No items found.
March 23, 2026
·
0
Minutes Read

Inside the Cyber Infrastructure Behind DPRK Fake IT Worker Operations

Security Advisory
March 23, 2026
·
0
Minutes Read

Inside the Cyber Infrastructure Behind DPRK Fake IT Worker Operations

Security Advisory
March 23, 2026
·
0
Minutes Read
table of contents
Share on
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Summary

After our article about the internal infrastructure of theDPRK fake IT workers, we wanted to document a network that we believe that it’s used for their offensive operations as a lab for various purposes that we can’t give because at this time we don’t know what their main mission within this infrastructure part are. Over the time they gained maturity and learned how structure and industrialize their offensive operations.

Infrastructure assessment

During our research we could assess with moderate confidence these four distinct networks. (see Annex A)

  • 192.168.213.0/24 [ AI ]
    We chose to merge it with the other networks because they use Kibana and AI search and with low confidence we saw the usage of Gradio.
  • 192.168.140.0/24 [ AI, DEVOPS and NPM development infrastructure ]
    We chose this description because we could observe the usage of Verdaccio and traces of NPM packages within the URL’s visited by the assessed actors.
  • 192.168.47.0/24 [ Network ]
    We chose to merge it with the other networks due to the presence of the same actors in the confirmed range 192.168.140.0/24.
  • 192.168.35.0/24 [CI / CD]
    We chose to merge it with the other networks due to the presence of the same actors and the same servers used on both networks 192.168.35.0/24 and192.168.140.0/24 which are drone CI and Gitea.
Figure 1: Development infrastructure

This specific infrastructure is not like the previously assessed one, due to the number of services that each machine serves which is greater than that on other networks and due to the presence of MOBSF which is used as an offensive security tool. It seems that they have machines with more allowed resources.By using the identified servers, we can’t reconstitute their development workflow and what they are doing inside of these networks. Even with low confidence, because as we don’t have a clear view of what is the objective here, it could be either a testing infrastructure or a pre-production environment. Based on the threat actors activity, we can say that it is likely related to an offensive environment.

During our research on the external infrastructure, we saw that many public IP addresses belonging to AstillVPN, VPS providers or residential proxies overlap with hacking campaigns led by North Korean actors. Even when these public IP addresses are related to North Korean IT workers because they sometimes share the same infrastructure and exit nodes, as multiple cells seem to converge into the 192.168.91.0/24 network range. This allows them to avoid being flagged while applying for job offers or compromising companies. To bypass country-based detection, they mainly chose VPS servers hosted in Europe or in North America.

Team member Description IP Exit node
Operator A Have access to the network range 192.168.140.0/24 146.19.106[.]230 WorkTitans B.V. VPS (the[.]hosting), Canada
Operator B Have access to the network range 192.168.140.0/24 146.19.106[.]230 WorkTitans B.V. VPS (the[.]hosting), Canada
"Chenyi" Have access to the network range 192.168.140.0/24 146.19.106[.]230 WorkTitans B.V. VPS (the[.]hosting), Canada
Operator C Have access to the network range 192.168.140.0/24 178.170.39[.]172 Ikoula VPS, France
Operator D Have access to the network range 192.168.140.0/24 178.170.39[.]172 Ikoula VPS, France
Operator E Have access to the network range 192.168.140.0/24 178.170.39[.]172 Ikoula VPS, France
Operator F Have access to the network range 192.168.140.0/24 178.170.39[.]172 Ikoula VPS, France
Operator G Machine named "ATTACK (ATTACK_O)" 77.247.126[.]189 Clouvider VPS, USA
Public IP related to the Bybit attack
Operator H "YuHang team" 37.120.210[.]2 M247, Japan (linked with Mullvad VPN)
Public IP related to APT 37
Operator I Team 313 Public IP related to contagious interview
Operator J Team 313 Public IP related to contagious interview

Infiltrating companies can be considered as an initial access technique that can lead to prepositioning techniques for espionage or disruptive operations. During our ongoing research, we observed that they attempted to apply for OT related positions, roles within the Energy sector, and also placed specific markers in the Aeronautics sector and defense sectors mostly in the US and across EU countries.

