North Korean operatives have “diversified” their way of defrauding victims through freelancing and code-hosting platforms that recruit unsuspecting users as identity proxies for remote tech jobs, according to cybersecurity researchers.  Democratic People’s Republic of Korea (DPRK) IT workers are using Upwork, Freelancer, and GitHub to impersonate legitimate workers and evade international sanctions by using verified accounts belonging to real people. According to cybersecurity researcher Heiner García Pérez, a member of SEAL Intel, the hackers begin by posting freelance job offers or approaching candidates, then move conversations to encrypted channels like Telegram or Discord, where they provide detailed instructions on how to set up remote access and verification checks. DPRK bad actors use freelancers to bypass sanctions Garcia found that DPRK operatives can bypass geographic filters, identity checks, and VPN detection systems that would normally block users from sanctioned countries by quietly using verified identities.  It enables them to apply for or perform remote IT jobs under a stolen or borrowed identity, concealing their origin while collecting payments from unsuspecting clients.  “These actors are organized, coordinated, and share operational playbooks. The consistency of their methods shows this is part of a repeatable, state-backed system,” the SEAL Intel member wrote. As reported by Cryptopolitan in August, several North Korean IT workers have infiltrated international companies using false identities. This has reportedly helped DPRK authorities deploy remote IT professionals abroad to secure freelance or contract roles under stolen or borrowed identities, coupled with shell companies masking their affiliation. Those whose identities are used receive only around 20% of total earnings, while the operatives keep 80%, funneled through crypto wallets or even traditional bank accounts.  Use of AI to manipulate images and company names García Pérez’s investigation uncovered several behaviors of technical sophistication and deliberate concealment. In one case, an IT worker had created a Google Drive folder labeled “My Photo,” where AI-edited portraits were stored together with folders bearing other individuals’ names. He believes these digital documents are separate personas managed by the same operator. The files he recovered from the drive had a deeper insight into the recruitment and payment processes. One file titled “Account” contained instructions explaining how to access Upwork, the purpose of the collaboration, and how profits would be divided.  Some of the folders were named in Korean, such as “it개발 매칭 플랫폼 사이트,” which translates to “IT development matching platform site.” The investigator propounded that such documents were used for “Korean-speaking users and the domestic IT ecosystem.” Heiner García Pérez also found that North Korean actors are exploiting online communities for disabled people, job-matching portals, and even friendship websites such as InterPals to recruit collaborators. DPRK Interpals recruitment email. Source: SEAL Intel Payment flows through crypto, PayPal, and banks Ideal targets of such operations are mostly located in the United States, Europe, and parts of Asia. However, Ukraine and the Philippines were the most frequently identified regions among recruitment materials because they have geographic locations for candidates in lower-income settings who may be more receptive to “fast-earning opportunities.” “If a client posts a project, many freelance users bid on that project. So, the client discusses their own project with freelancers and gives the project to the selected developer. If I choose, I can work on the client’s project. After the project is completed, I can receive money from the client. The money will be credited to your freelancer account,” one IT recruiter explained how to make money to a freelance account holder named “Ana.” The profit-sharing structure between operatives and collaborators is agreed upon early in the exchange. In most of the documented cases, IT workers convince victims to route through cryptos, PayPal, and even bank transfers. In one verified case, a North Korean IT worker used a fraudulent Upwork account registered under the identity of an Illinois-based architect. Want your project in front of crypto’s top minds? Feature it in our next industry report, where data meets impact.North Korean operatives have “diversified” their way of defrauding victims through freelancing and code-hosting platforms that recruit unsuspecting users as identity proxies for remote tech jobs, according to cybersecurity researchers.  