Sunday, April 13, 2025
HomeCyber AttackNorth Korean IT Workers Exploit GitHub to Launch Global Cyber Attacks

North Korean IT Workers Exploit GitHub to Launch Global Cyber Attacks

Published on

SIEM as a Service

Follow Us on Google News

A network of suspected North Korean IT workers is using GitHub to create and backstop fake personas, aiming to infiltrate companies globally, particularly in Japan and the United States.

DPRK-Linked Network Targets Companies in Japan and US

Cybersecurity firm Nisos has uncovered this operation, which appears to be part of Pyongyang’s efforts to fund its ballistic missile and nuclear weapons programs.

The network’s modus operandi involves creating elaborate backstories for these personas, claiming Vietnamese, Japanese, or Singaporean nationality.

- Advertisement - Google News

These fictitious identities seek remote positions in engineering and full-stack blockchain development, leveraging GitHub to establish credibility.

Cyber Attacks
Network map of likely DPRK-affiliated personas.

Sophisticated Persona Creation and Digital Manipulation

The DPRK-affiliated actors have demonstrated a high level of sophistication in their persona creation.

They utilize digitally manipulated profile photos, often superimposing faces onto stock images to create the illusion of the individual working with colleagues.

These personas claim extensive experience in web and mobile application development, proficiency in multiple programming languages, and blockchain technology expertise.

To further solidify their online presence, the network creates accounts on various platforms, including employment websites, IT industry-specific freelance platforms, and software development tools.

Cyber Attacks
Listed program languages on Huy Diep’s website

However, they notably lack social media accounts, suggesting these personas are created solely for employment acquisition.

One such persona, operating under the names Huy Diep and HuiGia Diep, claims employment as a software engineer at Japanese consulting company Tenpct Inc since September 2023.

This persona’s GitHub account, nickdev0118, was found to have co-authored commits with another suspected DPRK IT worker account, AnacondaDev0120.

The investigation revealed that at least two personas from this network have successfully obtained employment at companies with fewer than 50 employees.

This success underscores the potential threat posed by these operations to smaller organizations that may lack robust vetting processes.

Nisos’s findings highlight the evolving tactics of North Korean cyber operations, demonstrating their ability to adapt and exploit legitimate platforms like GitHub for malicious purposes.

As these actors continue to refine their methods, businesses worldwide must remain vigilant and implement stringent verification processes to protect against such sophisticated employment fraud schemes.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...