North Korea Uses Iranian Workers in Large-Scale IT Job Scams

North-Korea-Uses-Iranian-Workers-in-Large-Scale-IT-Job-Scams

North Korean State-Sponsored Recruitment of Iranian Workers for IT Job Fraud Uncovered

Internal documents obtained by cybersecurity researchers reveal a sophisticated scheme orchestrated by North Korean operatives to recruit Iranian workers for IT job placements in the United States, despite economic sanctions against Iran.

The Scheme Involves Fabricated Personas and Coaching

The scheme involves the use of fabricated personas and extensive coaching to facilitate successful applications and onboarding processes. According to the researchers’ analysis, North Korean recruiters targeted Iranian IT professionals through online platforms and social media.

According to the researchers’ report, “The North Korean operatives created fake profiles on popular job boards and social media platforms to target Iranian IT professionals. They then contacted the candidates and offered them lucrative job opportunities in the United States.”

Candidates Coached on Interview Preparation and Onboarding Procedures

Once identified, the operatives coached the candidates on interview preparation, job skills, and onboarding procedures, including the procurement of laptops and compliance with US employment regulations.

  • Recruiters targeted Iranian IT professionals through online platforms and social media.
  • Fabricated personas were used to facilitate successful applications and onboarding processes.
  • Candidates were coached on interview preparation, job skills, and onboarding procedures.
  • Significant commissions were earned from each placement, ranging from $2,700 to $5,000 per month.
  • Fluency in English was a key requirement for successful applicants.
  • The use of English in internal documents suggests that North Korean operatives may have been practicing their language skills.

Key Takeaways from the Investigation

The findings highlight the complexity and sophistication of North Korean state-sponsored cyber operations, as well as the need for continued vigilance and cooperation among international authorities to combat such threats.



About Author

en_USEnglish