Monday, May 19, 2025
Homecyber securityHundreds of Fortune 500 Companies Have Unknowingly Employed North Korean IT Operatives

Hundreds of Fortune 500 Companies Have Unknowingly Employed North Korean IT Operatives

Published on

SIEM as a Service

Follow Us on Google News

North Korean nationals have successfully infiltrated the employee ranks of major global corporations at a scale previously underestimated, creating a pervasive threat to IT infrastructure and sensitive data worldwide.

Security experts revealed at the RSAC 2025 Conference that the infiltration extends across virtually every major corporation, with hundreds of Fortune 500 companies unknowingly employing North Korean technical workers, raising serious concerns about potential security breaches and data theft.

Infiltration Reaches Epidemic Proportions

“There are hundreds of Fortune 500 organizations that have hired these North Korean IT workers,” warned Charles Carmakal, Mandiant Consulting CTO, during a media briefing on Tuesday.

- Advertisement - Google News

The problem has reached such alarming levels that “literally every Fortune 500 company has at least dozens, if not hundreds, of applications for North Korean IT workers,” according to Carmakal.

Even more concerning, almost every Chief Information Security Officer interviewed has admitted to hiring at least one North Korean IT worker, with many confirming dozens have infiltrated their ranks.

Even tech giant Google has detected North Korean technical workers in their talent pipeline as job candidates and applicants, though the company reports none have been hired to date. Iain Mulholland, senior director of security engineering at Google Cloud, emphasized the universality of the threat:

“If you’re not seeing this, it’s because you’re not detecting it, not because it’s not happening to you.” Insider risk management firm DTEX corroborated these findings, reporting that 7% of its customer base-representing a cross-section of the Fortune 2000-has been infiltrated by North Korean operatives working as full-time employees with privileged access.

Evolving from Fundraising to Extortion

Initially, these North Korean operatives primarily focused on legitimate employment to generate funds for the regime in Pyongyang.

“Most of this activity is generally a fundraising activity,” explained John Hultquist, chief analyst at Google Threat Intelligence Group.

The revenue potential is substantial-a thousand IT workers earning six-figure salaries could generate approximately $100 million annually for the North Korean government, with many operatives simultaneously working multiple jobs at different organizations.

However, Mandiant observed a tactical shift approximately six months ago as companies became more vigilant in detecting and removing these operatives. In response, some North Korean workers have begun extorting their former employers, threatening to leak sensitive data if final payments or bonuses aren’t released.

While these extortion cases represent “a very small percentage” of incidents, according to Carmakal, they signal a concerning evolution in tactics that could potentially escalate to publishing stolen data online.

Security Experts Warn of Elevated Risks

The potential consequences extend far beyond financial losses, with security experts warning of possible disruption to critical services and infrastructure.

“When they start getting rooted out, it can sort of break bad on you and then start breaking things,” cautioned Hultquist. Technical connections between these IT workers and North Korea’s Reconnaissance General Bureau-previously linked to destructive cyberattacks-raise additional concerns about escalation.

Sandra Joyce, VP of Google Threat Intelligence, expressed astonishment at the sophistication of the operation: “The way that we’ve watched them put IT workers in Fortune 500 companies has been astounding.

” The privileged access these operatives gain as legitimate employees creates a particularly dangerous scenario, effectively giving them an “in-house” position from which they could potentially transfer access to North Korean intelligence services.

As organizations scramble to identify and remove these infiltrators, the case underscores a critical vulnerability in global hiring practices and the increasingly sophisticated methods employed by nation-state actors to bypass traditional security measures.

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!

Kaaviya
Kaaviya
Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Latest articles

New Report Finds 67% of Organizations Experienced Cyber Attacks in the Last Year

A disturbing 67% of businesses in eight worldwide markets—the US, UK, Spain, the Netherlands,...

Auth0-PHP Vulnerability Enables Unauthorized Access for Attackers

Critical security vulnerability has been discovered in the Auth0-PHP SDK that could potentially allow...

Active Exploitation of Ivanti EPMM Zero-Day Vulnerability in the Wild

Security researchers at The Shadowserver Foundation have identified active exploitation attempts targeting a critical...

Hacker Arrested for Taking Over SEC Social Media to Spread False Bitcoin News

Alabama man has been sentenced to 14 months in prison for orchestrating a sophisticated...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

New Report Finds 67% of Organizations Experienced Cyber Attacks in the Last Year

A disturbing 67% of businesses in eight worldwide markets—the US, UK, Spain, the Netherlands,...

Auth0-PHP Vulnerability Enables Unauthorized Access for Attackers

Critical security vulnerability has been discovered in the Auth0-PHP SDK that could potentially allow...

Active Exploitation of Ivanti EPMM Zero-Day Vulnerability in the Wild

Security researchers at The Shadowserver Foundation have identified active exploitation attempts targeting a critical...