The U.S. Department of Justice (DOJ) and Federal Bureau of Investigation (FBI) have revealed a large-scale covert operation involving thousands of North Korean IT workers who infiltrated global companies—particularly in the U.S.—under false identities to earn millions of dollars in foreign currency for the North Korean regime.
On June 30, prosecutors in Georgia and Massachusetts unsealed criminal indictments against individuals accused of operating so-called “laptop farms” that facilitated remote access for North Korean engineers. These farms helped them impersonate legitimate workers, log in to corporate VPNs, and receive salaries using U.S. financial infrastructure. Over 90 laptops and 29 crypto-linked accounts were seized. One operator allegedly enabled remote employment in 309 U.S. companies, earning over $17.1 million in three years—much of it funneled to Pyongyang.
North Korean IT specialists are reported to work in sensitive roles such as software engineering, cybersecurity, blockchain development, and data analysis. Proficient in programming languages like C++, Python, Go, and smart contract languages, these workers often masqueraded as developers from China, Taiwan, or South Korea, using deepfake video interviews and forged LinkedIn profiles.
According to Microsoft’s 2025 security bulletin and UN reports, North Korea has systematically trained tech talent under state supervision since the 2010s. Many undergo rigorous training in programming, language, and Western corporate etiquette, including two years in “enhancement camps” and field internships in China and Russia before deployment.
FBI officials warned that while most of these operatives focus on revenue generation, they pose significant security risks—especially in crypto firms, defense contractors, and tech consultancy groups. Several recent data breaches and crypto thefts have already been traced back to North Korean actors.
These operations reportedly generate between $250 million and $600 million annually for the North Korean government, becoming one of its most reliable sources of foreign currency apart from arms trade. The DOJ emphasized that many U.S. firms—especially in outsourcing-heavy sectors—remain unaware of the extent of infiltration.
As governments increase scrutiny, experts recommend stronger identity verification, endpoint monitoring, and tighter contracting protocols for remote workers. Given North Korea’s sophisticated training pipeline and deep state involvement, what appears to be just another freelance profile could, in fact, be part of a well-oiled machine serving one of the world’s most isolated regimes.
※新西兰全搜索©️版权所有
敬请关注新西兰全搜索New Zealand Review 在各大社交媒体平台的公众号。从这里读懂新西兰!️

如果您喜欢我们的文章,请支持我们的新闻工作者和创作者!请打赏一杯咖啡给他们(注明栏目或文章题目),或支持我们每月的服务器费用,非常感谢!
订阅我们,Paypal每月赞助5纽币:
http://bit.ly/47fUCPS
了解 新西兰全搜索🔍 的更多信息
订阅后即可通过电子邮件收到最新文章。