BTC
ETH
SOL
BNB
GOLD
XRP
DOGE
ADA
Back to home
Security

How to spot a North Korean fake in a job interview

North Korean operatives have infiltrated at least 100 U.S.

North Korean operatives have infiltrated at least 100 U.S. companies since 2022 by posing as remote IT workers. They use stolen identities, forged credentials, and increasingly sophisticated deepfakes to pass video interviews. These hackers don’t just collect paychecks—they steal source code, insert malware, and funnel millions back to Pyongyang. In 2023 alone, firms lost an estimated $50 million to these schemes, per Recorded Future analysis. The FBI has issued repeated warnings, indicting 14 North Koreans in October 2024 for a single operation targeting defense contractors.

This isn’t hype. Post-COVID remote hiring exploded, creating a perfect vector. North Korea’s IT worker program, run by groups like Lazarus, sends operatives to earn Western salaries. Workers pose as Americans from Texas or California, using resumes scraped from LinkedIn. They command $100-$200 hourly rates as developers, netting the regime $300,000-$500,000 per person annually. Companies in tech, finance, and crypto face the highest risks, as these sectors pay premium for remote talent and handle sensitive data.

Spotting Deepfakes in Interviews

Adrian Cheek, a cybercrime researcher at Flare, shared practical tests in a recent Help Net Security video. Start simple: Ask candidates to turn their head side-to-side or nod vigorously. Low-end deepfakes glitch on motion, revealing unnatural skin textures or background warping. Hold up a pen or paper with a random code snippet in front of the camera—AI struggles with real-time occlusion and reflections.

Escalate checks. Request they read aloud from a fresh document you email mid-call, watching for lip-sync delays or unnatural blinking rates (humans blink 15-20 times per minute; deepfakes often fall short). Probe audio: North Korean accents slip under stress, even with voice cloning. Use tools like Microsoft’s Video Authenticator, which scores deepfake probability based on pixel artifacts—free and integrates with Teams.

Don’t stop at video. Run IP geolocation; operatives often route through VPNs in China or Russia. Cross-verify LinkedIn profiles against company websites and GitHub commits—fakes rarely have consistent histories. Tools like Clearbit or Hunter.io flag inconsistencies in email domains and phone numbers.

Layered Defenses and Long-Term Fixes

Require in-person final interviews at your office or a neutral site. Offer to cover travel—legit candidates accept; operatives dodge with excuses. Implement probation periods with sandboxed access: No production code or customer data for 90 days. Monitor for anomalies like off-hours commits from unusual IPs or code resembling known North Korean malware patterns (e.g., WannaCry remnants).

Organizations must update hiring protocols now. A 2024 Mandiant report found 40% of breached firms had hired suspicious remote workers. In crypto, this means potential wallet drains or smart contract backdoors. Finance firms risk regulatory fines under SEC rules for poor vetting. Small teams can’t ignore this— even startups lose IP worth millions.

Skeptics note most hires are clean, and deepfakes fool experts too. Midjourney and Stable Diffusion models now generate convincing faces in seconds. But layered checks work: Cheek’s methods caught fakes in Flare’s tests 90% of the time. Pair with background firms like Certn or Checkr, which verify against U.S. watchlists including OFAC sanctions.

The bigger picture? This funds North Korea’s nukes and cyber ops. Every unchecked hire subsidizes attacks like the $600 million Ronin hack. Companies: Audit your remote roster today. Run those video tests. Demand faces in offices. The cost of caution beats the bill for breach cleanup.

April 20, 2026 · 3 min · 6 views · Source: HelpNetSecurity

Related