Researchers Detailed North Korean Threat Actors Technical Strategies to Uncover Illicit Access

The technical sophistication of North Korean remote workers centers on their ability to maintain persistent access to corporate systems while masking their true geographical location and identity. For network-level obfuscation, the threat actors deploy proprietary North Korean software tools including NetKey and oConnect, which facilitate secure encrypted connections back to internal North Korean networks. Organizations unknowingly provide these threat actors with company equipment, network access, and privileged information, creating a perfect storm for both immediate financial gain and long-term strategic intelligence collection. Central to their operations is the deployment of specialized remote access tools that provide multiple layers of control over target systems. Supervisory control is maintained through “Classroom Spy Pro” software, enabling DPRK handlers to monitor their remote operatives’ activities in real-time, ensuring operational security and performance standards are maintained throughout extended infiltration campaigns. North Korean threat actors have evolved their cybercriminal operations into a sophisticated digital deception campaign that has successfully siphoned at least $88 million USD from organizations worldwide. The actors utilize IP-KVM devices, particularly PiKVM hardware, which plugs directly into target machines to enable remote physical control of even the most secured corporate laptops. These KVM-over-IP solutions allow operators to bypass traditional remote desktop software limitations by providing low-level hardware access equivalent to physical presence at the machine. The financial impact extends beyond direct monetary theft, as these actors gain access to sensitive intellectual property, source code, and internal corporate systems. Unlike traditional hit-and-run cyberattacks, these operations involve sustained infiltration where threat actors work as seemingly legitimate employees for months or even years. Their success stems from meticulous preparation and the deployment of advanced technical tools that enable them to operate from within North Korea while appearing to work from locations across the globe. These operatives, masquerading as legitimate freelance developers, IT staff, and contractors, have exploited the global shift toward remote work to embed themselves within trusted corporate workflows. The actors complement this hardware approach with virtual camera software including OBS and ManyCam to simulate live video presence during meetings and interviews. Flashpoint Intel Team researchers identified the sophisticated tradecraft employed by these operatives, revealing a systematic approach to identity obfuscation and technical evasion. This global reach demonstrates the scale and ambition of North Korea’s remote worker infiltration program. The campaign represents a significant escalation in state-sponsored cybercrime, directly funding North Korea’s illicit weapons programs through carefully orchestrated multi-year operations. These tools work in conjunction with commercial VPN services like Astrill VPN to create multiple layers of traffic routing that make IP-based tracking extremely challenging for defenders.

This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 31 Jul 2025 14:25:16 +0000


Cyber News related to Researchers Detailed North Korean Threat Actors Technical Strategies to Uncover Illicit Access

