North Korean operatives have “diversified” their way of defrauding victims through freelancing and code-hosting platforms that recruit unsuspecting users as identity proxies for remote tech jobs, according to cybersecurity researchers.  Democratic People’s Republic of Korea (DPRK) IT workers are using Upwork, Freelancer, and GitHub to impersonate legitimate workers and evade international sanctions by using verified accounts belonging to real people. According to cybersecurity researcher Heiner García Pérez, a member of SEAL Intel, the hackers begin by posting freelance job offers or approaching candidates, then move conversations to encrypted channels like Telegram or Discord, where they provide detailed instructions on how to set up remote access and verification checks. DPRK bad actors use freelancers to bypass sanctions Garcia found that DPRK operatives can bypass geographic filters, identity checks, and VPN detection systems that would normally block users from sanctioned countries by quietly using verified identities.  It enables them to apply for or perform remote IT jobs under a stolen or borrowed identity, concealing their origin while collecting payments from unsuspecting clients.  “These actors are organized, coordinated, and share operational playbooks. The consistency of their methods shows this is part of a repeatable, state-backed system,” the SEAL Intel member wrote. As reported by Cryptopolitan in August, several North Korean IT workers have infiltrated international companies using false identities. This has reportedly helped DPRK authorities deploy remote IT professionals abroad to secure freelance or contract roles under stolen or borrowed identities, coupled with shell companies masking their affiliation. Those whose identities are used receive only around 20% of total earnings, while the operatives keep 80%, funneled through crypto wallets or even traditional bank accounts.  Use of AI to manipulate images and company names García Pérez’s investigation uncovered several behaviors of technical sophistication and deliberate concealment. In one case, an IT worker had created a Google Drive folder labeled “My Photo,” where AI-edited portraits were stored together with folders bearing other individuals’ names. He believes these digital documents are separate personas managed by the same operator. The files he recovered from the drive had a deeper insight into the recruitment and payment processes. One file titled “Account” contained instructions explaining how to access Upwork, the purpose of the collaboration, and how profits would be divided.  Some of the folders were named in Korean, such as “it개발 매칭 플랫폼 사이트,” which translates to “IT development matching platform site.” The investigator propounded that such documents were used for “Korean-speaking users and the domestic IT ecosystem.” Heiner García Pérez also found that North Korean actors are exploiting online communities for disabled people, job-matching portals, and even friendship websites such as InterPals to recruit collaborators. DPRK Interpals recruitment email. Source: SEAL Intel Payment flows through crypto, PayPal, and banks Ideal targets of such operations are mostly located in the United States, Europe, and parts of Asia. However, Ukraine and the Philippines were the most frequently identified regions among recruitment materials because they have geographic locations for candidates in lower-income settings who may be more receptive to “fast-earning opportunities.” “If a client posts a project, many freelance users bid on that project. So, the client discusses their own project with freelancers and gives the project to the selected developer. If I choose, I can work on the client’s project. After the project is completed, I can receive money from the client. The money will be credited to your freelancer account,” one IT recruiter explained how to make money to a freelance account holder named “Ana.” The profit-sharing structure between operatives and collaborators is agreed upon early in the exchange. In most of the documented cases, IT workers convince victims to route through cryptos, PayPal, and even bank transfers. In one verified case, a North Korean IT worker used a fraudulent Upwork account registered under the identity of an Illinois-based architect. Want your project in front of crypto’s top minds? Feature it in our next industry report, where data meets impact.North Korean operatives have “diversified” their way of defrauding victims through freelancing and code-hosting platforms that recruit unsuspecting users as identity proxies for remote tech jobs, according to cybersecurity researchers.  Democratic People’s Republic of Korea (DPRK) IT workers are using Upwork, Freelancer, and GitHub to impersonate legitimate workers and evade international sanctions by using verified accounts belonging to real people. According to cybersecurity researcher Heiner García Pérez, a member of SEAL Intel, the hackers begin by posting freelance job offers or approaching candidates, then move conversations to encrypted channels like Telegram or Discord, where they provide detailed instructions on how to set up remote access and verification checks. DPRK bad actors use freelancers to bypass sanctions Garcia found that DPRK operatives can bypass geographic filters, identity checks, and VPN detection systems that would normally block users from sanctioned countries by quietly using verified identities.  It enables them to apply for or perform remote IT jobs under a stolen or borrowed identity, concealing their origin while collecting payments from unsuspecting clients.  “These actors are organized, coordinated, and share operational playbooks. The consistency of their methods shows this is part of a repeatable, state-backed system,” the SEAL Intel member wrote. As reported by Cryptopolitan in August, several North Korean IT workers have infiltrated international companies using false identities. This has reportedly helped DPRK authorities deploy remote IT professionals abroad to secure freelance or contract roles under stolen or borrowed identities, coupled with shell companies masking their affiliation. Those whose identities are used receive only around 20% of total earnings, while the operatives keep 80%, funneled through crypto wallets or even traditional bank accounts.  Use of AI to manipulate images and company names García Pérez’s investigation uncovered several behaviors of technical sophistication and deliberate concealment. In one case, an IT worker had created a Google Drive folder labeled “My Photo,” where AI-edited portraits were stored together with folders bearing other individuals’ names. He believes these digital documents are separate personas managed by the same operator. The files he recovered from the drive had a deeper insight into the recruitment and payment processes. One file titled “Account” contained instructions explaining how to access Upwork, the purpose of the collaboration, and how profits would be divided.  Some of the folders were named in Korean, such as “it개발 매칭 플랫폼 사이트,” which translates to “IT development matching platform site.” The investigator propounded that such documents were used for “Korean-speaking users and the domestic IT ecosystem.” Heiner García Pérez also found that North Korean actors are exploiting online communities for disabled people, job-matching portals, and even friendship websites such as InterPals to recruit collaborators. DPRK Interpals recruitment email. Source: SEAL Intel Payment flows through crypto, PayPal, and banks Ideal targets of such operations are mostly located in the United States, Europe, and parts of Asia. However, Ukraine and the Philippines were the most frequently identified regions among recruitment materials because they have geographic locations for candidates in lower-income settings who may be more receptive to “fast-earning opportunities.” “If a client posts a project, many freelance users bid on that project. So, the client discusses their own project with freelancers and gives the project to the selected developer. If I choose, I can work on the client’s project. After the project is completed, I can receive money from the client. The money will be credited to your freelancer account,” one IT recruiter explained how to make money to a freelance account holder named “Ana.” The profit-sharing structure between operatives and collaborators is agreed upon early in the exchange. In most of the documented cases, IT workers convince victims to route through cryptos, PayPal, and even bank transfers. In one verified case, a North Korean IT worker used a fraudulent Upwork account registered under the identity of an Illinois-based architect. Want your project in front of crypto’s top minds? Feature it in our next industry report, where data meets impact.

