The Infiltration You May Never See Coming

The recent guilty pleas, crackdowns and sanctions prove the threat is persistent, active, and growing.
20 Nov
Kevin Prendergast
President

Introduction: A Mounting and Escalating Threat

In just the past month, the U.S. government has taken two significant actions that underscore the severity and persistence of the threat posed by North Korean operatives posing as legitimate job candidates in the US workforce. Over 1,000 U.S. employers have been affected with damages estimated at $800 million in ransomware payments, remediation efforts and stolen identities and sensitive information.

On November 3, 2025, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) imposed new sanctions against two individuals and four entities tied to a network supporting North Korea’s weapons programs through fraudulent workers.

On November 15, 2025, the U.S. Department of Justice announced guilty pleas from five individuals who admitted to participating in a scheme to place North Korean IT workers into U.S.-based companies to unlawfully generate revenue for the DPRK government. The Justice Department reported that the perpetrators tricked more than 136 companies into hiring them and generated over $2.2 million for the DPRK regime.

These actions follow a July, 2025 coordinated action across 16 states against 29 suspected “laptop farms” being used by DPRK operatives. Using fictitious and stolen identities, operatives obtained employment at over 100 US companies including several Fortune 500 businesses. A month earlier, the FBI conducted 21 searches across 14 states in a crackdown of known and suspected laptop farms. That same week, Microsoft suspended over 3,000 accounts created by North Korean workers tied to schemes to land employment at US firms. “There are very few major companies in the US that haven’t been touched by this scam at this point. It’s an epidemic,” said John Hultquist, Chief Analyst at Google Threat Intelligence Group.

These developments over the past six months send a clear and urgent signal: this is not an isolated threat. It is a state-backed, globally dispersed, and increasingly sophisticated campaign to exploit the global talent economy to fund weapons development and evade international sanctions.

For U.S. employers, this presents more than just a national security concern—it is a compliance, reputational, and operational risk. Michael Barnhart, an investigator at cybersecurity firm DTEX, stated, “Nearly every US corporation hiring for remote positions has received applications from North Koreans. Governments and corporations have begun taking the threat more seriously as they realize the breadth of the problem.”

The Scheme: How It Works

North Korea has deployed thousands of highly skilled workers to operate under false identities, using stolen or synthetic documentation, forged credentials, and remote work platforms to embed themselves into Western businesses. Often posing as South Korean, Chinese, or other non-DPRK nationals, these workers:

  • Use false names, stolen or borrowed identities, and falsified work histories to pass through initial screenings.
  • Work for months or even years undetected, often engaging in software development, mobile application builds, and even roles in cryptocurrency, finance, or AI development.
  • Remit up to 90% of their earnings back to the North Korean regime, directly funding weapons development, including weapons of mass destruction (WMD) and ballistic missile programs.

The workers operate under the direction of North Korea’s Department 53, a weapons-trading entity that uses legitimate-seeming front companies—such as Osong Shipping Co. and Chonsurim Trading Corporation—to place workers in foreign assignments. Workers were found operating in countries like Laos and China, with documented engagements from U.S. companies unaware of their true identities.

This morning, the Wall Street Journal reported on one such scheme where North Korean operatives obtained employment at multiple companies and then stole confidential data, installed malware on the company systems and then demanded payments to remove the malicious programs. While companies spend heavily on protecting their people and systems from external cyber threats, the calculus changes drastically when one of these operators receives employee security credentials and obtains inside access.

The Consequences: Guilty Pleas and Sanctions

The November 2025 DOJ case marked a watershed moment in law enforcement's response to this threat. Five individuals pled guilty to crimes including:

  • Conspiracy to commit wire fraud.
  • Money laundering
  • Identity theft
  • Unlawful employment of foreign nationals

These criminal charges stemmed from years of employment under fraudulent pretenses, which allowed North Korean nationals to infiltrate legitimate U.S. businesses and access proprietary systems, source code, and infrastructure.

These actions signal a significant increase in enforcement and oversight—not just against North Korean operatives, but also against employers and platforms that fail to detect them.

