Close Menu
    What's Hot

    Bitcoin Price Mirroring Key Patterns From 2021

    January 25, 2026

    GameStop’s $420 million bitcoin (BTC) move sparks speculation of selling

    January 25, 2026

    One of the oldest NFT trading platform which facilitated over $300 million in sales at its peak shuts down

    January 25, 2026
    Facebook X (Twitter) Instagram
    Trending
    • Bitcoin Price Mirroring Key Patterns From 2021
    • GameStop’s $420 million bitcoin (BTC) move sparks speculation of selling
    • One of the oldest NFT trading platform which facilitated over $300 million in sales at its peak shuts down
    • Ethereum Foundation Forms Post-Quantum Team as Security Concerns Mount
    • Analyst Says You’re Not Bullish Enough On Ethereum, What Does He Mean?
    • Spacecoin launches SPACE token just days after partnering with Trump family-linked DeFi project
    • Ethereum treasury firm ETHZilla (ETHZ) buys jet engines for $12 million in RWA tokenization push
    • End Of This Reaccumulation Phase Could Trigger Most Aggressive XRP Rally Ever
    Facebook X (Twitter) Instagram
    Tokatik – Latest Crypto News, Market Insights & Crypto Products
    • Home
    • Shop
    • Altcoins
    • Bitcoin
    • Ethereum
    • Exchanges
    • Market Updates
    • NFTs
    • DeFi
    • Regulations
    Tokatik – Latest Crypto News, Market Insights & Crypto Products
    Home»DeFi»Are You a Freelancer? North Korean Spies May Be Using You
    DeFi

    Are You a Freelancer? North Korean Spies May Be Using You

    8okaybaby@gmail.comBy 8okaybaby@gmail.comNovember 5, 2025No Comments5 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Are You a Freelancer? North Korean Spies May Be Using You
    Share
    Facebook Twitter LinkedIn Pinterest Email

    North Korea’s IT operatives are shifting strategies and recruiting freelancers to provide proxy identities for remote jobs.

    Operatives are contacting job seekers on Upwork, Freelancer and GitHub before moving conversations to Telegram or Discord, where they coach them through setting up remote access software and passing identity verifications.

    In earlier cases, North Korean workers scored remote gigs using fabricated IDs. According to Heiner García, a cyber threat intelligence expert at Telefónica and a blockchain security researcher, operatives are now avoiding those barriers by working through verified users who hand over remote access to their computers.

    The real owners of the identities receive only a fifth of the pay, while the rest of the funds are redirected to the operatives through cryptocurrencies or even traditional bank accounts. By relying on real identities and local internet connections, the operatives can bypass systems designed to flag high-risk geographies and VPNs.

    Cryptocurrencies, Cybercrime, North Korea, Crimes, Cybersecurity
    The recruitment process allows operatives to maintain ongoing access to identities and shift to new ones when flagged. Source: Heiner García/SEAL

    Inside the evolving recruitment playbook of North Korean IT workers

    Earlier this year, García set up a dummy crypto company and, together with Cointelegraph, interviewed a suspected North Korean operative seeking a remote tech role. The candidate claimed to be Japanese, then abruptly ended the call when asked to introduce himself in Japanese.

    García continued the conversation in private messages. The suspected operative asked him to buy a computer and provide remote access.

    The request aligned with patterns García would later encounter. Evidence linked to suspicious profiles included onboarding presentations, recruitment scripts and identity documents “reused again and again.”

    Related: North Korean spy slips up, reveals ties in fake job interview

    García told Cointelegraph:

    They install AnyDesk or Chrome Remote Desktop and work from the victim’s machine so the platform sees a domestic IP.”

    The people handing over their computers “are victims,” he added. “They are not aware. They think they are joining a normal subcontracting arrangement.”

    Cryptocurrencies, Cybercrime, North Korea, Crimes, Cybersecurity
    An email thread shows how recruiting is conducted through a freelancer platform. Source: Heiner García/SEAL

    According to chat logs he reviewed, recruits ask basic questions such as “How will we make money?” and perform no technical work themselves. They verify accounts, install remote-access software and keep the device online while operatives apply for jobs, speak to clients and deliver work under their identities.

    Though most appear to be “victims” unaware of who they’re interacting with, some appear to know exactly what they are doing.

    In August 2024, the US Department of Justice arrested Matthew Isaac Knoot of Nashville for running a “laptop farm” that allowed North Korean IT workers to appear as US-based employees using stolen identities.

    More recently in Arizona, Christina Marie Chapman was sentenced to more than eight years in prison for hosting a similar operation that funneled more than $17 million to North Korea.

    Cryptocurrencies, Cybercrime, North Korea, Crimes, Cybersecurity
    Chapman’s laptop farm duped over 300 US companies. Source: Office of Public Affairs

    A recruitment model built around vulnerability

    The most prized recruits are in the US, Europe and some parts of Asia, where verified accounts provide access to high-value corporate jobs and fewer geographic restrictions. But García also observed documents belonging to individuals from regions with economic instability, such as Ukraine and Southeast Asia.

    “They target low-income people. They target vulnerable people,” García said. “I even saw them trying to reach people with disabilities.”

    Cryptocurrencies, Cybercrime, North Korea, Crimes, Cybersecurity
    Email evidence shows operatives targeting professionals with disabilities. Source: Heiner García/SEAL

    North Korea has spent years infiltrating the tech and crypto industries to generate revenue and gain corporate footholds abroad. The United Nations said DPRK IT work and crypto theft are allegedly funding the country’s missile and weapons programs.

    Related: From Sony to Bybit: How Lazarus Group became crypto’s supervillain

    García said the tactic goes beyond crypto. In one case he reviewed, a DPRK worker used a stolen US identity to present themselves as an architect from Illinois, bidding on construction-related projects on Upwork. Their client received completed drafting work.

    Despite the focus on crypto-related laundering, García’s research found that traditional financial channels are also being abused. The same identity-proxy model allows illicit actors to receive bank payments under legitimate names.

    Cryptocurrencies, Cybercrime, North Korea, Crimes, Cybersecurity
    A suspected operative requests payment to a bank account after completing freelance work. Source: Heiner García

    “It’s not only crypto,” García said. “They do everything — architecture, design, customer support, whatever they can access.”

    Why platforms still struggle to spot who’s really working

    Even as hiring teams grow more alert to the risk of North Korean operatives securing remote roles, detection typically arrives only after unusual behavior triggers red flags. When an account is compromised, the actors pivot to a new identity and keep working.

    In one case, after an Upwork profile was suspended for excessive activity, the operative instructed the recruit to ask a family member to open the next account, according to chat logs reviewed.

    Cryptocurrencies, Cybercrime, North Korea, Crimes, Cybersecurity
    Account provider “Ana” is asked to tap family members for new accounts. Source: Heiner García

    This churn of identities makes both accountability and attribution difficult. The person whose name and paperwork are on the account is often deceived, while the individual actually doing the work is operating from another country and is never directly visible to freelancing platforms or clients.

    The strength of this model is that everything a compliance system can see looks legitimate. The identity is real, and the internet connection is local. On paper, the worker meets every requirement, but the person behind the keyboard is someone entirely different.

    García said the clearest red flag is any request to install remote-access tools or let someone “work” from your verified account. A legitimate hiring process doesn’t need control of your device or identity.

    Magazine: Bitcoin OG Kyle Chassé is one strike away from a YouTube permaban