FBI warns of North Korean hackers using VPNs to infiltrate businesses

Hacker silhouette working on a laptop with North Korean flag on the background
(Image credit: Getty Images)

VPN services, stolen identification documents and fake social media accounts: these are some of the methods North Korean hackers have been using to deceive US companies into hiring them as IT remote workers, the FBI warns.

Despite not being certain when such a campaign began, investigators believe thousands of IT freelancers from North Korea have been managing to get a job in US firms over the last 5 years, at least, by concealing their identities. Workers are believed to use this money to finance Kim Jong Un’s weapons, steal company secrets and plant malware.

Following the latest evidence, both US and South Korean authorities have updated their guidelines to help employers avoid hiring North Korean agents as freelance workers.    

FBI guidance on DPRK IT workers

"North Korea has flooded the global marketplace with ill-intentioned information technology workers," said Jay Greenberg, FBI agent in charge of the St. Louis Division—The Register reported.

As the latest effort to clamp down on North Korean hackers' activities, Greenberg's division managed to seize around $1.5 million and 17 web domain names used in the deceptive campaign as part of the investigation. However, workers linked to the Democratic People's Republic of Korea (SPRK) infiltrating companies is believed to still be ongoing.

"This scheme is so prevalent that companies must be vigilant to verify whom they're hiring," he said.

According to authorities, malicious North Korean IT workers have been using several techniques to deceive employers while concealing their real identity. Stolen or counterfeited identity documents were used for passing online identity checks with ease. Hackers are thought to have even paid US individuals to attend online interviews and video-conferences in their place.

On a more techy level, they use virtual private networks to spoof their IP address location and boost their anonymity. Alongside this, they might also create fake social media accounts and/or fake company websites to make them appear more legitimate.

"At a minimum, the FBI recommends that employers take additional proactive steps with remote IT workers to make it harder for bad actors to hide their identities," went on saying Greenberg.

As part of the new recommendations, authorities suggest to watch out for any suspicious behaviors. These include repeated requests for prepayment accompanied by threats to release proprietary source code, continuing refusal to appear on camera or to take drug tests, use of ever-changing freight addresses instead of their home addresses, and more.

The FBI also recommends employers to do a background check online to assess if the same identity is associated with multiple different profiles, while keeping records of all interactions with potential employees.

At an online security level, employers should always require their freelancers to turn off their private VPN when accessing company networks. Firm owners are also urged to put in place a strict zero-trust cybersecurity approach, which refrains from granting access to sensitive proprietary information to remote workers whenever possible.

It's also worth reminding that, despite the tech sector being the biggest target due to higher average salaries, it's just one of the fields among which North Korean hackers operate—John Hultquist, the head of threat intelligence at the cybersecurity firm Mandiant, told the Associated Press.

Greenberg said: "Without due diligence, companies risk losing money or being compromised by insider threats they unknowingly invited inside their systems."

Chiara Castro
News Editor (Tech Software)

Chiara is a multimedia journalist committed to covering stories to help promote the rights and denounce the abuses of the digital side of life – wherever cybersecurity, markets, and politics tangle up. She writes news, interviews, and analysis on data privacy, online censorship, digital rights, cybercrime, and security software, with a special focus on VPNs, for TechRadar and TechRadar Pro. Got a story, tip-off, or something tech-interesting to say? Reach out to chiara.castro@futurenet.com

Read more
Hacker silhouette working on a laptop with North Korean flag on the background
FBI claims North Korean workers are hacking the US companies which hired them
A hand reaching out to touch a futuristic rendering of an AI processor.
North Korean fake job hackers are going the extra mile to make sure their scams seem legit
Hacker silhouette working on a laptop with North Korean flag on the background
North Korean hackers are targeting LinkedIn jobseekers with new malware - here's how to stay safe
A digital representation of a lock
Looking for a new job? Watch out you don't fall for this new malware scam
North Korean flag with a hooded hacker
North Korean hackers are posing as software development recruiters to target freelancers
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
Latest in VPN Privacy & Security
Swiss flag with view of Geneva city, Switzerland
Secure encryption and online anonymity are now at risk in Switzerland – here's what you need to know
Demonstrators protesting against the arrest of the Mayor of Istanbul Ekrem Imamoglu block Atatürk Boulevard on March 22, 2025 in Ankara, Türkiye.
Turkey's social media ban has been lifted, but VPN usage is still high
Shape of Russia filled with Russian flag-colored internet codes on a black hacking background
A new wave of blocks in Russia targets VPN apps and Cloudflare subnets
Digital hand set location on map with two pins. AI technology in GPs, innovation delivery, map location, future transport logistic, route path concept. GPs point. New office location, change address
What does your IP address reveal about you?
A stethoscope next to a laptop on a pink background
How to check if your VPN is working
Teenager playing on a gaming PC with two monitors
Is using a VPN while gaming cheating? 5 myths you shouldn't believe about gaming with a VPN
Latest in News
Nintendo Switch 2 Joy-Con up-close from app store
Nintendo's new app gave us another look at the Switch 2, and there's something different with the Joy-Con
cheap Nintendo Switch game deals sales
Nintendo didn't anticipate that Mario Kart 8 Deluxe was 'going to be the juggernaut' for the Nintendo Switch when it was ported to the console, according to former employees
Three angles of the Apple MacBook Air 15-inch M4 laptop above a desk
Apple MacBook Air 15-inch (M4) review roundup – should you buy Apple's new lightweight laptop?
Witchbrook
Witchbrook, the life-sim I've been waiting years for, finally has a release window and it's sooner than you think
Amazon Echo Smart Speaker
Amazon is experimenting with renaming Echo speakers to Alexa speakers, and it's about time
Shigeru Miyamoto presents Nintendo Today app
Nintendo Today smartphone app is out now on iOS and Android devices – and here's what it does