North Korean operatives have “diversified” their way of defrauding victims through freelancing and code-hosting platforms that recruit unsuspecting users as identity proxies for remote tech jobs, according to cybersecurity researchers.  Democratic People’s Republic of Korea (DPRK) IT workers are using Upwork, Freelancer, and GitHub to impersonate legitimate workers and evade international sanctions by using verified accounts belonging to real people. According to cybersecurity researcher Heiner García Pérez, a member of SEAL Intel, the hackers begin by posting freelance job offers or approaching candidates, then move conversations to encrypted channels like Telegram or Discord, where they provide detailed instructions on how to set up remote access and verification checks. DPRK bad actors use freelancers to bypass sanctions Garcia found that DPRK operatives can bypass geographic filters, identity checks, and VPN detection systems that would normally block users from sanctioned countries by quietly using verified identities.  It enables them to apply for or perform remote IT jobs under a stolen or borrowed identity, concealing their origin while collecting payments from unsuspecting clients.  “These actors are organized, coordinated, and share operational playbooks. The consistency of their methods shows this is part of a repeatable, state-backed system,” the SEAL Intel member wrote. As reported by Cryptopolitan in August, several North Korean IT workers have infiltrated international companies using false identities. This has reportedly helped DPRK authorities deploy remote IT professionals abroad to secure freelance or contract roles under stolen or borrowed identities, coupled with shell companies masking their affiliation. Those whose identities are used receive only around 20% of total earnings, while the operatives keep 80%, funneled through crypto wallets or even traditional bank accounts.  Use of AI to manipulate images and company names García Pérez’s investigation uncovered several behaviors of technical sophistication and deliberate concealment. In one case, an IT worker had created a Google Drive folder labeled “My Photo,” where AI-edited portraits were stored together with folders bearing other individuals’ names. He believes these digital documents are separate personas managed by the same operator. The files he recovered from the drive had a deeper insight into the recruitment and payment processes. One file titled “Account” contained instructions explaining how to access Upwork, the purpose of the collaboration, and how profits would be divided.  Some of the folders were named in Korean, such as “it개발 매칭 플랫폼 사이트,” which translates to “IT development matching platform site.” The investigator propounded that such documents were used for “Korean-speaking users and the domestic IT ecosystem.” Heiner García Pérez also found that North Korean actors are exploiting online communities for disabled people, job-matching portals, and even friendship websites such as InterPals to recruit collaborators. DPRK Interpals recruitment email. Source: SEAL Intel Payment flows through crypto, PayPal, and banks Ideal targets of such operations are mostly located in the United States, Europe, and parts of Asia. However, Ukraine and the Philippines were the most frequently identified regions among recruitment materials because they have geographic locations for candidates in lower-income settings who may be more receptive to “fast-earning opportunities.” “If a client posts a project, many freelance users bid on that project. So, the client discusses their own project with freelancers and gives the project to the selected developer. If I choose, I can work on the client’s project. After the project is completed, I can receive money from the client. The money will be credited to your freelancer account,” one IT recruiter explained how to make money to a freelance account holder named “Ana.” The profit-sharing structure between operatives and collaborators is agreed upon early in the exchange. In most of the documented cases, IT workers convince victims to route through cryptos, PayPal, and even bank transfers. In one verified case, a North Korean IT worker used a fraudulent Upwork account registered under the identity of an Illinois-based architect. Want your project in front of crypto’s top minds? Feature it in our next industry report, where data meets impact.North Korean operatives have “diversified” their way of defrauding victims through freelancing and code-hosting platforms that recruit unsuspecting users as identity proxies for remote tech jobs, according to cybersecurity researchers.  Democratic People’s Republic of Korea (DPRK) IT workers are using Upwork, Freelancer, and GitHub to impersonate legitimate workers and evade international sanctions by using verified accounts belonging to real people. According to cybersecurity researcher Heiner García Pérez, a member of SEAL Intel, the hackers begin by posting freelance job offers or approaching candidates, then move conversations to encrypted channels like Telegram or Discord, where they provide detailed instructions on how to set up remote access and verification checks. DPRK bad actors use freelancers to bypass sanctions Garcia found that DPRK operatives can bypass geographic filters, identity checks, and VPN detection systems that would normally block users from sanctioned countries by quietly using verified identities.  It enables them to apply for or perform remote IT jobs under a stolen or borrowed identity, concealing their origin while collecting payments from unsuspecting clients.  “These actors are organized, coordinated, and share operational playbooks. The consistency of their methods shows this is part of a repeatable, state-backed system,” the SEAL Intel member wrote. As reported by Cryptopolitan in August, several North Korean IT workers have infiltrated international companies using false identities. This has reportedly helped DPRK authorities deploy remote IT professionals abroad to secure freelance or contract roles under stolen or borrowed identities, coupled with shell companies masking their affiliation. Those whose identities are used receive only around 20% of total earnings, while the operatives keep 80%, funneled through crypto wallets or even traditional bank accounts.  Use of AI to manipulate images and company names García Pérez’s investigation uncovered several behaviors of technical sophistication and deliberate concealment. In one case, an IT worker had created a Google Drive folder labeled “My Photo,” where AI-edited portraits were stored together with folders bearing other individuals’ names. He believes these digital documents are separate personas managed by the same operator. The files he recovered from the drive had a deeper insight into the recruitment and payment processes. One file titled “Account” contained instructions explaining how to access Upwork, the purpose of the collaboration, and how profits would be divided.  Some of the folders were named in Korean, such as “it개발 매칭 플랫폼 사이트,” which translates to “IT development matching platform site.” The investigator propounded that such documents were used for “Korean-speaking users and the domestic IT ecosystem.” Heiner García Pérez also found that North Korean actors are exploiting online communities for disabled people, job-matching portals, and even friendship websites such as InterPals to recruit collaborators. DPRK Interpals recruitment email. Source: SEAL Intel Payment flows through crypto, PayPal, and banks Ideal targets of such operations are mostly located in the United States, Europe, and parts of Asia. However, Ukraine and the Philippines were the most frequently identified regions among recruitment materials because they have geographic locations for candidates in lower-income settings who may be more receptive to “fast-earning opportunities.” “If a client posts a project, many freelance users bid on that project. So, the client discusses their own project with freelancers and gives the project to the selected developer. If I choose, I can work on the client’s project. After the project is completed, I can receive money from the client. The money will be credited to your freelancer account,” one IT recruiter explained how to make money to a freelance account holder named “Ana.” The profit-sharing structure between operatives and collaborators is agreed upon early in the exchange. In most of the documented cases, IT workers convince victims to route through cryptos, PayPal, and even bank transfers. In one verified case, a North Korean IT worker used a fraudulent Upwork account registered under the identity of an Illinois-based architect. Want your project in front of crypto’s top minds? Feature it in our next industry report, where data meets impact.

