| Founded | c. 2014 |
|---|---|
| Founding location | North Korea |
| Years active | 2014–present |
| Territory | Global (primarily targeting US and European companies) |
| Ethnicity | Primarily North Korean |
| Membership | Estimated 8,400 cyber operatives (2024) |
| Criminal activities | Identity theft, Wire fraud, Money laundering, Cyber espionage |
North Korean operatives have posed as remote workers in Western companies under stolen or fabricated identities, primarily targeting information technology and technical roles. They generate revenue for the North Korean government, particularly to fund its weapons programs.
The operation emerged as part of North Korea's broader cybercrime strategy under Kim Jong Un, who made information technology a national priority after assuming power in 2011. [1] The COVID-19 pandemic significantly expanded remote work opportunities, which North Korean intelligence services exploited to scale up their operations.
According to South Korea's National Intelligence Service, the number of people working in North Korea's cyber divisions grew from 6,800 in 2022 to 8,400 in 2024, including IT worker infiltrators, cryptocurrency thieves, and military hackers. [1]
The operations are run by North Korea's Department 53. It is behind front companies including Korea Osong Shipping Co. and Chonsurim Trading Corporation, that sent IT workers to Laos. [2]
North Korean intelligence services, including the Reconnaissance General Bureau, recruit top graduates from prestigious institutions such as Kim Chaek University of Technology and the University of Sciences in Pyongsong. [1] These operatives are trained in hacking techniques, foreign languages, and are promised higher wages and internet access as incentives.
The scheme typically follows a standardized process:
According to US government estimates, a typical team of North Korean IT workers can earn up to $3 million annually. [1] Individual workers can earn an average of $300,000 per year, with the funds being funneled directly to North Korea's government and weapons programs. [3] Some operatives work multiple jobs simultaneously to maximize earnings.
In 2025, Christina Marie Chapman, a 44-year-old American citizen from Arizona, pleaded guilty to federal charges related to operating a laptop farm that facilitated North Korean operatives for three years. Chapman's operation involved over 300 American companies and generated more than $17 million for the North Korean government. She was sentenced to 8 years in federal prison. [1] [5]
In July 2024, KnowBe4, a US cybersecurity training company, discovered that a new employee identified as "Kyle" was actually a North Korean operative who had passed background checks and ID verification. [1] [6]
According to Mandiant (now part of Google Cloud), nearly every Fortune 500 company chief information security officer interviewed about the issue has admitted to hiring at least one North Korean IT worker. [3] SentinelOne, a cybersecurity firm, reported receiving approximately 1,000 job applications linked to North Korean operatives. [3]
North Korean operatives generally target software engineer, front-end developer and full-stack developer jobs, though the scheme extends to roles beyond traditional IT. [4]
Impact includes:
While initially focused on US companies, the scheme has expanded globally. CrowdStrike reports tracking similar operations in the United Kingdom, Poland, Romania and other European countries, as well as organizations in South Asian countries. [3]
The FBI, State Department, and Treasury Department have issued joint advisories warning companies about the threat, and initiated multiple prosecutions. [3]
In December 2024, the Justice Department indicted 14 North Koreans for generating at least $88 million over six years. [7]
The Department of Justice announced indictments in January 2025 against two Americans for operating a six-year scheme that placed North Korean operatives in over 60 US companies, generating more than $800,000 in revenue. [8]
The U.S. Treasury’s Office of Foreign Assets Control (OFAC) announced sanctions in January 2025 against two individuals and four entities involved in North Korea's illicit remote IT worker schemes that generate revenue for the country's weapons programs. The sanctioned entities include two front companies (Korea Osong Shipping Co. and Chonsurim Trading Corporation) that sent IT workers to Laos, Chinese company Liaoning China Trade Industry Co. for supplying technological equipment, and individuals Jong In Chol and Son Kyong Sik who ran the front operations. [2]