back to top

Follow

The North Korean Stolen Identity Scheme: How IT Works

Listen - Have this article read to you.(audio only click below)
The Justice Department has exposed a sophisticated scheme where North Korean IT workers utilize stolen identities to infiltrate major American corporations. This nefarious practice has led to significant financial gains for the North Korean government.

How the Scheme Operates:

  1. Identity Theft: North Korean IT workers receive stolen American identities to secure remote jobs at US companies.
  2. Remote Work: Despite working from abroad, companies remain oblivious to the workers’ true identities.
  3. Corporate Access: Workers gain access to confidential company information and sensitive data.

Impact and Consequences:

  • Over 300 US companies have fallen victim to this fraud.
  • The workers have reportedly earned $6.8 million.
  • The FBI and Justice Department are offering a reward for information leading to further arrests.

Government Response:

  • Authorities are urging companies to implement stricter identity verification measures and raise awareness about potential fraud risks.
  • The FBI and Justice Department are collaborating with other countries to tackle the broader issue of stolen identities.

Implications:

  • This incident highlights the need for robust cybersecurity measures and identity protection protocols.
  • The blurred lines between remote work and in-office work increase the potential for fraud.
  • International cooperation is crucial in combating such cross-border criminal activities.

Did you know?

Advertising can contain malware, and can track You in ways you can't even imagine. Zero Ads, and we actively monitor and maintain our own links.

Latest stories

Language »