Amazon CSO Stephen Schmidt says the company has rejected more than 1,800 fake North Korean job applicants in 18 months – but one managed to slip through the net
Analysis from Amazon highlights the growing scale of North Korean-backed "fake IT worker" campaigns
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Amazon has had hundreds of fraudulent job applications from North Korean threat actors since April last year, with the company uncovering one successful campaign internally.
According to chief security officer (CSO) Stephen Schmidt, the company has prevented more than 1,800 suspected DPRK operatives from joining since April 2024, and has detected 27% more DPRK-affiliated applications quarter over quarter this year.
“Over the past few years, North Korean (DPRK) nationals have been attempting to secure remote IT jobs with companies worldwide, particularly in the U.S,” Schmidt wrote in a post on LinkedIn.
“Their objective is typically straightforward: get hired, get paid, and funnel wages back to fund the regime's weapons programs.”
With this number of fraudulent applications, Schmidt said the company has a good insight into how these threats are evolving, and there are several notable areas of interest for enterprise security teams.
North Korean hackers are refining tactics
First and foremost, identity theft has become more calculated, Schmidt said, with operatives targeting individual software engineers who provide real credibility, rather than people with minimal online presence.
Operatives involved in these campaigns often work with facilitators managing “laptop farms”, Schmidt added. US locations that receive shipments and maintain domestic presence, while the worker operates remotely from outside the country.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
LinkedIn strategies are also getting more sophisticated, with the fraudsters hijacking dormant accounts through compromised credentials to gain verification.
"We've also identified networks where people hand over access to their accounts in exchange for payment," he said.
Research shows LinkedIn has become a prime hunting ground for cyber criminals, with analysis by Clear Sky Security in late 2024 showing hackers are using the professional networking app to both target victims and build an online presence.
A more recent study from Bitdefender Labs also highlighted the growing threats enterprises face through the platform, uncovering an Iranian-linked campaign which took inspiration from previous North Korean efforts.
Notably, Schmidt warned threat actors are increasingly targeting AI and machine learning roles, both of which are growing in demand as companies ramp up adoption of the technology.
One hacker slipped through the cracks
The company admitted that one imposter did manage to slip through the cracks in a recent campaign, however.
According to reports from Bloomberg, the company discovered a fake systems development contractor by tracking keystroke inputs.
Security teams at the retail giant observed significant keystroke lag which raised the alarm. Typically, a US-based remote worker would record keystroke data within several milliseconds.
In this instance, however, the worker’s keystroke lag stood at “more than 110 milliseconds”, suggesting they were based outside the country.
Amazon isn't alone in falling prey to hackers involved in these campaigns. Last year, cybersecurity firm KnowBe4 inadvertently hired a North Korean hacker in an incident which prompted an overhaul of hiring processes at the company.
The individual managed to pass background checks, but were discovered after they began loading malware shortly after receiving their Mac workstation.
North Korean threats will continue
Repeated warnings have been issued over the threats posed by North Korean threat actors over the last 18 months. Attack methods have shifted rapidly, with operators choosing to infiltrate enterprises to wreak havoc with malware and to extract valuable intellectual property.
Earlier this year, the FBI issued guidance on how to avoid the scam, urging organisations to practice the principle of least privilege and ramp up monitoring and investigation of network traffic.
More recently, Google warned that fake North Korean workers were now popping up in increasing numbers in Europe, using online recruitment platforms including Upwork, Telegram, and Freelancer. They've also been carrying out more extortion attempts and targeting larger organizations.
"If you’re concerned about these threats in your organization, query your databases for common indicators: patterns in resumes, emails, phone numbers, educational backgrounds," advised Schmidt.
"Implement identity verification at multiple hiring stages and monitor for anomalous technical behavior: unusual remote access, unauthorized hardware. If you identify suspected DPRK IT workers, report it to the FBI or your local law enforcement."
FOLLOW US ON SOCIAL MEDIA
Make sure to follow ITPro on Google News to keep tabs on all our latest news, analysis, and reviews.
You can also follow ITPro on LinkedIn, X, Facebook, and BlueSky.
Emma Woollacott is a freelance journalist writing for publications including the BBC, Private Eye, Forbes, Raconteur and specialist technology titles.
-
The CVE system isn’t working – what's next?In-depth With 2025's funding issues underlining key issues with the CVE system, what should businesses be doing to source intelligence about security vulnerabilities?
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
Thousands of Microsoft Teams users are being targeted in a new phishing campaignNews Microsoft Teams users should be on the alert, according to researchers at Check Point
-
Microsoft warns of rising AitM phishing attacks on energy sectorNews The campaign abused SharePoint file sharing services to deliver phishing payloads and altered inbox rules to maintain persistence
-
Amazon says Russian-backed threat groups were responsible for five-year-long attacks on edge devices – and it shows a ‘clear evolution in tactics’News Russian-backed hacker groups are exploiting misconfigured edge devices – now preferring that tactic over hunting down traditional vulnerabilities to gain access to company networks.
-
Warning issued as surge in OAuth device code phishing leads to M365 account takeoversNews Successful attacks enable full M365 account access, opening the door to data theft, lateral movement, and persistent compromise
-
Complacent Gen Z and Millennial workers are more likely to be duped by social engineering attacksNews Overconfidence and a lack of security training are putting organizations at risk
-
Hackers are abusing ConnectWise ScreenConnect, againNews A new spear phishing campaign has targeted more than 900 organizations with fake invitations from platforms like Zoom and Microsoft Teams.
-
The Allianz Life data breach just took a huge turn for the worseNews Around 1.1 million Allianz Life customers are believed to have been impacted in a recent data breach, making up the vast majority of the insurer's North American customers.