Main pivot point to the development infrastructure

Following the previous article about their infrastructure we wanted to retrieve more network linked to the fake IT workers, so we took the most used IP internally as mentioned on the chats from “IPmsg”.

Figure 2: Message from the administrator

Since we know that they all had to register on this server,we were able to pivot to other public IPs that have not yet been flagged as belongingto Fake IT workers by using the “domain” field within Hudsonrock which can bealso used for private IPs.

Figure 3: Screenshot from Hudsonrock

Source

Hudsonrock (for the stealer logs)
https://lazarus.day/search/?q=npm
https://www.recordedfuture.com/research/purplebravos-targeting-it-software-supply-chain
https://www.sentinelone.com/labs/contagious-interview-threat-actors-scout-cyber-intel-platforms-reveal-plans-and-ops/

Annex A

Here you will find an array with the infrastructure elements identified within this group of networks.

IP + Port Server
192.168.140.63:8080HTTP
192.168.140.122:8080HTTP
192.168.140.128:3000Gitea
192.168.140.128:40000Harbor
192.168.140.128:81Drone CI
192.168.140.129:9000SonarQube
192.168.140.129:8080Apache2
192.168.140.129:91Opendir
192.168.140.130:8080HTTP
192.168.140.232:7860VideoTranscriber
192.168.140.197:5678?
192.168.140.198:8088HTTP
192.168.140.216:3000HTTP
192.168.140.216:8088HTTP
192.168.140.233:8081HTTP
192.168.140.236:80HTTP
192.168.140.236:1999HTTP
192.168.140.236:3000HTTP
192.168.140.236:3334HTTP
192.168.140.236:8080HTTP
192.168.140.236:8082HTTP
192.168.140.238:4873Verdaccio [NPM dev related]
192.168.140.238:7990Atlassian Bitbucket
192.168.140.238:8000Mention of “Mobsf” [Mobile security framework]
192.168.140.238:8085Postgresql
192.168.140.238:8080HTTP
192.168.140.238:3000Gitea
192.168.140.239:80Redmine
192.168.140.240:9080HTTP
192.168.140.242:3000Chat solution
192.168.140.242:7990Atlassian Bitbucket
192.168.140.242:8085Atlassian Bamboo
192.168.140.243:1999HTTP
192.168.140.243:3000HTTP
192.168.140.243:3009HTTP
192.168.140.243:3333HTTP
192.168.140.243:40000HTTP
192.168.140.243:5601ELK
192.168.140.243:8000Cassandra
192.168.140.243:8081HTTP
192.168.140.243:8082HTTP
192.168.140.243:9001HTTP
192.168.140.246:8082HTTP
192.168.140.247:8082HTTP
192.168.140.247:8080HTTP
192.168.140.249:8080Apache superset
192.168.140.249:9021Apache Kafka GUI Management and Monitoring
192.168.140.249:9000Maybe graylog
192.168.140.252:3000Gitea
192.168.140.253:5601ELK
192.168.140.253:80Gitlab
192.168.140.253:8080HTTP
192.168.140.253:3000HTTP
192.168.140.254:33001Nextcloud
192.168.140.254:33001Nextcloud/Onlyoffice
192.168.140.254:33003HTTP
192.168.140.254:33005OpenProject
Mention of AI and DevOps
192.168.140.254:33005/projects/ai/work_packages
TITLE: Task: Translate Engine (#339) | AI | OpenProject
TITLE: Task: Site-Translator (#332) | AI | OpenProject
TITLE: Overview
192.168.140.254:33005/projects/devops/
192.168.47.128:8080HTTP
192.168.35.128:3000Gitea
192.168.35.128:80HTTP
192.168.213.128:5601Elastic
192.168.213.128:7860Gradio
192.168.213.128:5000HTTP
Related Post