Security

Cyber-crime

North Korea's fake IT worker scam hauled in at least $88M over six years

DoJ thinks it's found the folks that ran it, and some of the 'IT warriors' sent out to fleece employers


North Korea's fake IT worker scams netted the hermit kingdom $88 million over six years, according to the US Department of Justice, which thinks it's found the people who run them.

The scam sees North Korean (DPRK) techies mask their identities and locations to secure remote jobs. They then funnel their ill-gotten booty into Pyongyang's coffers. Some also use their access privileges to steal info such as proprietary source code and then extort their employers with threats to expose corporate assets if not paid to keep quiet.

Even infosec businesses have fallen for the scam, which is sufficiently prevalent the FBI has offered guidance on how to avoid it.

A Thursday announcement from the feds and accompanying indictment [PDF] names two firms as the employers of North Korean scam workers – plus fourteen individuals who faked their way into jobs.

Interestingly, the named businesses apparently aren't even in North Korea.

According to the DoJ, one of the players – Yanbian Silverstar – is in China, and the other – Volasys Silverstar – is in Russia.

Both are accused of using "false, stolen, and borrowed identities" to score remote jobs – an effort the DoJ believes yielded "at least $88 million throughout the approximately six-year conspiracy" though that sum doesn't include extortion payments. The indictment details how the conspiracy targeted six US businesses, plus two non-profit organizations.

The indictment alleges the two firms employed at least 130 techies and that they were known internally as "IT warriors" and given a goal of earning $10,000 each every month.

It looks like they fell a little short. If the 130 workers were all employed for six years (72 months) on-target earnings would have generated $93.6 million. Those who did hit their targets could be rewarded with bonuses, prizes, or promotions.

The indictment describes a multi-layered management structure at the two Silverstars.

The Warriors apparently had stateside help, in the form of folks who bought them laptops and installed software that made it appear the North Korean workers were not in their home nation. The conspirators also allegedly created websites that appeared to be agencies that provided contract or freelance IT workers. Those fake businesses included Eden Programming Solutions, Purpleish Tech, Culture Box, Next Nets, Illusion Software, Baby Box Tech, Cubix Tech, and Helix.

Google's infosec subsidiary Mandiant told The Register that in recent months it has seen "an increase in extortion attempts linked to North Korean IT workers. And for the first time, we're seeing IT workers follow through on releasing sensitive data of organizations they've infiltrated to pressure victims into paying exorbitant ransoms."

Those demands are for larger quantities of cryptocurrency than requested in previous extortion campaigns. Mandiant thinks this is a sign these schemes are becoming less effective, and the DPRK is therefore escalating its demands to get what it can, while it can.

The US State Department seems keen to accelerate their demise. On Thursday it offered a $5 million reward for information that leads to the disruption of financial mechanisms of persons engaged in the schemes, and others that support North Korea's efforts to generate revenue, launder money, and "certain cyber activity that supports the DPRK's proliferation of weapons of mass destruction."

The FBI has published a wanted poster that names the fourteen accused – all of whom appear to be in the DPRK and therefore highly unlikely to be seen inside a US courtroom. Government authorities know that of course, but are still happy their investigations have identified some players and helped them understand how the schemes work.

However, the threat of fake IT workers remains real.

Special agent in charge Ashley T Johnson of the FBI St Louis Field Office cautioned against complacency: "While we have disrupted this group and identified its leadership, this is just the tip of the iceberg. The government of North Korea has trained and deployed thousands of IT workers to perpetrate this same scheme against US companies every day." ®

Send us news
2 Comments

North Korea targets crypto developers via NPM supply chain attack

Yet another cash grab from Kim's cronies and an intel update from Microsoft

Crimelords and spies for rogue states are working together, says Google

Only lawmakers can stop them. Plus: software needs to be more secure, but what's in it for us?

Arizona laptop farmer pleads guilty for funneling $17M to Kim Jong Un

300+ US companies, 70+ individuals hit by the fraudsters

Microsoft names alleged credential-snatching 'Azure Abuse Enterprise' operators

Crew helped lowlifes generate X-rated celeb deepfakes using Redmond's OpenAI-powered cloud – claim

Feds: Army soldier suspected of AT&T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’

FYI: What NOT to search after committing a crime

Tech jobs are now white-collar trades that need apprentices, not a career crawl

With a generation of networking engineers set to retire, is this how to give their successors a faster start?

With millions upon millions of victims, scale of unstoppable info-stealer malware laid bare

244M purloined passwords added to Have I Been Pwned thanks to govt tip-off

Drug-screening biz DISA took a year to disclose security breach affecting millions

If there's something nasty on your employment record, extortion scum could come calling

Xi know what you did last summer: China was all up in Republicans' email, says book

Of course, Microsoft is in the mix, isn't it

China's Silver Fox spoofs medical imaging apps to hijack patients' computers

Sly like a PRC cyberattack

Malware variants that target operational tech systems are very rare – but 2 were found last year

Fuxnet and FrostyGoop were both used in the Russia-Ukraine war

Southern Water takes the fifth over alleged $750K Black Basta ransom offer

Leaked chats and spilled secrets as AI helps decode circa 200K private talks