Mandiant Report on North Korea IT Workers

IT workers employ various methods for evading detection. We have observed the operators leverage front companies to disguise their true identities

author-image
SMEStreet Edit Desk
New Update
Mandiant
Listen to this article
0.75x 1x 1.5x
00:00 / 00:00

Since 2022, Mandiant has tracked and reported on IT workers operating on behalf of the Democratic People's Republic of North Korea (DPRK). These workers pose as non-North Korean nationals to gain employment with organizations across a wide range of industries in order to generate revenue for the North Korean regime, particularly to evade sanctions and fund its weapons of mass destruction (WMD) and ballistic missile programs. A U.S. government advisory in 2022 noted that these workers have also leveraged privileged access obtained through their employment in order to enable malicious cyber intrusions, an observation corroborated by Mandiant and other organizations.

IT workers employ various methods for evading detection. We have observed the operators leverage front companies to disguise their true identities; additionally, U.S. government indictments show that non-North Korean individuals, known as “facilitators,” play a crucial role in enabling these IT workers in their efforts to seek and maintain employment. These individuals provide essential services that include, but are not limited to, laundering money and/or cryptocurrency, receiving and hosting company laptops at their residences, using stolen identities for employment verification, and accessing international financial systems. 

This report aims to increase awareness of the DPRK's efforts to obtain employment as IT workers and shed light on their operational tactics for obtaining employment and maintaining access to corporate systems. Understanding these methods can help organizations better detect these sorts of suspicious behaviors earlier in the hiring process. Below we’ve included a sampling of the types of behaviors identified during our incident response engagements and strategies for the detection and disruption of DPRK IT worker activity.

UNC5267

Mandiant tracks IT worker operations we have identified in various environments as UNC5267. UNC5267 remains highly active in the present day, posing an ongoing threat. Some sources suggest that the origins of these operations can be traced back to 2018. Importantly, UNC5267 is not a traditional, centralized threat group. IT workers consist of individuals sent by the North Korean government to live primarily in China and Russia, with smaller numbers in Africa and Southeast Asia. Their mission is to secure lucrative jobs within Western companies, especially those in the U.S. tech sector.

UNC5267 gains initial access through the use of stolen identities to apply for various positions or are brought in as a contractor. UNC5267 operators have primarily applied for positions that offer 100% remote work. Mandiant observed the operators engaging in work of varying complexity and difficulty spanning disparate fields and sectors. It is not uncommon for a DPRK IT worker to be working multiple jobs at once, pulling in multiple salaries on a monthly basis. One American facilitator working with the IT workers compromised more than 60 identities of U.S. persons, impacted more than 300 U.S. companies, and resulted in at least $6.8 million of revenue to be generated for the overseas IT workers from in or around October 2020 until October 2023.

UNC5267’s objectives include:

  • Financial gain through illicit salary withdrawals from compromised companies

  • Maintaining long-term access to victim networks for potential future financial exploitation

  • Potential use of access for espionage or disruptive activity (though this hasn't been definitively observed)

Incident Response Observations

Mandiant's incident response engagements to date have primarily observed DPRK IT workers functioning within the scope of their job responsibilities. However, the remote workers often gain elevated access to modify code and administer network systems. This heightened level of access granted to fraudulent employees presents a significant security risk.

Mandiant has identified a substantial number of DPRK IT worker resumes used to apply for remote positions. The threat actor’s email address, previously observed in IT worker-related activities, was also linked to a fabricated software engineer profile hosted on Netlify, a platform often used for quickly creating and deploying websites. The profile claimed proficiency in multiple programming languages and included fake testimonials with stolen images from high-ranking professionals, likely stolen from CEOs, directors, and other software engineers’ LinkedIn profiles.

Figure 1: Observed image of threat actor resume (likely altered)

 

Within the suspected DPRK IT worker's Netlify page, we discovered a resume accompanied by a link to another resume hosted on Google Docs, presenting a different identity. The linked resume featured a different name, phone number, and email address compared to the information on the Netlify page. Further discrepancies between the Netlify page and the linked resume included differing universities and years of attendance, as well as variations in past job titles and company work history. However, both of the resumes included a slight variation of the phrase “I'm less about seeing myself, I'm more about the others rely on me.”

Figure 2: Resume excerpt

Figure 3: Resume excerpt 

These two resumes are a small sampling of the total amount of fraudulent resumes identified by Mandiant. However, the resumes provide evidence of the DPRK IT workers utilizing multiple personas in attempts to gain employment across multiple organizations.

A recurring characteristic of resumes utilized by UNC5267 is the use of addresses based in the United States coupled with education credentials from universities outside of North America, frequently in countries such as Singapore, Japan, or Hong Kong. While possible, Mandiant noted that the acceptance rate for foreign students at many of the universities is low. This discrepancy may serve to hinder potential North American employers from verifying or contacting these overseas institutions regarding the applicant. Mandiant has also observed that the universities listed on the background check may not align with the candidate’s education background stated in their resume, including time of enrollment and completed degree programs. Furthermore, UNC5267's resumes often exhibit significant overlap with publicly available resumes or are heavily reused across multiple UNC5267 personas.  

