North Korean Hackers’ $88M Job Scam: How Fake IT Workers Fooled US Companies

North Korean hackers used fake identities to capture remote IT jobs in the US, swiping $88 million. Flashpoint’s investigation unveiled tactics like using fake company names and Google Translate for crafting bogus job references. The hackers even had strategies to dodge webcam use, proving that their deception game was strong—and multilingual!

Pro Dashboard

Hot Take:

Who needs a day job when you can moonlight as a North Korean hacker impersonating a tech whiz in the US? In a twist that not even the writers of “Mr. Robot” could predict, these hackers turned fake identities into an $88 million side hustle. I guess the lesson here is: next time you’re on a Zoom call, maybe take a closer look at who’s behind that generic cat avatar.

Key Points:

  • North Korean hackers fraudulently secured remote IT jobs in the US using fake identities.
  • They allegedly collected $88 million over six years.
  • Flashpoint’s investigation unveiled details through infected computers.
  • Fake companies like “Baby Box Info” and “Cubix Tech US” were used for references.
  • Google Translate was a critical tool in crafting fake job applications.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?