The Employer Risk: How It Can Happen to You

Despite the severity of the threat, most companies that hire these operatives do so unwittingly. The risks to employers include:

  • Data exposure: DPRK workers may gain access to sensitive or proprietary data, source code, client information, or trade secrets.
  • Regulatory penalties: Employing a North Korean national—even unknowingly—violates U.S. sanctions laws and may result in civil fines or worse. Ignorance is not a defense and strict liability is the rule of law.
  • Reputational harm: Becoming publicly associated with aiding a hostile foreign power—even unintentionally—can damage brand value and client trust.
  • Disruption to operations: Discovery of fraud can lead to the termination of projects, loss of valuable work product, or internal disciplinary reviews.

As remote work and global freelance engagements increase, the attack surface widens. Platforms like Upwork, Fiverr, and GitHub are frequently referenced in prior investigations as environments where DPRK operatives have successfully hidden in plain sight.

Compliance Guidance and Mitigation Steps

To protect against this growing threat, employers must adopt a multi-layered compliance posture that includes:

  • Enhanced identity verification in the hiring process—including document authentication and biometric checks.
  • Ongoing employment monitoring which provides alerts for identity mismatches, employer discrepancies, and unexpected changes to work history.
  • Rigorous background investigations for all IT, engineering, financial or remote hires—especially for contract and freelance roles.
  • Legal review of onboarding procedures and vendor relationships to ensure compliance with OFAC guidelines and FCRA rules.

As global threats evolve and become more sophisticated, cheap and ultra-fast background checks are no longer sufficient to expose these highly-skilled perpetrators. These cheap and often database-driven checks are designed to retrieve and report basic information. They are not designed to uncover deliberate fraud by highly trained operatives.

Why Thuro? An Investigative Partner You Can Trust

As this threat continues to evolve, employers must be prepared to act—not just react.

For over seven decades, Thuro has served as an investigative partner that blends legal expertise, advanced investigative techniques, and proprietary monitoring tools to help employers reduce risk. We are not just a background screening vendor, we are a strategic partner in ensuring your workforce is legally vetted, accurately represented, and continuously monitored and we accomplish these objectives at a highly competitive cost.

Our experienced analysts are PBSA-certified and trained to spot deception. A single analyst handles every assignment from start to finish thus ensuring a thorough, accurate and complete investigation. Results are delivered in a professional, narrative report where red flags and inconsistencies are highlighted.

There is a difference between a “background check” and a “background investigation” and that difference may save your firm from a significant operational, compliance and financial crisis. All it takes is one operative and our job number one is to make sure one never gets through your doors.

Conclusion

The recent guilty pleas, crackdowns and sanctions prove the threat is persistent, active, and growing. Employers must now assume that these actors are targeting their organizations—and take proactive steps to keep them out.

Partnering with a trusted provider like Thuro ensures your background investigation program is built not just for hiring—but for compliance, security, and peace of mind.

Feel free to reach out to me to discuss how Thuro can reduce your risk and enhance the safety of your people, clients, assets and firm. I promise that you will come away from our call more knowledgeable and prepared to face the growing risks posed by these and other nefarious actors seeking to cause harm. Contact me at kprendergast@thuro.ai.

About the Author

Kevin Prendergast is the President of Thuro, one of the nation’s longest-standing investigative firms specializing in employment screening and due diligence. With more than 30 years of experience in the industry, Kevin is a licensed attorney   and a respected advisor to law firms, financial institutions, and Fortune 500 companies. Under his leadership, Thuro has developed the most rigorous investigative methodologies in the industry, combining legal compliance, narrative-based reports, and proprietary technology. Kevin is also the driving force behind Thuro University, a client-facing compliance education platform offering white papers, webinars, legal alerts, and customized training.

About Thuro

Thuro is a PBSA-accredited investigative firm delivering pre-employment and due diligence background investigations to law firms, accounting firms, financial institutions, and employers worldwide. Our proprietary platform integrates seamlessly with leading ATS and HRIS systems, and our attorney-led compliance team ensures all reports meet the highest legal and regulatory standards. With average client tenure exceeding 22 years, Thuro provides more than just data—we deliver context, analysis, and clarity.