Article Details
Scrape Timestamp (UTC): 2025-01-23 20:58:53.827
Original Article Text
Click to Toggle View
FBI: North Korean IT workers steal source code to extort employers. The FBI warned today that North Korean IT workers are abusing their access to steal source code and extort U.S. companies that have been tricked into hiring them. The security service alerted public and private sector organizations in the United States and worldwide that North Korea's IT army will facilitate cyber-criminal activities and demand ransoms not to leak online exfiltrated sensitive data stolen from their employers' networks. "North Korean IT workers have copied company code repositories, such as GitHub, to their own user profiles and personal cloud accounts. While not uncommon among software developers, this activity represents a large-scale risk of theft of company code," the FBI said. "North Korean IT workers could attempt to harvest sensitive company credentials and session cookies to initiate work sessions from non-company devices and for further compromise opportunities." To mitigate these risks, the FBI advised companies to apply the principle of least privilege by disabling local administrator accounts and limiting permissions for remote desktop applications. Organizations should also monitor for unusual network traffic, especially remote connections since North Korean IT personnel often log into the same account from various IP addresses over a short period of time. It also recommended reviewing network logs and browser sessions for potential data exfiltration through shared drives, cloud accounts, and private code repositories. To strengthen their remote hiring process, companies should verify identities during interviews and onboarding and cross-check HR systems for applicants with similar resume content or contact details. Given that North Korean IT workers are known to use AI and face-swapping tech to conceal their identities during interviews, HR staff and hiring managers must also be aware of the associated risks. Additionally, monitoring changes in payment platforms and contact information during onboarding is crucial, as these individuals will often reuse email addresses and phone numbers across resumes. Other measures that should help detect North Korean IT workers trying to bypass hiring checks include: Today's public service announcement follows repeated warnings issued by the FBI over the years regarding North Korea's large army of IT workers, which hide their true identities to get hired at hundreds of companies in the United States and worldwide. Also referring to themselves as "IT warriors," they impersonate U.S.-based IT staff by connecting to enterprise networks via U.S.-based laptop farms. After being discovered and fired, some of these North Korean IT workers have used insider knowledge to extort their former employers, threatening to leak sensitive information they stole from company systems. The U.S. State Department now offers millions in exchange for information that could help disrupt the activities of multiple North Korean front companies. These companies have generated revenue for the country's regime through illegal remote IT work schemes. In recent years, the South Korean and Japanese government agencies have also issued alerts regarding North Koreans tricking private companies and securing employment as remote IT workers. In a joint statement issued last week, the United States, South Korea, and Japan revealed that North Korean state-sponsored hacking groups have stolen over $659 million worth of cryptocurrency in multiple crypto-heists during 2024. Today, the Justice Department also indicted two North Korean nationals and three facilitators for their involvement in a multi-year fraudulent remote IT work scheme that allowed them and suspects (who are yet to be charged) to get hired by at least sixty-four U.S. companies between April 2018 and August 2024.
Daily Brief Summary
The FBI has issued warnings about North Korean IT professionals using their employment in U.S. and global companies to conduct cyber espionage and data theft.
These workers often steal source code and other sensitive information, which they then use to extort the companies that hired them, threatening to leak the data unless a ransom is paid.
North Korean operatives routinely impersonate legitimate IT workers, using sophisticated methods including AI and face-swapping technologies to evade security measures during the hiring process.
To counteract these threats, the FBI recommends implementing strict access controls, closely monitoring network traffic, and conducting thorough checks during the hiring process.
The U.S. State Department offers monetary rewards for information that leads to the disruption of these illicit activities, indicative of the severity of the threat posed by these state-sponsored actors.
Recent incidents have led to significant financial losses, including over $659 million stolen from cryptocurrency exchanges in 2024 as a result of these espionage activities.
The Justice Department has recently indicted two North Koreans and three accomplices for their involvement in a complex scheme that placed them within U.S. corporations to commit these crimes.