• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
Financefraud

North Korean IT worker infiltrations exploded 220% over the past 12 months, with gen AI weaponized at every stage of the hiring process

Amanda Gerut
By
Amanda Gerut
Amanda Gerut
News Editor, West Coast
Down Arrow Button Icon
Amanda Gerut
By
Amanda Gerut
Amanda Gerut
News Editor, West Coast
Down Arrow Button Icon
August 4, 2025, 3:03 AM ET
North Korean leader Kim Jong-Un attending a meeting with a committee of the Workers' Party of Korea about the test of a hydrogen bomb, at an unknown location. North Korea said it detonated a hydrogen bomb designed for a long-range missile on September 3 and called its sixth and most powerful nuclear test a "perfect success", sparking world condemnation and promises of tougher US sanctions.
North Korean leader Kim Jong Un in 2017.STR/AFP/Getty Images
  • The North Korean IT worker conspiracy is ramping up in intensity, with the regime’s software developers getting hired at hundreds of new companies in the past year, despite scrutiny from law enforcement and security firms. CrowdStrike cybersecurity expert Adam Meyers said the company investigates about one incident a day at this point because the attacks have grown so prolific. 

Terrifying new fronts have emerged in a highly successful employment-fraud scheme in which trained North Korean operatives get jobs at companies around the globe under fake or stolen identities. 

Recommended Video

The number of companies that hired North Korean software developers grew a staggering 220% during the past 12 months—and most of their success is owing to automating and optimizing the workflow involved in fraudulently obtaining and holding tech jobs, CrowdStrike’s 2025 Threat Hunting Report released on Monday revealed. The IT workers infiltrated more than 320 companies in the past 12 months. 

To level set: The North Korean IT worker scheme is a vast conspiracy to evade punishing financial sanctions on the Democratic People’s Republic of Korea, the result of authoritarian ruler Kim Jong Un’s human-rights abuses and relentless quest to develop weapons of mass destruction. To dodge the sanctions and make money to keep funding its nuclear program, North Korea now trains young men and boys in tech, sends them to elite schools in and around Pyongyang, and then deploys them in teams of four or five to locations around the world including China, Russia, Nigeria, Cambodia, and the United Arab Emirates. 

The workers are each required to earn $10,000 a month, according to a defector, and have managed to do so by getting remote jobs doing IT work at U.S. and European companies while earning good salaries, court records show. Since 2018, the UN estimates, the scheme has generated between $250 million to $600 million per year on the backs of thousands of North Korean men. 

For the Fortune 500, the IT worker scheme has been a flashing red alert about the evolution of employment-fraud schemes. Court records show hundreds of Fortune 500 companies have unknowingly hired thousands of North Korean IT workers, in violation of sanctions, in recent years. In some cases, the IT worker scheme is purely about generating stable revenues for the regime. In others, FBI investigators have found evidence IT workers share information with more malicious hackers that have stolen nearly $3 billion in crypto, according to the UN.

Under siege  

CrowdStrike’s investigations revealed North Korea’s tech workers, an adversary CrowdStrike dubs “Famous Chollima,” used AI to scale every aspect of the operation. The North Koreans have used generative AI to help them forge thousands of synthetic identities, alter photos, and build tech tools to research jobs and track and manage their applications. In interviews, North Koreans used AI to mask their appearance in video calls, guide them in answering questions, and pass technical coding challenges associated with getting software jobs. 

Critically, they now rely on AI to help them appear more fluent in English and well-versed in the companies where they’re interviewing. Once they get hired, the IT workers use AI chatbots to help with their daily work—responding in Slack, drafting emails—to make sure their written offerings appear technically and grammatically sound and to help them hold down multiple jobs simultaneously, CrowdStrike found. 

“Famous Chollima operatives very likely use real-time deepfake technology to mask their true identities in video interviews,” the report states. “Using a real-time deepfake plausibly allows a single operator to interview for the same position multiple times using different synthetic personas, enhancing the odds that the operator will get hired.”

CrowdStrike investigators have observed North Korean IT workers searching for AI face-swapping applications and paying premium prices for subscriptions to deepfake services during active operations. 

‘Laptop farms’ move beyond U.S. borders

Adam Meyers, senior vice president of CrowdStrike’s counter adversary operations, told Fortune his team generally investigates one incident a day related to the North Korean IT worker scheme. The program has broadened beyond U.S. borders as U.S. law enforcement has cracked down on domestic operations with indictments and advisories, and as more U.S. companies have tightened their security practices and girded their defenses. 

Last month, a 50-year-old Arizona woman, Christina Chapman, was sentenced to 8.5 years in prison in July after pleading guilty for her role in operating a “laptop farm” from her home. Prosecutors said she accepted and maintained 90 laptops and installed remote-access software so North Koreans could work for U.S. companies, prosecutors said. Authorities revealed Chapman’s operation alone helped the workers get 309 jobs that generated $17.1 million in revenue through their salaries. Nearly 70 Americans had their identities stolen in the operation, authorities said. These weren’t just attacking smaller companies with looser hiring infrastructure; Nike was one of the companies impacted, according to its victim impact statement in Chapman’s case. The sneaker and activewear giant unwittingly hired a North Korean operative affiliated with Chapman. Nike did not respond to Fortune’s requests for comment.  

“U.S. law enforcement has put a big dent in their ability to operate the laptop farms, so as it gets increasingly expensive or difficult to get remote jobs here in the U.S., they’re pivoting to other locations,” said Meyers. “They’re getting more traction in Europe.”

