Intelligence Analysis
Evolving North Korean Ghost Worker Threat Underscores Global Dynamic Risk Environment
25 JUN 2025
/
5 min read

KEY TAKEAWAYS:
- North Korean “ghost workers” use fake identities and documents to secure remote IT jobs.
- Technological advances have made it easier for ghost workers to conceal their true identities, and the trend is likely to increase in the coming months.
- Organizations hiring these workers risk legal, financial, and reputational consequences, and risk mitigation strategies are essential.
North Korea relies on several tactics to evade international sanctions and generate foreign currency, and deploying “ghost workers” is one of them. Ghost workers are highly skilled IT professionals deployed to work remotely for companies, often in the US, Europe, and parts of Asia. The program, codenamed Wagemole, is orchestrated through a state-sponsored advanced persistent threat (APT) associated with the 313th General Bureau of North Korea’s Workers’ Party. They use stolen or fabricated identities to create accounts on freelance platforms like Upwork and Indeed, or to secure full-time positions at legitimate companies.
Ghost Workers Mask Intent and Expose Organizations to Risk
To conceal their true identities and locations, ghost workers use VPNs and proxies and often rent or purchase freelancer accounts from real users in China, India, or Vietnam. Their resumes may also include LinkedIn profiles and well-maintained GitHub accounts with frequent code updates. They usually request payment in cryptocurrency or through platforms like PayPal. The North Korean government provides them with forged documentation, like fake passports and college degrees, to help them pass initial HR or client checks. Pyongyang also sets up shell companies or fake startups to employ these workers, lending them an appearance of legitimacy.
The primary aim of ghost workers is to funnel their salaries back to the North Korean government; however, they may also introduce malicious code or create backdoors for persistent access, steal proprietary company information, such as source code or sensitive customer data, and may encrypt data and demand ransom payments for decryption. Organizations that unwittingly employ and pay ghost workers may find themselves in violation of local laws and sanctions targeting North Korea and expose themselves to Intellectual Property (IP) or data theft, reputational damage, fines, and potential criminal liability.
Risk Mitigation Requires Multilayered Approach
With the rise of remote work, Wagemole can exploit lax security around remote access and poor credential management to embed ghost workers inside target companies. Almost every organization is at risk; however, the most targeted are small and medium-sized businesses that handle sensitive data, particularly those in the cryptocurrency and technology sectors. To mitigate these risks, organizations should take a multilayered approach that includes policy and technical controls with thorough due diligence. HR personnel can strengthen vetting processes by requiring multiple forms of identification and mandating live video conferencing for interviews. They can also consider using third-party background check providers to validate employment histories and resumes.
Security teams can deploy geo-fencing to limit access from sanctioned countries and implement user and entity behavior analytics (UEBA) to monitor networks for access and activity from unexpected time zones, IP addresses, or geographic locations. They can also implement standard security best practices like least privilege, network segmentation, and role-based permissions management and deploy multi-factor authentication across all systems.
Evasion Techniques Grow More Sophisticated
Multiple US law enforcement and cybersecurity agencies have issued advisories to businesses, warning them to closely scrutinize remote IT hires and freelance contracts. However, given the low risk and potentially high reward of deploying ghost workers, North Korea is likely to expand such activities in the coming months.
Tactics will probably evolve further to bypass standard hiring and vetting procedures. Moreover, with support from the North Korean government, ghost workers will likely make growing use of generative artificial intelligence (GenAI) and deepfakes to aid in job applications and interviews, making detection ever more difficult. To counter this, the US Treasury could expand existing sanctions to include additional front companies associated with North Korea’s ghost workforce.
In the private sector, organizations will likely update their remote hiring policies and develop new tools for behavior analysis and geolocation verification to keep pace with evolving threats. However, training will remain the cornerstone of detection efforts. Educating employees on how to recognize suspicious behavior and actions among colleagues can significantly enhance early detection endeavors. Nonetheless, as North Korea expands its cyber capabilities, the threat will remain dynamic, requiring organizations to adapt and innovate their defenses continuously.
Learn more about leveraging our industry-leading regional and subject matter experts for intelligence that helps your organization stay ahead of risks to your people and operations.
Related
Tags
Sharpen your
view of risk
Subscribe to our newsletter to receive our analysts’ latest insights in your inbox every week.
Intelligence & Insights
Intelligence
Worth Gathering
Employing a team of 200+ analysts around the world, Crisis24 is the only source you need for on-point, actionable insights on any risk-related topic.

Intelligence Analysis
Gulf States: Impact of the Iran-Israel Conflict on the Gulf Cooperation Council
Amid Iran-Israel tensions, the Gulf Cooperation Council (GCC) is unlikely to experience sustained disruptions beyond residual flight delays and heightened security measures.
June 24, 2025

Article
Flash Alert: Iran Fires Missiles Targeting US Military Bases in Qatar and Iraq; Bahrain and Kuwait Close Airspace
Iran Fires Missiles Targeting US Military Bases in Qatar and Iraq; Bahrain and Kuwait Close Airspace
June 23, 2025

Intelligence Analysis
Middle East: Land, Air, and Maritime Travel Disruptions Likely Due to Ongoing Iran-Israel Conflict
Land, air, and maritime travel disruptions are likely throughout the Middle East region through late June due to the Iran-Israel conflict.
June 22, 2025

Article
FLASH ALERT: US President Donald Trump confirms US airstrikes on nuclear sites in Iran
US President Donald Trump confirms US airstrikes on Natanz, Fordow, and Isfahan nuclear sites in Iran early June 22.
June 21, 2025