North Korean operatives posing as recruiters to hijack verified freelancer accounts

North Korean operatives have “diversified” their way of defrauding victims through freelancing and code-hosting platforms that recruit unsuspecting users as identity proxies for remote tech jobs, according to cybersecurity researchers. 

Democratic People’s Republic of Korea (DPRK) IT workers are using Upwork, Freelancer, and GitHub to impersonate legitimate workers and evade international sanctions by using verified accounts belonging to real people.

According to cybersecurity researcher Heiner García Pérez, a member of SEAL Intel, the hackers begin by posting freelance job offers or approaching candidates, then move conversations to encrypted channels like Telegram or Discord, where they provide detailed instructions on how to set up remote access and verification checks.

DPRK bad actors use freelancers to bypass sanctions

Garcia found that DPRK operatives can bypass geographic filters, identity checks, and VPN detection systems that would normally block users from sanctioned countries by quietly using verified identities. 

It enables them to apply for or perform remote IT jobs under a stolen or borrowed identity, concealing their origin while collecting payments from unsuspecting clients. 

“These actors are organized, coordinated, and share operational playbooks. The consistency of their methods shows this is part of a repeatable, state-backed system,” the SEAL Intel member wrote.

As reported by Cryptopolitan in August, several North Korean IT workers have infiltrated international companies using false identities. This has reportedly helped DPRK authorities deploy remote IT professionals abroad to secure freelance or contract roles under stolen or borrowed identities, coupled with shell companies masking their affiliation.

Those whose identities are used receive only around 20% of total earnings, while the operatives keep 80%, funneled through crypto wallets or even traditional bank accounts. 

Use of AI to manipulate images and company names

García Pérez’s investigation uncovered several behaviors of technical sophistication and deliberate concealment. In one case, an IT worker had created a Google Drive folder labeled “My Photo,” where AI-edited portraits were stored together with folders bearing other individuals’ names. He believes these digital documents are separate personas managed by the same operator.

The files he recovered from the drive had a deeper insight into the recruitment and payment processes. One file titled “Account” contained instructions explaining how to access Upwork, the purpose of the collaboration, and how profits would be divided. 

