A new wave of identity fraud has hit the remote job market, with North Korean (DPRK) operatives adopting a sophisticated new tactic to bypass hiring screens.
This development marks a significant shift in tradecraft. Previously, these operatives often relied on fabricated profiles with AI-generated headshots and fake resumes.
However, hiring managers and security teams have become adept at spotting these inconsistencies. In response, DPRK actors are now leveraging the credibility of actual people, creating a “camouflage” that is much harder to detect.
Security researchers have observed DPRK IT workers hijacking or mimicking legitimate LinkedIn accounts to apply for remote positions at Western technology companies.
How the Scheme Works
The core of this strategy involves gaining access to or replicating the LinkedIn profiles of real individuals. By using an existing account, the attackers inherit the victim’s professional history, connections, and, crucially, their verified status.
Many of these compromised or impersonated profiles feature “verified” badges. These verifications often rely on workplace email addresses or government ID checks that the original account owner completed.
Once the operatives control the narrative, they use these trust signals to apply for remote software development and IT roles.
Because the profile looks authentic complete with a genuine employment history and endorsements recruiters are less likely to flag the application as suspicious during the initial review.
The goal of these operatives is generally two-fold: generating revenue for the North Korean regime and gaining potential access to sensitive corporate networks.
By securing employment at tech firms, these workers can funnel their salaries back to the DPRK, evading international sanctions.
Furthermore, once inside a company’s systems, they pose a significant insider threat, capable of stealing intellectual property or introducing malware.
Red Flags for Hiring Managers
Despite the sophisticated cover, there are still warning signs that recruitment teams can look for:
- Mismatched Communication: The candidate may refuse video calls or use excuses to avoid being seen on camera. If they do appear, the lighting or background may look inconsistent with their alleged location.
- Location Inconsistencies: Login metadata or IP addresses during the interview process might not match the location listed on the LinkedIn profile.
- Skill Discrepancies: While the resume might be perfect, the actual technical interview might reveal a different coding style or skill level than expected for the person they are impersonating.
- Urgency and Salary: Operatives are often eager to start immediately and may request that salary payments be routed through complicated channels or to accounts that don’t match the applicant’s name.
This trend highlights the need for rigorous identity verification during the hiring process. Relying solely on social media verification badges is no longer sufficient.
Companies must verify candidates through live video interviews and multi-factor identity checks to ensure the person on the screen matches the profile on the application.
Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.