Moonstone Sleet emerges as new North Korean threat actor with new bag of tricks - Microsoft has identified a new North Korean threat actor, now tracked as Moonstone Sleet, that uses both a combination of many tried-and-true techniques used by other North Korean threat actors and unique attack methodologies to target companies for ...
1 year ago Microsoft.com
North Korea's state hackers stole $3 billion in crypto since 2017 - North Korean-backed state hackers have stolen an estimated $3 billion in a long string of hacks targeting the cryptocurrency industry over the last six years since January 2017. Kimsuky, Lazarus Group, Andariel, and other North Korean hacking groups ...
2 years ago Bleepingcomputer.com Andariel Kimsuky Lazarus Group
Researchers Detailed North Korean Threat Actors Technical Strategies to Uncover Illicit Access - The technical sophistication of North Korean remote workers centers on their ability to maintain persistent access to corporate systems while masking their true geographical location and identity. For network-level obfuscation, the threat actors ...
5 months ago Cybersecuritynews.com
North Korean IT worker scam is now a threat to all companies, cybersecurity experts say | The Record from Recorded Future News - Since disruptions began last year and law enforcement has publicly warned companies of the practice, DTEX’s Barnhart and others said they have seen some workers try to extort companies or hand off their access to more sophisticated North Korean ...
8 months ago Therecord.media
macOS Malware Mix & Match: North Korean APTs Stir Up Fresh Attacks - North Korean advanced persistent threat groups are mixing and matching components of two recently unleashed types of Mac-targeted malware to evade detection and fly under the radar as they continue their efforts to conduct operations at the behest of ...
2 years ago Darkreading.com
U.S DoJ Announces Nationwide Actions to Combat North Korean Remote IT Workers - The U.S. Department of Justice announced coordinated nationwide law enforcement actions on June 30, 2025, targeting North Korean remote information technology workers’ illicit revenue generation schemes that have defrauded American companies ...
6 months ago Cybersecuritynews.com
Reserachers Uncovered North Korean Nationals Remote IT Worker Fraud Scheme - In a significant cybersecurity investigation, researchers have revealed an elaborate fraud scheme orchestrated by North Korean nationals who used stolen identities to secure remote IT positions at US-based companies and nonprofits. The operation ...
8 months ago Cybersecuritynews.com
North Korean Hackers Utilizing Credential Stuffing to Launch Cyberattacks - In an alarming new report, researchers found that North Korean-linked hackers have been using stolen passwords during cyberattacks to gain access to various government, military and financial networks. According to security experts, the creative ...
2 years ago Thehackernews.com
North Korea's Kimsuky Attacks Rivals' Trusted Platforms - North Korea-linked threat groups are increasingly using living-off-the-land (LotL) techniques and trusted services to evade detection, with a recent Kimsuky campaign showcasing the use of PowerShell scripts and storing data in Dropbox folders, along ...
10 months ago Darkreading.com Andariel Kimsuky
US govt sanctions North Korea's Kimsuky hacking group - The Treasury Department's Office of Foreign Assets Control has sanctioned the North Korean-backed Kimsuky hacking group for stealing intelligence in support of the country's strategic goals. OFAC has also sanctioned eight North Korean agents for ...
2 years ago Bleepingcomputer.com Andariel Kimsuky
North Korean IT worker army expands operations in Europe - GTIG's report follows multiple warnings issued by the FBI regarding North Korea's massive army of IT workers sent abroad to generate revenue, who have tricked hundreds of companies in the United States and worldwide into hiring them over the years. ...
9 months ago Bleepingcomputer.com
North Korean Hackers Use Fake Job Offers & Salary Bumps as Lure for Crypto Theft - Recent investigations have uncovered a massive operation carried out by North Korean hackers looking to steal cryptocurrency through fake job offers and salary bumps. According to recent reports, hackers have been able to trace the malicious ...
2 years ago Therecord.media
Staying ahead of threat actors in the age of AI - At the same time, it is also important for us to understand how AI can be potentially misused in the hands of threat actors. In collaboration with OpenAI, today we are publishing research on emerging threats in the age of AI, focusing on identified ...
1 year ago Microsoft.com Kimsuky
North Korea's ScarCruft Attackers Gear Up to Target Cybersecurity Pros - ScarCruft, the North Korea-sponsored advanced persistent threat group, is gearing up for targeted attacks on cybersecurity researchers and other members of the threat intelligence community - likely in a bid to steal nonpublic threat intel and ...
1 year ago Darkreading.com Kimsuky
Unmasking Moonstone Sleet: A Deep Dive into North Korea's Latest Cyber Threat - Moonstone Sleet: A New North Korean Threat Actor Microsoft discovered a new North Korean threat actor, Moonstone Sleet, who targets companies with a combination of tried-and-true techniques used by other North Korean threat actors as well as unique ...
1 year ago Cysecurity.news
Woman Accused of Helping North Korean IT Workers Infiltrate Hundreds of US Firms - The US government has announced charges, seizures, arrests and rewards as part of an effort to disrupt a scheme in which North Korean IT workers infiltrated hundreds of companies and earned millions of dollars for North Korea. According to the ...
1 year ago Securityweek.com
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
6 months ago Cybersecuritynews.com
North Korean Remote IT Workers Added New Tactics and Techniques to Infiltrate Organizations - North Korean state-sponsored remote IT workers have significantly evolved their infiltration tactics, incorporating artificial intelligence tools and sophisticated deception techniques to penetrate organizations worldwide. Microsoft researchers ...
6 months ago Cybersecuritynews.com
FBI Charges North Korean Hackers Over $100 Million Stolen in Crypto Hack - The FBI has recently charged a North Korean hacker in connection with the Harmony crypto hack from which the hacker allegedly stole over $100 million. The hacker, Jon Chang Hyok, is a member of the North Korean military intelligence agency, the ...
2 years ago Bleepingcomputer.com
North Korean Hackers Amass $3bn in Cryptocurrency Heists - North Korean hackers have reportedly stolen a total of $3bn in cryptocurrency since 2017, as revealed in a recent report by Recorded Future's Insikt Group. The revelation underscores the prolonged engagement of the regime in the cryptocurrency ...
2 years ago Infosecurity-magazine.com
New North Korean IT Worker With Innocent Job Application? - A recent cybersecurity investigation has uncovered a suspicious case involving a North Korean IT worker who submitted an apparently innocent job application. This case highlights the ongoing tactics used by North Korean threat actors to infiltrate ...
3 months ago Cybersecuritynews.com North Korean cyber groups
North Korean Hackers Attacked Indian Medical and Energy Companies - The North Korean military's notorious hacking arm, known as the Lazarus Group, has been accused of targeting public and private sector research organizations, an Indian medical research company, and other businesses in the energy sector. Security ...
2 years ago Therecord.media Lazarus Group BianLian
Russian VPS Servers With RDP, Proxy Servers Fuel North Korean Cybercrime Operations - Trend Micro researchers identified that a threat actor known as Void Dokkaebi (also called Famous Chollima) has been conducting extensive social engineering campaigns through fictitious companies like BlockNovas, which presented itself as a ...
8 months ago Cybersecuritynews.com
North Korean Hackers Stole $600m in Crypto in 2023 - North Korean hackers stole at least $600m in cryptocurrency in 2023, around a third of the total value of such heists, according to blockchain intelligence firm TRM. Despite the eye-watering sum, this figure represents a 30% reduction on ...
2 years ago Infosecurity-magazine.com
US hits senior North Korean officials with sanctions, $3 million bounties | The Record from Recorded Future News - U.S. law enforcement action centered on Korea Sobaeksu Trading Company — a North Korean company allegedly used as a front for the country’s Munitions Industry Department, which oversees the DPRK’s nuclear program and is involved in the ...
5 months ago Therecord.media