Some of the folders were named in Korean, such as “it개발 매칭 플랫폼 사이트,” which translates to “IT development matching platform site.” The investigator propounded that such documents were used for “Korean-speaking users and the domestic IT ecosystem.”

Heiner García Pérez also found that North Korean actors are exploiting online communities for disabled people, job-matching portals, and even friendship websites such as InterPals to recruit collaborators.

North Korean hackers target freelancers on Upwork, GitHubDPRK Interpals recruitment email. Source: SEAL Intel

Payment flows through crypto, PayPal, and banks

Ideal targets of such operations are mostly located in the United States, Europe, and parts of Asia. However, Ukraine and the Philippines were the most frequently identified regions among recruitment materials because they have geographic locations for candidates in lower-income settings who may be more receptive to “fast-earning opportunities.”

“If a client posts a project, many freelance users bid on that project. So, the client discusses their own project with freelancers and gives the project to the selected developer. If I choose, I can work on the client’s project. After the project is completed, I can receive money from the client. The money will be credited to your freelancer account,” one IT recruiter explained how to make money to a freelance account holder named “Ana.”

The profit-sharing structure between operatives and collaborators is agreed upon early in the exchange. In most of the documented cases, IT workers convince victims to route through cryptos, PayPal, and even bank transfers.

In one verified case, a North Korean IT worker used a fraudulent Upwork account registered under the identity of an Illinois-based architect.

Want your project in front of crypto’s top minds? Feature it in our next industry report, where data meets impact.

Market Opportunity
ConstitutionDAO Logo
ConstitutionDAO Price(PEOPLE)
$0.010529
$0.010529$0.010529
-1.12%
USD
ConstitutionDAO (PEOPLE) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Sunmi Cuts Clutter and Boosts Speed with New All-in-One Mobile Terminal & Scanner-Printer

Sunmi Cuts Clutter and Boosts Speed with New All-in-One Mobile Terminal & Scanner-Printer

SINGAPORE, Jan. 16, 2026 /PRNewswire/ — Business Challenge: Stores today face dual pressures: the need for faster, more flexible customer service beyond fixed counters
Share
AI Journal2026/01/16 20:31
Franklin Templeton CEO Dismisses 50bps Rate Cut Ahead FOMC

Franklin Templeton CEO Dismisses 50bps Rate Cut Ahead FOMC

The post Franklin Templeton CEO Dismisses 50bps Rate Cut Ahead FOMC appeared on BitcoinEthereumNews.com. Franklin Templeton CEO Jenny Johnson has weighed in on whether the Federal Reserve should make a 25 basis points (bps) Fed rate cut or 50 bps cut. This comes ahead of the Fed decision today at today’s FOMC meeting, with the market pricing in a 25 bps cut. Bitcoin and the broader crypto market are currently trading flat ahead of the rate cut decision. Franklin Templeton CEO Weighs In On Potential FOMC Decision In a CNBC interview, Jenny Johnson said that she expects the Fed to make a 25 bps cut today instead of a 50 bps cut. She acknowledged the jobs data, which suggested that the labor market is weakening. However, she noted that this data is backward-looking, indicating that it doesn’t show the current state of the economy. She alluded to the wage growth, which she remarked is an indication of a robust labor market. She added that retail sales are up and that consumers are still spending, despite inflation being sticky at 3%, which makes a case for why the FOMC should opt against a 50-basis-point Fed rate cut. In line with this, the Franklin Templeton CEO said that she would go with a 25 bps rate cut if she were Jerome Powell. She remarked that the Fed still has the October and December FOMC meetings to make further cuts if the incoming data warrants it. Johnson also asserted that the data show a robust economy. However, she noted that there can’t be an argument for no Fed rate cut since Powell already signaled at Jackson Hole that they were likely to lower interest rates at this meeting due to concerns over a weakening labor market. Notably, her comment comes as experts argue for both sides on why the Fed should make a 25 bps cut or…
Share
BitcoinEthereumNews2025/09/18 00:36
State Street Corporation (NYSE: STT) Reports Fourth-Quarter and Full-Year 2025 Financial Results

State Street Corporation (NYSE: STT) Reports Fourth-Quarter and Full-Year 2025 Financial Results

BOSTON–(BUSINESS WIRE)–State Street Corporation (NYSE: STT) reported its fourth-quarter and full-year 2025 financial results today. The news release, presentation
Share
AI Journal2026/01/16 20:46