Meyers said CrowdStrike has seen new laptop farms established in Western Europe, accessing Romania and Poland, which means North Korean workers are getting jobs—typically as full-stack developers—in those countries and then having laptops shipped to farms there. The scheme matches what takes place in the U.S.: A supposedly Romanian or Polish developer will interview with a company, get hired, and a laptop will get shipped to a known laptop-farm destination in those countries, he said. In other words, instead of shipping devices and onboarding materials to an actual residence where the supposed developer works, the laptop gets shipped to a known farm address based in Poland or Romania. Typically, the excuse is the same type that has proved effective at U.S. companies, said Meyers. The developer will claim to be having a medical or family emergency necessitating a change in the shipping address. 

“Companies need to stay vigilant if they’re hiring overseas,” said Meyers. “They need to understand these risks exist not just domestically, but overseas as well.” 

AI advancements will neutralize defenses

Amir Landau, malware research team leader at defense firm CyberArk, told Fortune traditional cyber defenses are likely to eventually become insufficient against the threat as gen AI used by the North Koreans becomes advanced enough to break through companies’ defense wards. Therefore, what companies need to do to defend themselves requires a fundamental shift in thinking in terms of how much trust and access companies grant their own employees. 

The military and intelligence principle of a “need-to-know basis,” which originated during World War II, will become more important, said Landau. Not every developer needs to know or have access to certain assets or documents, even after they’ve been with a company for a certain amount of time, he explained. 

Landau also advocates for minimum and limited-time privileges for developers, giving them a short window of time for work, rather than unlimited access that could eventually make a company vulnerable.  

Landau also said companies should take some additional commonsense measures in the hiring process. If a job applicant gives a reference, don’t call the phone number or message the email address you’ve been given. Look them up and get in touch with what you see from public databases, he advised. If someone’s personal information sounds bizarre or inconsistent, pay attention. Use the internet to double check what you can find against what you’ve been told. 

“There are a lot of small things you can do to defend against these threats,” he said. 

And ultimately, while small companies are typically more vulnerable, that doesn’t mean larger companies aren’t also susceptible to fraud schemes, Landau said. Meyers said as long as the IT workers can find work, they’ll keep evolving their tactics through the use of gen AI.  

“These are basically exploited people from North Korea making money for the regime,” said Meyers. “As long as they can continue to generate revenue, they’re going to keep doing this.”

Join us at the Fortune Workplace Innovation Summit May 19–20, 2026, in Atlanta. The next era of workplace innovation is here—and the old playbook is being rewritten. At this exclusive, high-energy event, the world’s most innovative leaders will convene to explore how AI, humanity, and strategy converge to redefine, again, the future of work. Register now.
About the Author
Amanda Gerut
By Amanda GerutNews Editor, West Coast

Amanda Gerut is the west coast editor at Fortune, overseeing publicly traded businesses, executive compensation, Securities and Exchange Commission regulations, and investigations.

See full bioRight Arrow Button Icon

Latest in Finance

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
Fortune Secondary Logo
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Finance

Photo of MacKenzie Scott
SuccessMacKenzie Scott
MacKenzie Scott gave away $7.2 billion in just one year. That’s more than Jeff Bezos and most other billionaires have donated in their lifetimes
By Sydney LakeFebruary 26, 2026
25 minutes ago
A person looking at their phone and computer in a kitchen.
Bankingchecking accounts
New bonus alert: HSBC Premier checking offering up to $7,000 bonus (for a limited time)
By Joseph HostetlerFebruary 26, 2026
35 minutes ago
Watchmaker repairs broken watch
SuccessCareers
There are less than 2,000 watchmakers in the U.S., so Rolex has opened a trade school in Texas to tackle the shortage—it’s already rivaling Harvard
By Emma BurleighFebruary 26, 2026
50 minutes ago
vance
PoliticsMedicaid
Medicaid funding to Minnesota to ‘temporarily halt’ over fraud concerns, JD Vance says
By Michelle L. Price, Nick Lichtenberg, Ali Swenson and The Associated PressFebruary 26, 2026
56 minutes ago
wealth
EconomyWealth
The great (small business) wealth transfer: McKinsey sees $5 trillion of baby boomer companies coming up for sale over the next decade
By Nick LichtenbergFebruary 26, 2026
2 hours ago
shapiro
AIData centers
Why Pennsylvania sits at the center of the big data-center power problem
By Shixiang (Woody) Zhu and The ConversationFebruary 26, 2026
2 hours ago

Most Popular

placeholder alt text
Innovation
An MIT roboticist who cofounded bankrupt robot vacuum maker iRobot says Elon Musk’s vision of humanoid robot assistants is ‘pure fantasy thinking’
By Marco Quiroz-GutierrezFebruary 25, 2026
22 hours ago
placeholder alt text
Success
Jeff Bezos says being lazy, not working hard, is the root of anxiety: ‘The stress goes away the second I take that first step’
By Sydney LakeFebruary 25, 2026
1 day ago
placeholder alt text
Personal Finance
'Trump Accounts' means kids can have $270,000 saved by age 18.  Larry Fink says that's twice as much as most adults have now
By Catherina GioinoFebruary 25, 2026
21 hours ago
placeholder alt text
Success
Ex–presidential candidate Andrew Yang warns that millions of white-collar workers will lose their jobs within 18 months: ‘The AI jobpocalypse is here’
By Preston ForeFebruary 25, 2026
1 day ago
placeholder alt text
Economy
In less than a year, Trump erased 12 years of solvency for the trust fund that pays for Medicare Part A
By Nick LichtenbergFebruary 23, 2026
3 days ago
placeholder alt text
Cybersecurity
Discord distances itself from Peter Thiel–backed verification software after its code was found on a Google Cloud endpoint
By Catherina GioinoFebruary 24, 2026
2 days ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.