Hundreds of Fortune 500 companies have hired North Korean operatives.



Fake North Korean WorkerCyberwire wrote: "WIRED has published a report on North Korea's efforts to obtain remote IT positions at foreign companies, noting that these fraudulent workers are now using AI tools to cheat on coding tests and technical interviews. The threat actors are also using deepfake technology to bypass ID checks. The primary goal of these workers is to earn a paycheck for Pyongyang, though they also occasionally use their access to conduct espionage or launch financially motivated attacks.

Researchers at Mandiant and Google Cloud covered this same topic in a media briefing at RSAC 2025, CyberScoop reports. Mandiant Consulting CTO Charles Carmakal stated, "There are hundreds of Fortune 500 organizations that have hired these North Korean IT workers." Carmakal added, "Literally every Fortune 500 company has at least dozens, if not hundreds, of applications for North Korean IT workers. Nearly every CISO that I’ve spoken to about the North Korean IT worker problem has admitted they’ve hired at least one North Korean IT worker, if not a dozen or a few dozen."

I reported this first in July 2024, and our blog post about this has had hundreds of thousands of views.


The Security Culture How-to Guide

Improving the security culture of your organization can seem daunting. This how-to guide will walk you through how to build a step-by-step plan, helping you understand the fundamentals of security culture and what you can do to move the culture needle in your organization.

Security-Culture-How-To-Guide

You'll learn:

  • The fundamental ABCs of culture change and how each builds off each other
  • A seven-step cycle for improving your security culture
  • Advice and best practices for making the most out of each step in the process

Download this guide now!

Download the Guide

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

https://info.knowbe4.com/wp-security-culture-how-to-guide

Topics: Cybersecurity



Subscribe to Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews