North Korean hackers impersonate remote IT workers to infiltrate European companies

North Korea’s state-sponsored hacking operations have turned human resources into a proxy battleground. Cyber operatives from the regime are no longer just stealing crypto or conducting ransomware campaigns. Now, they’re logging into your systems as “employees.” And Europe is becoming a preferred destination.

Here’s what’s happening: Trained operatives are applying for legitimate remote IT roles at European companies. They craft fake résumés, forge academic records, some even include degrees from Belgrade University, and conceal their true identities behind AI-edited photos and profile data. Once hired, they gain access to internal infrastructures, mirroring the behavior of real contributors. The goal is direct: generate foreign currency and obtain sensitive data. This includes proprietary IP and corporate access credentials that can feed back into North Korea’s wider cyber and espionage campaigns.

These operations have been quietly shifting from the U.S. to Europe. The reason is tactical. The U.S. has cracked down hard. Indictments have been issued, right-to-work verification is tightening, and the awareness of fake profiles is rising. That pressure is forcing adaptation, and for the operatives, the logical next step is Europe.

Google’s Threat Intelligence Group has been tracking this closely. Jamie Collier, Lead Threat Intelligence Advisor for Europe at the division, makes the point very directly: “Europe needs to wake up fast.” He’s right. This is no longer just a compliance issue or a background check oversight. This is frontline cybersecurity. And if you’re not actively vetting your remote hires with aggressive verification tools, you’re assuming risk you can’t quantify.

Jobs boards, freelance platforms like Upwork and Freelancer, and even enterprise HR portals are all entry points. These hackers are disciplined, resourced, and now targeting bigger organizations across the U.K., Germany, Portugal, and Serbia.

Real companies are already compromised. If you don’t disrupt how you evaluate digital talent now, you may find you’ve onboarded someone who’s misrepresenting experience and posing a national security threat. The attackers aren’t going to stop. They’ve just changed geography. How your organization responds will say a lot about its trust model and risk maturity.

Escalation in tactics and aggressive behavior under operational pressure

The tactics are changing, and fast. North Korean operatives posing as remote IT workers are becoming more aggressive and less concerned with covering their tracks. What was once a low-profile infiltration strategy is now becoming a high-risk, high-reward pressure play. These actors are no longer just embedded quietly in your systems, they’re issuing threats on the way out.

Early on, these operatives operated with care. When they were terminated, the overall goal was to keep bridges intact, hoping for future rehire elsewhere. That era is over. Now, when they’re discovered or let go, many opt for retaliation. This includes threatening to expose corporate IP, leak proprietary data publicly, or demand crypto-based payouts in exchange for silence.

Why the shift? Because the environment is closing in. Enforcement in the U.S. has hardened. Right-to-work mechanisms are more strict, identity verification is tougher to bypass, and indictments are making it harder for operatives to recycle tactics that previously worked. Pressure from law enforcement and corporate defenses is pushing these actors to respond, by escalating.

Jamie Collier at Google, who advises on threat intelligence across Europe, points to this adjustment as part of a decade-long arc of cyber innovation from North Korea. The regime has historically sought foreign currency through digital crime. This includes high-profile thefts like the SWIFT banking attack, widespread cryptocurrency theft, ransomware deployments, and supply chain compromises. These remote worker threats are part of the same pattern, just better camouflaged.

Executives should understand that this a state-backed operation trying to extract value in any way possible. That includes turning your own security blind spots, like how you handle virtual dismissals, into leverage.

If you don’t already have playbooks for workforce termination that account for the risk of embedded actors retaliating, you’re not equipped to deal with the evolving threat. Access controls after termination need to be absolute. Data access logs must be monitored well after departure. And system segmentation is no longer optional, it’s foundational. The attackers plan strategically. Companies should respond the same way.

Deployment of advanced disguise methods and AI-Driven tactics

The North Korean operatives are evolving.  We’re now seeing widespread use of AI, automation, and stolen identity data to create entirely fake personas that pass as qualified global tech workers. It’s no longer unusual for a candidate to use a deepfake in a video interview or to submit a CV built from harvested credentials and job history from real people.

These attackers present themselves as professionals from various countries, Italy, Japan, Singapore, Ukraine, Vietnam, the U.S., to match hiring preferences. They’re manufacturing legitimacy using AI-written bios, localized language settings, and culturally accurate communications translated in real time through writing tools. Some even provide fabricated references using other digital identities they control to vouch for themselves. From the surface, it all looks real. That’s the point.

What the operatives offer during the hiring process, competencies in blockchain development, AI applications, CMS platforms, and bots, is designed to align with high-demand, high-trust engineering roles. In reality, it’s a smokescreen for sustained access to your platform or product environment. Once inside, they perform enough to appear legitimate, while extracting value under the radar. Your hiring pipeline, if unfortified, becomes the entry point.

One of the most effective cover mechanisms is the use of AI to fabricate identities indistinguishable from real candidates. That includes photorealistic profile images and sophisticated written communication. These tools remove many of the traditional red flags that recruiters or HR teams rely on, facial inconsistencies, poor grammar, or mismatched documentation. The attackers understand how hiring processes work and design their fraud to bypass those inputs.