North Korean operatives posing as recruiters to hijack verified freelancer accounts

North Korean operatives have “diversified” their way of defrauding victims through freelancing and code-hosting platforms that recruit unsuspecting users as identity proxies for remote tech jobs, according to cybersecurity researchers. 

Democratic People’s Republic of Korea (DPRK) IT workers are using Upwork, Freelancer, and GitHub to impersonate legitimate workers and evade international sanctions by using verified accounts belonging to real people.

According to cybersecurity researcher Heiner García Pérez, a member of SEAL Intel, the hackers begin by posting freelance job offers or approaching candidates, then move conversations to encrypted channels like Telegram or Discord, where they provide detailed instructions on how to set up remote access and verification checks.

DPRK bad actors use freelancers to bypass sanctions

Garcia found that DPRK operatives can bypass geographic filters, identity checks, and VPN detection systems that would normally block users from sanctioned countries by quietly using verified identities. 

It enables them to apply for or perform remote IT jobs under a stolen or borrowed identity, concealing their origin while collecting payments from unsuspecting clients. 

“These actors are organized, coordinated, and share operational playbooks. The consistency of their methods shows this is part of a repeatable, state-backed system,” the SEAL Intel member wrote.

As reported by Cryptopolitan in August, several North Korean IT workers have infiltrated international companies using false identities. This has reportedly helped DPRK authorities deploy remote IT professionals abroad to secure freelance or contract roles under stolen or borrowed identities, coupled with shell companies masking their affiliation.

Those whose identities are used receive only around 20% of total earnings, while the operatives keep 80%, funneled through crypto wallets or even traditional bank accounts. 

Use of AI to manipulate images and company names

García Pérez’s investigation uncovered several behaviors of technical sophistication and deliberate concealment. In one case, an IT worker had created a Google Drive folder labeled “My Photo,” where AI-edited portraits were stored together with folders bearing other individuals’ names. He believes these digital documents are separate personas managed by the same operator.

The files he recovered from the drive had a deeper insight into the recruitment and payment processes. One file titled “Account” contained instructions explaining how to access Upwork, the purpose of the collaboration, and how profits would be divided. 

Some of the folders were named in Korean, such as “it개발 매칭 플랫폼 사이트,” which translates to “IT development matching platform site.” The investigator propounded that such documents were used for “Korean-speaking users and the domestic IT ecosystem.”

Heiner García Pérez also found that North Korean actors are exploiting online communities for disabled people, job-matching portals, and even friendship websites such as InterPals to recruit collaborators.

North Korean hackers target freelancers on Upwork, GitHubDPRK Interpals recruitment email. Source: SEAL Intel

Payment flows through crypto, PayPal, and banks

Ideal targets of such operations are mostly located in the United States, Europe, and parts of Asia. However, Ukraine and the Philippines were the most frequently identified regions among recruitment materials because they have geographic locations for candidates in lower-income settings who may be more receptive to “fast-earning opportunities.”

“If a client posts a project, many freelance users bid on that project. So, the client discusses their own project with freelancers and gives the project to the selected developer. If I choose, I can work on the client’s project. After the project is completed, I can receive money from the client. The money will be credited to your freelancer account,” one IT recruiter explained how to make money to a freelance account holder named “Ana.”