Democratic People’s Republic of Korea (DPRK) IT workers are using Upwork, Freelancer, and GitHub to impersonate legitimate workers and evade international sanctions by using verified accounts belonging to real people. According to cybersecurity researcher Heiner García Pérez, a member of SEAL Intel, the hackers begin by posting freelance job offers or approaching candidates, then move conversations to encrypted channels like Telegram or Discord, where they provide detailed instructions on how to set up remote access and verification checks. DPRK bad actors use freelancers to bypass sanctions Garcia found that DPRK operatives can bypass geographic filters, identity checks, and VPN detection systems that would normally block users from sanctioned countries by quietly using verified identities.  It enables them to apply for or perform remote IT jobs under a stolen or borrowed identity, concealing their origin while collecting payments from unsuspecting clients.  “These actors are organized, coordinated, and share operational playbooks. The consistency of their methods shows this is part of a repeatable, state-backed system,” the SEAL Intel member wrote. As reported by Cryptopolitan in August, several North Korean IT workers have infiltrated international companies using false identities. This has reportedly helped DPRK authorities deploy remote IT professionals abroad to secure freelance or contract roles under stolen or borrowed identities, coupled with shell companies masking their affiliation. Those whose identities are used receive only around 20% of total earnings, while the operatives keep 80%, funneled through crypto wallets or even traditional bank accounts.  Use of AI to manipulate images and company names García Pérez’s investigation uncovered several behaviors of technical sophistication and deliberate concealment. In one case, an IT worker had created a Google Drive folder labeled “My Photo,” where AI-edited portraits were stored together with folders bearing other individuals’ names. He believes these digital documents are separate personas managed by the same operator. The files he recovered from the drive had a deeper insight into the recruitment and payment processes. One file titled “Account” contained instructions explaining how to access Upwork, the purpose of the collaboration, and how profits would be divided.  Some of the folders were named in Korean, such as “it개발 매칭 플랫폼 사이트,” which translates to “IT development matching platform site.” The investigator propounded that such documents were used for “Korean-speaking users and the domestic IT ecosystem.” Heiner García Pérez also found that North Korean actors are exploiting online communities for disabled people, job-matching portals, and even friendship websites such as InterPals to recruit collaborators. DPRK Interpals recruitment email. Source: SEAL Intel Payment flows through crypto, PayPal, and banks Ideal targets of such operations are mostly located in the United States, Europe, and parts of Asia. However, Ukraine and the Philippines were the most frequently identified regions among recruitment materials because they have geographic locations for candidates in lower-income settings who may be more receptive to “fast-earning opportunities.” “If a client posts a project, many freelance users bid on that project. So, the client discusses their own project with freelancers and gives the project to the selected developer. If I choose, I can work on the client’s project. After the project is completed, I can receive money from the client. The money will be credited to your freelancer account,” one IT recruiter explained how to make money to a freelance account holder named “Ana.” The profit-sharing structure between operatives and collaborators is agreed upon early in the exchange. In most of the documented cases, IT workers convince victims to route through cryptos, PayPal, and even bank transfers. In one verified case, a North Korean IT worker used a fraudulent Upwork account registered under the identity of an Illinois-based architect. Want your project in front of crypto’s top minds? Feature it in our next industry report, where data meets impact.

