement An interview with a senior software engineer, the supposed New Yorker was a magician and an expressed, talking about creating a major chat application in the social media giant of $ 1.6 trillion.

For the first 20 minutes, everything walked smoothly. Anthony smiled, participated normally, and gave polished responses to the questions. Then everything changed.

“The most surprising thing was that he was really sad,” Revka Little, the chief growth employee of Socure. “You can see 100 % why people will become a victim for this.”

When the interview advanced to more sophisticated questions of two parts that require more interpretation, I have been in his place. It seemed more stable and less confident luck.

Society believes that Anthony was a North Korea IT factor, which is part of a sophisticated and Treacherously Criminal organization It consists of Teacher technicians From the Democratic People’s Republic of Korea (DPRK). the DPRK information technology workers Use American identities, real or fabricated, and apply for remote jobs in it American and European Companies.

The plan was a particle A fleeing success. Hundred From Fortune 500, companies hired thousands of information unintentionally from DPRK, and the IT crew sends their salaries to the authoritarian leader Kim Jong Un. Kim uses money to finance the weapons program for comprehensive destruction in the country. The plan generates between 200 million dollars to $ 600 million a year, according to EstimationDPRK information technology workers are cooperating with high -skilled activists responsible for theft Billion in Encryption I stole.

This scheme is spreading to the extent that some technology founders Resort to To ask the potential candidates for the jobs to insult Kim before applying for an official interview. DPRK information technology is constantly wiped and insulting the Supreme Commander of the system will lead to a severe penalty.

The threat is expanding quickly. This year, Kim doubled the required earning shares from the delegations of workers and launched a new artificial intelligence unit called the Research Center 227 to support cyber crime initiatives in the country, according to the research from the security company DTEX.

Red flags, transformation tactics

SOCURE is Advertisement Her experience with Anthony to alert other companies to new warning signs and also to avoid the pitfalls of excessive recruitment practices that may make it difficult for those looking for legal work. The challenge is that the fraudulent candidates are skilled and some of them are very charming, as a few explained.

“Anyone can fall into these interviews – he has achieved well for a long period of time,” Little said.

Some of the indicators on which companies rely on the long term. For example, Anthony gave a title that looked Italian and claimed to be from Statin Island. During his interview, he had a tone that was not in line with his original story.

“People come in all kinds of beams,” I noticed. Surface nuances should not be used to eliminate candidates. Although DPRK information workers tend to use stereotypes, if they modify their scheme slightly and use the names that are associated with their accents, those signs will disappear.

She said more saying is the contradictions in Anthony’s digital imprint. Many of the manufactured CVs have been sent to Society in recent months have been the names of large pavilion that made it stand out. Google, Meta, Amazon and Netflix are often included often the job applicants are responsible for the most innovative and interesting products in those companies. A quick examination with some of the internal employees who worked in Meta during the time an anthony claimed that no one knew him.

Another science was the non -maturity of Anthony’s digital identity. Its email address and his phone number were connected to his name for only weeks. She noted that people have phone numbers and email addresses associated with them. And in spite of LinkedIn Anthony did not have the profile matching his work date and a bright “Open To Work” banner, he did not have much communications, posts or likes on the platform. It was unusual for a person with a large -scale technical background.

However, the last thing the company should do is to create more friction and drama that will make it more difficult for Sharia job candidates. In addition, while North Korea’s information technology fraud creates risks to employing companies, there are many reverse plans targeting job seekers. A woman contacted SOCURE and told the company that she had been interviewed for a job by a fake human resources and loved thousands of dollars after providing her name, knowledge and details of the bank account that is believed to have been appointed.

Little said it creates the need for an accurate balance. Companies need to protect themselves from fraudulent appointments, but they cannot create a lot of friction that legitimate candidates find it very difficult to apply for a job.

Little suggested that companies merge the negative identity verification on their human resources platforms to verify the identity in the background without the need for an ID offered by the candidates. Micro -interview techniques that are achieved in textual responses or the use of artificial intelligence in the midst of the conversation in addition to digital fingerprint evidence also can also help detecting fraudulent work.

“I have never seen such an intersection on fraud, money laundering and penalties,” said Little. “It is an ideal storm.”

This story was originally shown on Fortune.com



https://fortune.com/img-assets/wp-content/uploads/2025/05/GettyImages-1967598007-e1748567295177.jpg?resize=1200,600

Source link

Leave a Comment