For C-suite leaders, this isn’t just a security concern, it’s a talent pipeline issue. If your company relies heavily on remote hiring for specialized tech roles, especially through freelance platforms like Upwork or Freelancer, you’re in scope.

Security teams should be coordinating with HR to assess how candidate identity verification is carried out. Automated tools, multi-layer verification systems, and geoposition checks need to be part of standard operating procedure. Without this shift in process, the operatives will keep moving through your front door disguised as experts ready to help.

Facilitators in western regions support employment fraud

The North Korean remote worker scheme isn’t operating in isolation. It’s supported by a growing network of facilitators, real people and entities based in the U.S., the U.K., and other target markets, who help these operatives infiltrate companies more efficiently. These facilitators aren’t formal agents of the regime. They’re opportunists who provide critical services: identity laundering, credential fabrication, and job prospecting support.

Google’s research has traced several of these networks. In one case, a corporate laptop registered in New York was found to be operating out of London, tied directly to a fraudulent candidate. This isn’t an unusual outlier. It’s evidence of coordinated support that gives North Korea’s operatives local access points, making them seem more authentic and harder to flag during standard compliance or IT due diligence.

These facilitators help set up everything from fake passports to local phone numbers. They supply tips on how to use region-specific time zones, cultural references, and employment norms to sound credible in interviews. Some even coach operatives on platform-specific strategies for hiring sites like Upwork or local European job marketplaces. Every detail is designed to pass scrutiny from internal recruiters and automated applicant screening systems.

If you’re a C-level executive running distributed teams, this requires a mindset shift. Your hiring vulnerability can be reinforced locally through people who know how to bypass your controls. Relying on geographic cues or assumed location-based trust won’t help when your recruitment target has access to enablers with insider-level knowledge of your market.

Companies need to begin treating talent onboarding as a potential vector for cyber compromise, especially when hiring across borders. Work with platforms that provide verified credentials. Perform cross-checks on documentation. Confirm IP locations at the time of the interview and match them with submitted information.

Ignoring the role of facilitators makes detection harder. A North Korean operative with professional coaching, region-specific behaviors, and falsified paperwork doesn’t fit the profile most security teams are told to look for. That’s why it works.

Vulnerabilities in companies with bring your own device (BYOD) policies

North Korean operatives are exploiting a security gap that many organizations still underestimate, Bring Your Own Device (BYOD) environments. Companies that allow employees to use personal laptops to access internal systems are exposing themselves to a threat architecture that is inherently harder to secure and monitor. Since January, Google’s Threat Intelligence Group has observed an uptick in attackers deliberately targeting companies with distributed, BYOD-enabled workforces.

Here’s why it works: personal devices often bypass centralized security policies. They don’t have the same endpoint monitoring, system-level logging, or configuration enforcement that come standard with a company-issued machine. When attackers use their own unmanaged hardware to connect to company infrastructure via virtual machines, there’s no physical audit trail. There’s no shipping address to verify. There’s no inventory profile to flag. That makes detection slower, and in many cases, nonexistent.

In a BYOD environment, it’s tougher to enforce access restrictions or verify actual user identities consistently across devices. The attacker blends in. They’re working from hardware you didn’t configure, in a location you didn’t validate, under an identity you thought was real. Once access is granted, they functionally operate like any other remote employee. This gives them time, time to observe, export, and embed deeper within your environment.

From an executive standpoint, this demands a review of two things: endpoint policy and identity verification thresholds. If your security strategy assumes trust based on successful login alone, you’re only defending against amateurs. Your systems need layered controls. That includes behavioral anomaly detection (what is the user doing?), device fingerprinting (what are they doing it from?), and session monitoring (how are those behaviors changing?).

You don’t need to ban BYOD entirely to solve the threat. But you do need to treat BYOD devices with controlled, limited privilege inside the environment. Apply strict segmentation. Monitor for lateral movement. Ensure offboarding protocols revoke all access regardless of device origin. These attackers are targeting the path of least resistance, and BYOD, without hard containment, is currently it.

Key takeaways for leaders

  • North Korean hackers are infiltrating via fake IT hires: State-backed operatives are posing as remote IT workers using fake résumés, AI-generated profiles, and stolen identities to secure roles at European companies. Leaders should ensure rigorous identity verification in remote hiring pipelines to protect sensitive systems.
  • Tactics are becoming more aggressive post-hire: Operatives now threaten to leak corporate data when terminated, signaling a move from passive access to active extortion. Executives must implement post-dismissal access controls and enforce real-time revocation of credentials.
  • AI and synthetic identities are masking attackers: Attackers are using AI tools to build credible fake personas, complete with deepfake videos, localization cues, and fake references. Security and HR teams should deploy multi-factor identity checks and behavioral flagging to detect anomalies.
  • Western-based facilitators are enabling fraud: Local enablers in the U.S. and U.K. help operatives bypass verification and secure jobs with fake documents and login access. Decision-makers should reevaluate trust assumptions and require stricter cross-border onboarding procedures.
  • BYOD environments increase exposure to compromise: Personal devices lack enterprise-grade monitoring and give attackers more cover once inside networks. Companies should segment BYOD access, assign minimal privileges, and monitor device behavior to reduce risk.

Alexander Procter

April 16, 2025

10 Min