North Korean operatives posing as recruiters to hijack verified freelancer accounts

2025/11/05 22:07
4 min read
For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

North Korean operatives have “diversified” their way of defrauding victims through freelancing and code-hosting platforms that recruit unsuspecting users as identity proxies for remote tech jobs, according to cybersecurity researchers. 

Democratic People’s Republic of Korea (DPRK) IT workers are using Upwork, Freelancer, and GitHub to impersonate legitimate workers and evade international sanctions by using verified accounts belonging to real people.

According to cybersecurity researcher Heiner García Pérez, a member of SEAL Intel, the hackers begin by posting freelance job offers or approaching candidates, then move conversations to encrypted channels like Telegram or Discord, where they provide detailed instructions on how to set up remote access and verification checks.

DPRK bad actors use freelancers to bypass sanctions

Garcia found that DPRK operatives can bypass geographic filters, identity checks, and VPN detection systems that would normally block users from sanctioned countries by quietly using verified identities. 

It enables them to apply for or perform remote IT jobs under a stolen or borrowed identity, concealing their origin while collecting payments from unsuspecting clients. 

“These actors are organized, coordinated, and share operational playbooks. The consistency of their methods shows this is part of a repeatable, state-backed system,” the SEAL Intel member wrote.

As reported by Cryptopolitan in August, several North Korean IT workers have infiltrated international companies using false identities. This has reportedly helped DPRK authorities deploy remote IT professionals abroad to secure freelance or contract roles under stolen or borrowed identities, coupled with shell companies masking their affiliation.

Those whose identities are used receive only around 20% of total earnings, while the operatives keep 80%, funneled through crypto wallets or even traditional bank accounts. 

Use of AI to manipulate images and company names

García Pérez’s investigation uncovered several behaviors of technical sophistication and deliberate concealment. In one case, an IT worker had created a Google Drive folder labeled “My Photo,” where AI-edited portraits were stored together with folders bearing other individuals’ names. He believes these digital documents are separate personas managed by the same operator.

The files he recovered from the drive had a deeper insight into the recruitment and payment processes. One file titled “Account” contained instructions explaining how to access Upwork, the purpose of the collaboration, and how profits would be divided. 

Some of the folders were named in Korean, such as “it개발 매칭 플랫폼 사이트,” which translates to “IT development matching platform site.” The investigator propounded that such documents were used for “Korean-speaking users and the domestic IT ecosystem.”

Heiner García Pérez also found that North Korean actors are exploiting online communities for disabled people, job-matching portals, and even friendship websites such as InterPals to recruit collaborators.

North Korean hackers target freelancers on Upwork, GitHubDPRK Interpals recruitment email. Source: SEAL Intel

Payment flows through crypto, PayPal, and banks

Ideal targets of such operations are mostly located in the United States, Europe, and parts of Asia. However, Ukraine and the Philippines were the most frequently identified regions among recruitment materials because they have geographic locations for candidates in lower-income settings who may be more receptive to “fast-earning opportunities.”

“If a client posts a project, many freelance users bid on that project. So, the client discusses their own project with freelancers and gives the project to the selected developer. If I choose, I can work on the client’s project. After the project is completed, I can receive money from the client. The money will be credited to your freelancer account,” one IT recruiter explained how to make money to a freelance account holder named “Ana.”

The profit-sharing structure between operatives and collaborators is agreed upon early in the exchange. In most of the documented cases, IT workers convince victims to route through cryptos, PayPal, and even bank transfers.

In one verified case, a North Korean IT worker used a fraudulent Upwork account registered under the identity of an Illinois-based architect.

Want your project in front of crypto’s top minds? Feature it in our next industry report, where data meets impact.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Fed forecasts only one rate cut in 2026, a more conservative outlook than expected

Fed forecasts only one rate cut in 2026, a more conservative outlook than expected

The post Fed forecasts only one rate cut in 2026, a more conservative outlook than expected appeared on BitcoinEthereumNews.com. Federal Reserve Chairman Jerome Powell talks to reporters following the regular Federal Open Market Committee meetings at the Fed on July 30, 2025 in Washington, DC. Chip Somodevilla | Getty Images The Federal Reserve is projecting only one rate cut in 2026, fewer than expected, according to its median projection. The central bank’s so-called dot plot, which shows 19 individual members’ expectations anonymously, indicated a median estimate of 3.4% for the federal funds rate at the end of 2026. That compares to a median estimate of 3.6% for the end of this year following two expected cuts on top of Wednesday’s reduction. A single quarter-point reduction next year is significantly more conservative than current market pricing. Traders are currently pricing in at two to three more rate cuts next year, according to the CME Group’s FedWatch tool, updated shortly after the decision. The gauge uses prices on 30-day fed funds futures contracts to determine market-implied odds for rate moves. Here are the Fed’s latest targets from 19 FOMC members, both voters and nonvoters: Zoom In IconArrows pointing outwards The forecasts, however, showed a large difference of opinion with two voting members seeing as many as four cuts. Three officials penciled in three rate reductions next year. “Next year’s dot plot is a mosaic of different perspectives and is an accurate reflection of a confusing economic outlook, muddied by labor supply shifts, data measurement concerns, and government policy upheaval and uncertainty,” said Seema Shah, chief global strategist at Principal Asset Management. The central bank has two policy meetings left for the year, one in October and one in December. Economic projections from the Fed saw slightly faster economic growth in 2026 than was projected in June, while the outlook for inflation was updated modestly higher for next year. There’s a lot of uncertainty…
Share
BitcoinEthereumNews2025/09/18 02:59
Whales Dump 200 Million XRP in Just 2 Weeks – Is XRP’s Price on the Verge of Collapse?