To accomplish their duties, UNC5267 often remotely accesses victim company laptops situated within a laptop farm. These laptop farms are typically staffed with a single facilitator who is paid monthly to host numerous devices in one location. Mandiant has identified evidence that these laptops are often connected to an IP-based Keyboard Video Mouse (KVM) device, although a recurring theme across these incidents is the installation of multiple remote management tools on victim corporate laptops immediately following shipment to the farm. These indicate that the individual is connecting to their corporate system remotely via the internet, and may not be geographically located in the city, state, or even country in which they report to reside. The following is a list of remote administration tools identified during Mandiant engagements:

  • GoToRemote / LogMeIn

  • GoToMeeting

  • Chrome Remote Desktop 

  • AnyDesk 

  • TeamViewer

  • RustDesk

Connections to these remote management solutions primarily originated from IP addresses associated with Astrill VPN, likely originating from China or North Korea. Lastly, feedback from team members and managers who spoke with Mandiant during investigations consistently highlighted behavior patterns, such as reluctance to engage in video communication and below-average work quality exhibited by the DPRK IT worker remotely operating the laptops. 

Another common characteristic identified across Mandiant’s engagements was that DPRK IT workers typically claimed to live in one location, but requested laptop shipment to another location (laptop farm or outside enablement entity). We have observed the DPRK IT workers using the location associated with the stolen identity used for employment, including the stolen driver’s license, which often doesn’t match the location where the laptop is ultimately shipped and stored. 

Detection Methods

Mandiant highlights a number of strategies that organizations can use to identify and hinder DPRK IT worker operations based on information from trusted sources and government advisories. Countering the threat posed by North Korean cyber actors requires a multifaceted approach that combines technical defenses, user awareness training, and proactive threat hunting. Key recommendations include:

Vetting of Job Candidates

  • Requiring stringent background checks, including the collection of biometric information for comparison against known identities via specialized background checking services, may deter the use of forgeries. 

  • Implementing careful interview processes, such as requiring cameras to be used during interviews to ensure visual appearance matches online profiles, checking that the interviewee matches the provided identification, and asking questions to establish the consistency of a candidate's responses in line with their purported background.  

    • U.S. government advisories and trusted third parties have additionally noted IT workers’ reluctance to turn on cameras and their use of fake backgrounds during interviews. 

  • Training human resources departments to spot inconsistencies broadly and learn IT worker tactics, techniques, and procedures ( TTPs).

  • Monitoring for the use of artificial intelligence (AI) to modify employment profile pictures.

    • Mandiant has observed multiple instances in which DPRK IT workers utilized AI to modify profile pictures. 

    • Impacted organizations have leveraged open-source tooling to determine if the image was created using AI.

  • Require notarized proof of identity prior to employment.

Observations of Potential Technical Indicators

  • Verify phone numbers to identify Voice over Internet Protocol (VoIP) phone numbers. The use of VoIP phone numbers is a common tactic used by UNC5267. 

  • Verify that the corporate laptop is shipped to and subsequently geolocated where the individual reports to reside during onboarding.

    • Mandiant has observed instances where the deployed corporate laptop was never geolocated in the location that the individual reported to reside.

  • Monitor and restrict the use and installation of remote administration tools:

    • Prevent any remote connections to company-issued computers that could subsequently access the corporate network.

    • Monitor for uncommon remote admin tools. 

    • Monitor for multiple remote admin tools installed on one system.

  • Monitor for the use of VPN services to connect to corporate infrastructure. IP addresses associated with VPN services, such as Astrill VPN, should be further reviewed.

  • Monitor for the use of “mouse jiggling” software. 

    • Mandiant has observed instances of DPRK IT workers using the Caffeine mouse jiggling software to remain active across several laptops and profiles. This allows for ease of use at facilitator locations, where keeping laptops on and running are key and for the DPRK IT workers who often hold many jobs at once and need to appear online.

  • Request verification of the laptop serial number at the time of IT onboarding. This information should be readily available for anyone with physical possession of their corporate device. 

  • Utilize a hardware based multi-factor for multi-factor authentication to enforce physical access to corporate devices.

Ongoing Mitigation Strategies

  • Consider utilizing periodic mandatory spot checks where remote employees are required to go on camera. 

  • Offer continuous education for users and employees on current threats and trends, which is critical for identifying potentially malicious activity. Provide additional training on reporting suspicious activity. 

  • Collaborate with information-sharing communities and security vendors to stay abreast of the latest threats and mitigation strategies.

  • Require the use of U.S. banks for financial transactions to hinder IT worker efforts, as the acquisition of U.S. bank accounts is more difficult and entails stricter identity verification than those in many other countries. 

For Google SecOps Enterprise+ customers, rules have been released to your Emerging Threats rule pack, and IOCs listed in this blog are available for prioritization with Applied Threat Intelligence.

