Explore Elite Risk Management Services

Private Strategic Group
SolutionsCapabilitiesPlatformsInsightsIntelligenceAbout

Search

Intelligence Analysis

Evolving North Korean Ghost Worker Threat Underscores Global Dynamic Risk Environment

25 JUN 2025

/

5 min read


Ghost workers in North Korea are evolving threat.

KEY TAKEAWAYS:

  • North Korean “ghost workers” use fake identities and documents to secure remote IT jobs.
  • Technological advances have made it easier for ghost workers to conceal their true identities, and the trend is likely to increase in the coming months.
  • Organizations hiring these workers risk legal, financial, and reputational consequences, and risk mitigation strategies are essential.

North Korea relies on several tactics to evade international sanctions and generate foreign currency, and deploying “ghost workers” is one of them. Ghost workers are highly skilled IT professionals deployed to work remotely for companies, often in the US, Europe, and parts of Asia. The program, codenamed Wagemole, is orchestrated through a state-sponsored advanced persistent threat (APT) associated with the 313th General Bureau of North Korea’s Workers’ Party. They use stolen or fabricated identities to create accounts on freelance platforms like Upwork and Indeed, or to secure full-time positions at legitimate companies. 

Ghost Workers Mask Intent and Expose Organizations to Risk

To conceal their true identities and locations, ghost workers use VPNs and proxies and often rent or purchase freelancer accounts from real users in China, India, or Vietnam. Their resumes may also include LinkedIn profiles and well-maintained GitHub accounts with frequent code updates. They usually request payment in cryptocurrency or through platforms like PayPal. The North Korean government provides them with forged documentation, like fake passports and college degrees, to help them pass initial HR or client checks. Pyongyang also sets up shell companies or fake startups to employ these workers, lending them an appearance of legitimacy. 

The primary aim of ghost workers is to funnel their salaries back to the North Korean government; however, they may also introduce malicious code or create backdoors for persistent access, steal proprietary company information, such as source code or sensitive customer data, and may encrypt data and demand ransom payments for decryption. Organizations that unwittingly employ and pay ghost workers may find themselves in violation of local laws and sanctions targeting North Korea and expose themselves to Intellectual Property (IP) or data theft, reputational damage, fines, and potential criminal liability.

Risk Mitigation Requires Multilayered Approach

With the rise of remote work, Wagemole can exploit lax security around remote access and poor credential management to embed ghost workers inside target companies. Almost every organization is at risk; however, the most targeted are small and medium-sized businesses that handle sensitive data, particularly those in the cryptocurrency and technology sectors. To mitigate these risks, organizations should take a multilayered approach that includes policy and technical controls with thorough due diligence. HR personnel can strengthen vetting processes by requiring multiple forms of identification and mandating live video conferencing for interviews. They can also consider using third-party background check providers to validate employment histories and resumes. 

Security teams can deploy geo-fencing to limit access from sanctioned countries and implement user and entity behavior analytics (UEBA) to monitor networks for access and activity from unexpected time zones, IP addresses, or geographic locations. They can also implement standard security best practices like least privilege, network segmentation, and role-based permissions management and deploy multi-factor authentication across all systems.     

Evasion Techniques Grow More Sophisticated

Multiple US law enforcement and cybersecurity agencies have issued advisories to businesses, warning them to closely scrutinize remote IT hires and freelance contracts. However, given the low risk and potentially high reward of deploying ghost workers, North Korea is likely to expand such activities in the coming months. 

Tactics will probably evolve further to bypass standard hiring and vetting procedures. Moreover, with support from the North Korean government, ghost workers will likely make growing use of generative artificial intelligence (GenAI) and deepfakes to aid in job applications and interviews, making detection ever more difficult. To counter this, the US Treasury could expand existing sanctions to include additional front companies associated with North Korea’s ghost workforce. 

In the private sector, organizations will likely update their remote hiring policies and develop new tools for behavior analysis and geolocation verification to keep pace with evolving threats. However, training will remain the cornerstone of detection efforts. Educating employees on how to recognize suspicious behavior and actions among colleagues can significantly enhance early detection endeavors. Nonetheless, as North Korea expands its cyber capabilities, the threat will remain dynamic, requiring organizations to adapt and innovate their defenses continuously. 

Learn more about leveraging our industry-leading regional and subject matter experts for intelligence that helps your organization stay ahead of risks to your people and operations.   

Sharpen your 
view of risk

Subscribe to our newsletter to receive our analysts’ latest insights in your inbox every week.