North Korean Hackers’ $88M Job Scam: How Fake IT Workers Fooled US Companies
North Korean hackers used fake identities to capture remote IT jobs in the US, swiping $88 million. Flashpoint’s investigation unveiled tactics like using fake company names and Google Translate for crafting bogus job references. The hackers even had strategies to dodge webcam use, proving that their deception game was strong—and multilingual!

Hot Take:
Who needs a day job when you can moonlight as a North Korean hacker impersonating a tech whiz in the US? In a twist that not even the writers of “Mr. Robot” could predict, these hackers turned fake identities into an $88 million side hustle. I guess the lesson here is: next time you’re on a Zoom call, maybe take a closer look at who’s behind that generic cat avatar.
Key Points:
- North Korean hackers fraudulently secured remote IT jobs in the US using fake identities.
- They allegedly collected $88 million over six years.
- Flashpoint’s investigation unveiled details through infected computers.
- Fake companies like “Baby Box Info” and “Cubix Tech US” were used for references.
- Google Translate was a critical tool in crafting fake job applications.
Already a member? Log in here