Whales Dump 200 Million XRP in Just 2 Weeks – Is XRP’s Price on the Verge of Collapse?

Whales offload 200 million XRP leaving market uncertainty behind. XRP faces potential collapse as whales drive major price shifts. Is XRP’s future in danger after massive sell-off by whales? XRP’s price has been under intense pressure recently as whales reportedly offloaded a staggering 200 million XRP over the past two weeks. This massive sell-off has raised alarms across the cryptocurrency community, as many wonder if the market is on the brink of collapse or just undergoing a temporary correction. According to crypto analyst Ali (@ali_charts), this surge in whale activity correlates directly with the price fluctuations seen in the past few weeks. XRP experienced a sharp spike in late July and early August, but the price quickly reversed as whales began to sell their holdings in large quantities. The increased volume during this period highlights the intensity of the sell-off, leaving many traders to question the future of XRP’s value. Whales have offloaded around 200 million $XRP in the last two weeks! pic.twitter.com/MiSQPpDwZM — Ali (@ali_charts) September 17, 2025 Also Read: Shiba Inu’s Price Is at a Tipping Point: Will It Break or Crash Soon? Can XRP Recover or Is a Bigger Decline Ahead? As the market absorbs the effects of the whale offload, technical indicators suggest that XRP may be facing a period of consolidation. The Relative Strength Index (RSI), currently sitting at 53.05, signals a neutral market stance, indicating that XRP could move in either direction. This leaves traders uncertain whether the XRP will break above its current resistance levels or continue to fall as more whales sell off their holdings. Source: Tradingview Additionally, the Bollinger Bands, suggest that XRP is nearing the upper limits of its range. This often points to a potential slowdown or pullback in price, further raising concerns about the future direction of the XRP. With the price currently around $3.02, many are questioning whether XRP can regain its footing or if it will continue to decline. The Aftermath of Whale Activity: Is XRP’s Future in Danger? Despite the large sell-off, XRP is not yet showing signs of total collapse. However, the market remains fragile, and the price is likely to remain volatile in the coming days. With whales continuing to influence price movements, many investors are watching closely to see if this trend will reverse or intensify. The coming weeks will be critical for determining whether XRP can stabilize or face further declines. The combination of whale offloading and technical indicators suggest that XRP’s price is at a crossroads. Traders and investors alike are waiting for clear signals to determine if the XRP will bounce back or continue its downward trajectory. Also Read: Metaplanet’s Bold Move: $15M U.S. Subsidiary to Supercharge Bitcoin Strategy The post Whales Dump 200 Million XRP in Just 2 Weeks – Is XRP’s Price on the Verge of Collapse? appeared first on 36Crypto.
Share
Coinstats2025/09/17 23:42
Wall Street expert predicts 80% Tesla stock crash in 2026

Wall Street expert predicts 80% Tesla stock crash in 2026

The post Wall Street expert predicts 80% Tesla stock crash in 2026 appeared on BitcoinEthereumNews.com. Tesla (NASDAQ: TSLA) FSD – the autonomous driving technology
Share
BitcoinEthereumNews2026/03/16 22:04