The profit-sharing structure between operatives and collaborators is agreed upon early in the exchange. In most of the documented cases, IT workers convince victims to route through cryptos, PayPal, and even bank transfers.

In one verified case, a North Korean IT worker used a fraudulent Upwork account registered under the identity of an Illinois-based architect.

Want your project in front of crypto’s top minds? Feature it in our next industry report, where data meets impact.

Market Opportunity
ConstitutionDAO Logo
ConstitutionDAO Price(PEOPLE)
$0.010564
$0.010564$0.010564
-0.79%
USD
ConstitutionDAO (PEOPLE) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

A Radical Neural Network Approach to Modeling Shock Dynamics

A Radical Neural Network Approach to Modeling Shock Dynamics

This paper introduces a non-diffusive neural network (NDNN) method for solving hyperbolic conservation laws, designed to overcome the shortcomings of standard Physics-Informed Neural Networks (PINNs) in modeling shock waves. The NDNN framework decomposes the solution domain into smooth subdomains separated by discontinuity lines, identified via Rankine-Hugoniot conditions. This approach enables accurate tracking of entropic shocks, shock generation, and wave interactions, while reducing the diffusive errors typical in PINNs. Numerical experiments validate the algorithm’s potential, highlighting its promise for extending shock-wave computations to higher-dimensional problems.
Share
Hackernoon2025/09/19 18:38
A Netflix ‘KPop Demon Hunters’ Short Film Has Been Rated For Release

A Netflix ‘KPop Demon Hunters’ Short Film Has Been Rated For Release

The post A Netflix ‘KPop Demon Hunters’ Short Film Has Been Rated For Release appeared on BitcoinEthereumNews.com. KPop Demon Hunters Netflix Everyone has wondered what may be the next step for KPop Demon Hunters as an IP, given its record-breaking success on Netflix. Now, the answer may be something exactly no one predicted. According to a new filing with the MPA, something called Debut: A KPop Demon Hunters Story has been rated PG by the ratings body. It’s listed alongside some other films, and this is obviously something that has not been publicly announced. A short film could be well, very short, a few minutes, and likely no more than ten. Even that might be pushing it. Using say, Pixar shorts as a reference, most are between 4 and 8 minutes. The original movie is an hour and 36 minutes. The “Debut” in the title indicates some sort of flashback, perhaps to when HUNTR/X first arrived on the scene before they blew up. Previously, director Maggie Kang has commented about how there were more backstory components that were supposed to be in the film that were cut, but hinted those could be explored in a sequel. But perhaps some may be put into a short here. I very much doubt those scenes were fully produced and simply cut, but perhaps they were finished up for this short film here. When would Debut: KPop Demon Hunters theoretically arrive? I’m not sure the other films on the list are much help. Dead of Winter is out in less than two weeks. Mother Mary does not have a release date. Ne Zha 2 came out earlier this year. I’ve only seen news stories saying The Perfect Gamble was supposed to come out in Q1 2025, but I’ve seen no evidence that it actually has. KPop Demon Hunters Netflix It could be sooner rather than later as Netflix looks to capitalize…
Share
BitcoinEthereumNews2025/09/18 02:23
Headwind Helps Best Wallet Token

Headwind Helps Best Wallet Token

The post Headwind Helps Best Wallet Token appeared on BitcoinEthereumNews.com. Google has announced the launch of a new open-source protocol called Agent Payments Protocol (AP2) in partnership with Coinbase, the Ethereum Foundation, and 60 other organizations. This allows AI agents to make payments on behalf of users using various methods such as real-time bank transfers, credit and debit cards, and, most importantly, stablecoins. Let’s explore in detail what this could mean for the broader cryptocurrency markets, and also highlight a presale crypto (Best Wallet Token) that could explode as a result of this development. Google’s Push for Stablecoins Agent Payments Protocol (AP2) uses digital contracts known as ‘Intent Mandates’ and ‘Verifiable Credentials’ to ensure that AI agents undertake only those payments authorized by the user. Mandates, by the way, are cryptographically signed, tamper-proof digital contracts that act as verifiable proof of a user’s instruction. For example, let’s say you instruct an AI agent to never spend more than $200 in a single transaction. This instruction is written into an Intent Mandate, which serves as a digital contract. Now, whenever the AI agent tries to make a payment, it must present this mandate as proof of authorization, which will then be verified via the AP2 protocol. Alongside this, Google has also launched the A2A x402 extension to accelerate support for the Web3 ecosystem. This production-ready solution enables agent-based crypto payments and will help reshape the growth of cryptocurrency integration within the AP2 protocol. Google’s inclusion of stablecoins in AP2 is a massive vote of confidence in dollar-pegged cryptocurrencies and a huge step toward making them a mainstream payment option. This widens stablecoin usage beyond trading and speculation, positioning them at the center of the consumption economy. The recent enactment of the GENIUS Act in the U.S. gives stablecoins more structure and legal support. Imagine paying for things like data crawls, per-task…
Share
BitcoinEthereumNews2025/09/18 01:27