Mandiant also offers intelligence-led human-driven Custom Threat Hunt services to reveal ongoing or past threat actor activity in both cloud and on-premise environments. The service includes analysis tailored to the particulars of your tech stack and the threats targeting you. More information related to the Mandiant Custom Threat Hunt services can be found at the datasheet below.

Outlook and Implications 

North Korea's IT workforce, despite operating under significant constraints, presents a persistent and escalating cyber threat. The dual motivations behind their activities—fulfilling state objectives and pursuing personal financial gains—make them particularly dangerous. Their technical proficiency, coupled with sophisticated evasion tactics, poses a formidable challenge, especially for HR and recruiting teams tasked with identifying potential threats during the hiring process.

Given their past successes and the DPRK regime's reliance on cyber operations for revenue and strategic goals, we anticipate a continued surge in sophisticated attacks and intrusions targeting businesses globally. The IT workers continue to be particularly impactful to Western organizations, with a growing number of European organizations targeted. These attacks can lead to data breaches, financial losses, intellectual property theft, and disruption of critical services.

The activities of North Korea's IT workforce underscore the need for sustained vigilance and a proactive cybersecurity posture. While the threat is complex, a combination of robust security measures, employee awareness, and collaborative efforts can significantly enhance an organization's resilience against these malicious actors. Additionally, leveraging advanced threat detection tools and maintaining robust incident response plans are crucial for minimizing the impact of potential breaches. Collaboration with industry peers and cybersecurity agencies to share threat intelligence can further strengthen defenses against this evolving threat.

Mandiant successfully operates in this effort by leveraging partnerships either publicly or privately with key organizations and victims alike. If your organization has been affected or you have information regarding DPRK cyber operations, we can help get the information to the people that need to be protected or informed. We are all in this together.

A Google Threat Intelligence Collection featuring indicators of compromise (IOCs) related to the activity described in this post is now available for registered users.

Network IOCs

Indicator

ASN

NetBlock

Service

Location

103.244.174.154

9541

Cybernet

(PK)

104.129.55.3

8100

QuadraNet

(US)

104.206.40.138

62904

Eonix Corporation

AstrillVPN

(US)

104.223.97.2

8100

QuadraNet

(US)

104.223.98.2

8100

QuadraNet

(US)

104.243.33.74

23470

ReliableSite.Net LLC

(US)

104.250.148.58

53850

GorillaServers

AstrillVPN

(US)

109.82.113.75

35819

Mobily

(SA)

113.227.237.46

4837

China Unicom

(CN)

119.155.190.202

56167

Ufone

(PK)

123.190.56.214

4837

China Unicom

(CN)

155.94.255.2

8100

QuadraNet

(US)

174.128.251.99

46844

Sharktech

AstrillVPN

(US)

18.144.99.240

16509

Amazon.com

(US)

184.12.141.109

5650

Frontier Communications

(US)

192.119.10.67

55081

24 Shells

AstrillVPN

(US)

192.119.11.250

55081

24 Shells

AstrillVPN

(US)

192.74.247.161

54600

Peg Tech

AstrillVPN

(US)

198.135.49.154

396073

Majestic Hosting Solutions, LLC

AstrillVPN

(US)

198.2.228.20

54600

Peg Tech

AstrillVPN

(US)

198.23.148.18

36352

ColoCrossing

(US)

199.115.99.34

46844

Sharktech

AstrillVPN

(US)

204.188.232.195

46844

Sharktech

AstrillVPN

(US)

207.126.89.11

6939

Hurricane Electric

(US)

208.68.173.244

29838

Atlantic Metro Communications

(US)

23.105.155.2

396362

Leaseweb New York

(US)

23.237.32.34

174

Fdcservers

(US)

3.15.4.158

16509

Amazon.com

(US)

37.19.199.133

212238

Datacamp Limited

(US)

37.19.221.228

212238

Datacamp Limited

(US)

37.43.225.43

35819

Mobily

(SA)

38.140.49.92

174

Cogent Communications

AstrillVPN

(US)

38.42.94.148

27611

Starry

(US)

42.84.228.232

4837

China Unicom

(CN)

5.244.93.199

35819

Mobily

(SA)

50.39.182.185

27017

Ziply Fiber

(US)

51.39.228.134

43766

Zain Saudi Arabia

(SA)

54.200.217.128

16509

Amazon.com

(US)

60.20.1.234

4837

China Unicom

(CN)

66.115.157.242

46562

Performive

(US)

67.129.13.170

209

CenturyLink

(US)

67.82.9.140

6128

Optimum Online

(US)

68.197.75.194

6128

Optimum Online

(US)

70.39.103.3

46844

Sharktech

AstrillVPN

(US)

71.112.196.114

701

Verizon Fios Business

(US)

71.112.196.115

701

Verizon Fios Business

(US)

72.193.13.228

22773

Cox Communications

(US)

74.222.20.18

74.222.20.18

Perfect International

AstrillVPN

(US)

74.63.233.50

46475

Limestone Networks

AstrillVPN

(US)

98.179.96.75

22773

Cox Communications

(US)

URLs

URL

Description

https://daniel-ayala.netlify.app



North Korea IT Workers