Save articles for later

Add articles to your saved list and come back to them any time.

London: Using fake names, sham LinkedIn profiles, counterfeit work papers and mock interview scripts, North Korean IT workers are seeking employment in Western tech companies and deploying sophisticated subterfuge to get hired.

Landing a job outside North Korea to secretly earn hard currency for the isolated country demands highly developed strategies to convince Western hiring managers, according to documents reviewed by Reuters, an interview with a former North Korean IT worker and cybersecurity researchers.

North Korean software developers were found to have used fake LinkedIn profiles to obtain jobs in other countries.Credit: Bloomberg

The regime of Kim Jong-un has dispatched thousands of IT workers overseas – an effort that has accelerated in the last four years – to bring in millions to finance Pyongyang’s nuclear missile program, according to the United States, South Korea, and the United Nations.

“People are free to express ideas and opinions,” reads one interview script used by North Korean software developers that offers suggestions for how to describe a “good corporate culture” when asked. Expressing one’s thoughts freely could be met with imprisonment in North Korea.

The scripts totalling 30 pages, were unearthed by researchers at Palo Alto Networks, a US cybersecurity firm that discovered a cache of internal documents online, which detail the workings of North Korea’s remote IT workforce. The documents contain dozens of fraudulent resumes, online profiles, interview notes, and forged identities that North Korean workers used to apply for jobs in software development.

Reuters found further evidence in leaked dark web data that revealed some of the tools and techniques used by the workers to convince firms to employ them in jobs as far afield as Chile, New Zealand, the United States, Uzbekistan and the United Arab Emirates.

Foreign currency

The documents and data reveal the intense effort and subterfuge undertaken by North Korean authorities to ensure the success of a scheme that has become a vital lifeline of foreign currency for the cash-strapped regime.

North Korea’s UN mission did not respond to a request for comment.

Remote IT workers can earn more than 10 times what a conventional North Korean labourer working overseas in construction or other manual jobs earns, the US Department of Justice (DOJ) said in 2022. It said teams of them could collectively earn more than $US3 million ($4.5 million) a year.

North Korean leader Kim Jong-un earlier this year.Credit: KCNA/KNS/AP

Reuters was unable to determine how much the scheme has generated over the years.

Some of the scripts, designed to prepare the workers for interview questions, contain excuses for the need to work remotely.

“Richard”, a senior embedded software developer, said: “I [flew] to Singapore several weeks ago. My parents got COVID and I [decided] to be with family members for a while. Now, I am planning to go back to Los Angeles in three months. I am thinking that I could start work remotely right now, then I will be on board when I go back to LA.”

A North Korean IT worker, who recently defected, also examined the documents and confirmed their authenticity to Reuters: “We would create 20 to 50 fake profiles a year until we were hired,” he said.

North Korea’s science and technology centre, located on Ssuk island in Pyongyang. The country has sent IT workers abroad to earn cash for the regime.Credit: AP

He viewed the scripts, data and documents and said it was the same thing he had been doing because he recognised the tactics and techniques used.

“Once I was hired, I would create another fake profile to get a second job,” said the worker, who spoke on condition of anonymity, citing security concerns.

In October, the DOJ and Federal Bureau of Investigation (FBI) seized $US1.5 million in funds and 17 website domains it said were used by the IT workers to defraud businesses. North Korean developers working at US companies had hidden behind pseudonymous email and social media accounts and generated millions of dollars a year on behalf of sanctioned North Korean entities through the scheme, the DOJ said.

“There is a risk to the North Korea government, as these privileged workers are exposed to dangerous realities about the world and their country’s enforced backwardness,” said Sokeel Park of Liberty in North Korea (LINK), an organisation that works with defectors.

Kim Jong-un attends a launching ceremony of North Korea says a new nuclear attack submarine in September.Credit: AP

Last year, the US government said North Korean IT workers were mainly located in China and Russia, with some in Africa and South-East Asia, and could each earn up to $US300,000 annually.

According to his experience, the former IT worker said all were expected to earn at least $US100,000, of which 30-40 per cent was repatriated to Pyongyang, 30-60 per cent spent on overhead expenses, and 10-30 per cent pocketed by workers.

He estimated there were around 3000 others like him overseas, and another 1000 based within North Korea.

“I worked to earn foreign currency,” he told Reuters. “It differs between people but basically, once you get a remote job, you can work for as little as six months, or as long as three to four years.”

“When you can’t find a job, you freelance.”

The researchers, part of Palo Alto Networks’ Unit 42 cyber research division, made the discovery when examining a campaign by North Korean hackers that targeted software developers.

One of the hackers left the documents exposed on a server, Unit 42 said, indicating there were links between North Korea’s hackers and its IT workers, although the defector said espionage campaigns were for a select few. “Hackers are trained separately. Those missions are not given to people like us,” he said.

Still, there is a crossover. The DOJ and FBI have warned that North Korean IT workers may use access to hack their employers, and some of the leaked resumes indicated experience at cryptocurrency firms, an industry that has been long-targeted by North Korean hackers.

Fake identities

Data from Constella Intelligence, an identity investigation firm, showed that one of the workers had accounts at more than 20 freelancing websites in the United States, Britain, Japan, Uzbekistan, Spain, Australia and New Zealand.

The worker did not respond to an emailed request for comment. The data, collated from leaks on the dark web, also revealed an account on a website selling digital templates to create realistic-looking fake identification documents, including US driving licences, visas and passports, Reuters found.

The documents unearthed by Unit 42 included resumes for 14 identities, a forged US green card, interview scripts, and evidence that some workers had bought access to legitimate online profiles to appear more genuine. The “Richard” in Singapore who was seeking remote IT work appeared to refer to a forged profile by the name of “Richard Lee” – the same name on the green card. The US Department of Homeland Security did not respond to a request for comment.

Reuters found a LinkedIn account for a Richard Lee with the same profile photo who listed experience at Jumio, a digital identity verification company.

“We do not have any records of Richard Lee having been a current or former employee of Jumio,” a Jumio spokesperson said. “Jumio does not have any evidence to suggest the company has ever had a North Korean employee within its workforce.”

Reuters messaged the LinkedIn account seeking comment, but received no response. LinkedIn removed the account after receiving requests from Reuters for comment.

“Our team uses information from a variety of sources to detect and remove fake accounts, as we did in this case,” a spokesperson said.

Reuters

Get a note directly from our foreign correspondents on what’s making headlines around the world. Sign up for our weekly What in the World newsletter.

Most Viewed in World

From our partners

Source: Read Full Article