US and Australia Warn Industry About North Korean Remote IT Worker Infiltration
North Korea's IT worker scheme, which generated $2.02 billion in stolen crypto in 2025, prompted a three-nation industry symposium in Sydney last week.

The playbook is refined and it is working at scale: North Korean operatives fabricate identities, generate AI-assisted personas, and present fraudulent credentials to land remote IT jobs at Western companies. Once inside corporate networks, they steal intellectual property, divert salaries back to Pyongyang, and in some cases leverage their access to execute cyberattacks that fund the regime's weapons programs. On March 30, the U.S. Department of State and Australia's Department of Foreign Affairs and Trade, together with Global Affairs Canada, cybersecurity firm Mandiant, and workforce analytics company DTEX, convened a symposium in Sydney titled "Protecting Industry from North Korean Threats" to confront this expanding threat head-on.
More than 80 professionals from Australia's technology sector, recruiting and staffing companies, and financial services examined DPRK IT worker tactics and shared best practices for detecting and disrupting them. The gathering reflected a deliberate shift in government strategy: rather than treating the North Korean IT worker problem as purely a law enforcement matter, Washington, Canberra, and Ottawa are now pulling industry directly into the response.
The scale of the underlying threat makes that urgency difficult to overstate. North Korea-linked actors stole $2.02 billion in cryptocurrency in 2025 alone, a 51 percent increase year-over-year, according to Chainalysis, pushing their estimated all-time total to $6.75 billion. Analysts note that DPRK operatives are increasingly achieving these outsized results by embedding IT workers inside crypto services or deploying sophisticated impersonation tactics targeting executives. Separately, a UN-linked body estimated the remote IT worker scheme alone generates approximately $500 million annually for the regime.
Insider risk management firm DTEX has found that 7 percent of its customer base, representing a cross-section of Fortune 2000 companies, have been infiltrated by North Korean operatives working as full-time employees with privileged access. Mandiant has also reported that nearly every Fortune 500 chief information security officer interviewed about the issue admitted to hiring at least one North Korean IT worker. The Multilateral Sanctions Monitoring Team, established in October 2024 to monitor DPRK sanctions evasion, released a detailed report in October 2025 documenting the deep connections between UN-designated DPRK entities and the regime's malicious cyber infrastructure.
DPRK IT workers employ increasingly deceptive tactics, including fabricated identities, fraudulent credentials, and AI-generated personas to secure remote employment. Once hired, they may access sensitive corporate systems, steal intellectual property, and extort their employers. Mandiant also reported a spike in extortion attempts by terminated DPRK contractors in late 2024, as operatives under pressure to deliver revenue for the regime began exfiltrating sensitive data, including internal documents, customer records, and proprietary IP, and using it as leverage. The threat has stretched beyond IT departments: in one documented case, a North Korean agent using a fabricated identity was hired by a U.S. political campaign in Oregon to build its website, obtaining access to the campaign's content management system.
Symposium participants urged organizations to require robust, in-person or strongly verified onboarding for sensitive roles, scrutinize payment routing to flag wages being funneled through layered intermediaries, and share threat intelligence directly with government partners. The Multilateral Sanctions Monitoring Team's October 2025 report estimated significant illicit revenue flows tied to these activities, figures that symposium organizers cited to underscore the financial stakes behind every fraudulent hire.
For companies built on remote-first hiring pipelines, the Sydney symposium delivered a structural warning: the same frictionless onboarding processes that accelerate recruitment now represent one of the most actively exploited attack surfaces in nation-state operations.
Sources:
Know something we missed? Have a correction or additional information?
Submit a Tip

