The North Korean employee scheme has expanded into a world menace. Though it initially targeted on U.S. expertise corporations, the scheme has unfold to different areas and sectors, together with finance, healthcare, and authorities. Any firm hiring distant employees is in danger; as a remote-first expertise firm, even Sophos has been focused by North Korean state-sponsored operatives posing as IT employees.
Assessing the chance
The menace actors goal high-paying, totally distant jobs, primarily in search of to acquire a wage that may fund North Korean authorities pursuits. They sometimes apply for software program engineering, internet growth, AI/machine studying, knowledge science, and cybersecurity positions, though they’ve expanded into different roles as effectively.
There are various dangers to organizations which can be infiltrated by these menace actors. Using North Korean employees might violate sanctions. Moreover, the menace actors may conduct conventional insider menace actions similar to unauthorized entry and theft of delicate knowledge. Fraudulent employees might complement income era through the use of threats of knowledge publicity to extort the group, particularly after they’ve been terminated.
Organizational measurement doesn’t seem like an element on this scheme. Sophos has noticed focusing on of solo operations in search of contractors or momentary assist all the way in which as much as Fortune 500 corporations. Employees at bigger corporations are sometimes employed through an exterior company, the place employment checks might not be rigorous.
How we may help
We’ve been honing an inner initiative that takes a cross-functional strategy to addressing this menace. All through this course of, we discovered a wealth of defensive steerage accessible to organizations. Nonetheless, compiling it right into a coherent and actionable set of controls required vital effort. For defenders, understanding what to do is usually easy. The true problem lies in how to do it.
Anybody who has carried out controls is aware of that what seems easy on paper can shortly evolve into a posh design problem, particularly when aiming for scalable, sensible, and sustainable options. We determined to publish a playbook to help different organizations navigating this menace. In growing these supplies, we prioritized specificity over broad applicability. The controls are based mostly on finest practices, our personal processes, and menace intelligence from our safety researchers who’ve been monitoring the ways, methods, and procedures (TTPs) utilized by the North Korean menace actors.
The playbook features a toolkit that incorporates two variations of a management matrix (static and venture manager-ready), an implementation information, and coaching slides. We break up the management matrix into eight classes that span worker acquisition by way of post-hire:
- HR and course of controls
- Interview and vetting
- Identification and verification
- Banking, payroll, and finance
- Safety and monitoring
- Third-party and staffing
- Coaching
- Risk searching
The matrix lists technical and course of controls, as avoiding and evicting fraudulent North Korean employees isn’t merely, and even primarily, a matter of expertise. The answer requires collaboration throughout inner groups similar to HR, IT, authorized, finance, and cybersecurity, in addition to exterior contractors. The ‘venture manager-ready’ model contains extra worksheets for producing pivot tables to replicate management standing and possession. The worksheets are pre-populated with knowledge as an example the performance.
A few of these controls might not be acceptable for all organizations, however we provide this toolkit as a useful resource. We encourage organizations to adapt the suggestions to go well with their environments and menace fashions.









