No items found.
February 24, 2026
·
0
Minutes Read

DPRK Fake IT Workers Fraud Playbook

Hacking
Research
February 24, 2026
·
0
Minutes Read

DPRK Fake IT Workers Fraud Playbook

Hacking
Research
February 24, 2026
·
0
Minutes Read
table of contents
Share on
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Summary

Following the first article on the DPRK fake IT workers infrastructure, we wanted to write a separate article about the cybercrime ecosystem, which is unique in that it combines a persistent conglomerate of companies with a large number of North Korean workers. In this article, we will present the methodologies used in our research on this subject.

Understanding the environment around fake IT workers

As we saw in our research, North Korean IT workers use their own terms to describe the elements of the infrastructure shown below.

Figure1: DPRK cybercrime organization

Mainly for the remote services part, we could observe a cluster of developers in Iran, Syria, and South Africa who are regular citizen that accepted to be hired following a proposal on LinkedIn by North Korean IT workers, followed by a change of application to discuss on WhatsApp with the newly hired person. LinkedIn is widely used as a first approach for new hires and to initiate first contact within the targeted countries, which vary depending on the job offer.

The technique of the first approach may vary depending on the North Korean IT worker; they don’t have a defined process and seem free to use their own methods.

Function Role
“Assistant”
  • Assist the DPRK citizens on their daily tasks
  • Apply to job offers
  • Handle the administrative tasks
“HR”
  • Perform HR interviews internally for developers AND/OR Callers
  • Evaluate the level of English and communication skills of candidates
  • Do initial triage for new candidates
“Callers”
  • Talk during interviews, taking the identity of the persona
  • Pass technical interview they are initially developers
  • Talk during screen calls
  • Pass technical tests during the interview process
  • Can switch between personas and replace another fake/real employee
  • Do technical tasks on the infrastructure, manage VPNs, Hushed, Google Voice
“Local person”
  • Give his ID to North Korean job seekers
  • Give his ID to create accounts on employment platforms
  • Give his ID and bank or payment account to send/receive payments
  • Sign documents and/or take the corporate laptop onsite
  • Help fake IT workers search for jobs locally
  • Provide a valid address
  • Receive and keep the corporate laptop at home
  • Host a laptop farm
“Supporter”
  • Called when administrative issues occur
  • Provides help when needed
  • Can come onsite to sign corporate forms
  • Switch identities and consent about it
“Interviewees”
  • Person integrating the internal team
  • Will work as developer, Caller, or Assistant
“Developer”
  • Subcontractor developer for internally won projects
  • Can be external or North Korean workers

Figure 2: Table and definition of each role within the cybercrime structure

For the local employees who appear to be mainly within the US, they are targeted on LinkedIn, likely in specific position as we could see most of the targeted “Local person” or “supporter” are drivers, plumbers, freelancers, and probably more jobs. The tariffication to obtain a fake identity is 250 US dollars prepaid, and “local persons” can introduce their friends as well to give their identity to DPRK IT workers.

Links with non-state backed cybercrime

As we could see, DPRKIT workers use data brokers to obtain fake identities, which is an important step toward mastering the verification bypass on job offer websites, social medias and background checks during the interview process. The DPRK IT worker is the only one who manipulates the .PSD files and applies modifications to them.

Figure3: Directory with template of fake identities

With these .PSD files, we observed that the developers acknowledged using fake identities to swap identities between interviews with their consent.

Figure 4: Fake Identity workflow

During our investigation into stealer logs, we observed that DPRK IT workers had developer-level access to the U.S.-sanctioned hosting service ‘Funnull’. As we can see, they maintained the infrastructure and performed fixes on “Goedge CDN,” an open-source solution for building their own CDN and WAF.

Financial analysis

As we could see during our analysis, we assessed that DPRK IT workers are using similar techniques as Blackbasta to do cash out, but this time with Tron to USDT(Tether) to do cash out on a wallet named “company” or maintain their infrastructure.

Figure 5: Text gathered on a stealer log

It seems they put a lot of effort into reducing and optimizing energy consumption; for that, we found traces of automated transfers via Tron (TRX).We could see on the stealer log this specific process

Figure 6: We assume they have various techniques for cashing out, and this is not the only workflow used across the numerous teams within the DPRK fake IT workers infrastructure.

Sources

Hudsonrock (for the stealer logs)

https://home.treasury.gov/news/press-releases/sb0149

ANNEX 1 – “Localperson” / “Supporter” targeted locations

Targeted country Targeted state City
USA Texas
USA New York New York
USA Pennsylvania Pittsburgh
USA Illinois

ANNEX 2 – Assessed profiles

Country Name Role Skills
Iran Operator A Interviewer C#
Iran Operator B Caller Data engineer
Iran Operator C Caller .NET developer
Iran Operator D Unknown C# / .NET developer
Iran Operator E Unknown React/node developer
Iran Operator F Caller Setup workflows, UX/UI design
Iran Operator G Caller Admin IT, NestJS, PHP/Laravel
Iran Operator H Unknown Admin IT
Iran Operator I Unknown Admin IT
Ireland Operator J Caller Unknown
Ireland Operator K Interviewees Unknown
Ireland Operator L Interviewees Unknown
Syria Operator M Unknown Unknown
South Africa Operator N Unknown Unknown
India Operator O Unknown Blockchain developer

ANNEX 3 – TRON related links

Site Purpose
feee[.]io Tron energy marketplace
trongrid[.]io Hosted API, dev tools with direct access to TRON and BTTC network
tronscan[.]org Wallet scan
oklink[.]com/trx Wallet transaction scan
tronweb[.]network
/docu/docs/4.0.0/API%20List/transactionBuilder/delegateResource/
Documentation
changenow[.]io/currencies/tron/sun Cryptocurrency exchange platform
Related Post