Trojan Workforce: Defending Against State-Backed Insider Threats
State-sponsored actors from the Democratic People’s Republic of Korea (DPRK) ave ramped up their campaign of turning employment into an initial access vector.
blog
Trojan Workforce: Defending Against State-Backed Insider Threats
State-sponsored actors from the Democratic People’s Republic of Korea (DPRK) ave ramped up their campaign of turning employment into an initial access vector.
blogThe job offer may be the exploit.
It’s a reality of today’s cyber threat landscape thanks largely to a stubbornly persistent and widespread cyber espionage campaign carried out in recent years by state-sponsored actors from the Democratic People’s Republic of Korea (DPRK), which turns legitimate employment into an initial access vector.
Often referred to as "IT worker campaigns," these operations have fused what the security community has traditionally considered distinct motivations – financial gain and corporate espionage – into a single money-making, information-stealing cottage industry.
The campaign also underscores the importance of treating cybersecurity as a holistic corporate risk management practice rather than any single department's responsibility.
North Korea's Revenue-Generating Cyber Strategy
North Korean APTs stand apart from peers in China and Russia in their imperative to generate immediate financial returns from their cyber campaigns. As a heavily sanctioned isolationist state, the Hermit Kingdom relies on sophisticated, illicit income-generating activities to fund its strategic programs, particularly its weapons of mass destruction and ballistic missile development.
While, historically, North Korean cyber activity focused on more traditional cybercrime like cryptocurrency and bank theft, the IT worker campaign represents a calculated evolution. Instead of merely stealing funds through a one-off breach, these operatives seek long-term, legitimate employment within target organizations operating across numerous verticals.
Once hired, DPRK APTs are not only engaging in data theft and extortion, but are also routing their salaries back to the North Korean government. In their latest evolution, these campaigns are typically defined by:
1. High-volume job applications: By co-opting the “spray-and-pray” tactics common in rudimentary phishing campaigns, DPRK ATPs submit high volumes of applications, often using generic templates and AI-generated materials, to maximize their probability of securing a role.
2. Diverse target roles: Although often called an "IT worker campaign," these schemes have broadened their scope to many types of technical roles, including software developers, security researchers, payment processors, and bookkeeping positions, providing in some cases both technical access and direct financial control.
3. Added extortion and IP theft: While the initial goal is revenue generation through long-term employment, the campaign has recently demonstrated a shift toward more traditional malicious activities like data exfiltration, extortion, and IP theft to advance North Korea’s R&D efforts in areas like AI—all techniques that can become more devastatingly effective once an actor has attained “employee” status.
Laptop Farms and Geolocation Cloaking
A major challenge for defenders is the campaign’s two-pronged operational structure designed to cloak the operator's true location. Due to heavy sanctions and limited internet capabilities, DPRK actors often operate out of "friendly" countries like China and Russia. They rely on an intermediary—a facilitator, often a foreign citizen located in the target country—to manage the physical access point.
According to observations by Google Mandiant, a single U.S.-based worker was able to facilitate the siphoning of more than $6.8 million in salaries for North Korea over the course of three years. This shows both how these campaigns grow to scales worth pursuing for nation states and also the long view taken by their perpetrators.
The operation often involves a "laptop farm" in the target country like the United States, where a facilitator sets up and maintains numerous work laptops for remote access. The threat actor then connects from an offshore location using remote monitoring and management (RMM) tools like AnyDesk to connect from a VPN to the laptop farm, and then through the RMM tool to the work device. This "double-cloaking" makes identifying the true origin of the connection extremely difficult in corporate logs.
It’s worth emphasizing that the tools used to connect and remotely manage devices within the target country often have legitimate uses, potentially making their detection more difficult. That said, several tools appear to be favored by North Korean actors and their use should be closely monitored. This includes non-sanctioned VPNs designed to obfuscate location data and certain IP-enabled keyboard/video/mouse (KVM) devices that bypass traditional software monitoring.
A Multi-Disciplinary Defensive Strategy
This threat campaign demands a coordinated, multi-disciplinary defense that goes beyond traditional technical controls. In defending against these insider worker schemes, the security team is often the "fail-safe" after an actor has already successfully infiltrated the organization.
But that’s not to say security teams don’t have a role to play in protecting their organizations from insider campaigns like those being run by the DPRK. It starts with awareness-raising, both inside and out.
HR and Talent Acquisition as Frontline Defense
A critical takeaway of the shift in insider threat tactics is the need to integrate HR and hiring teams into the cybersecurity defense strategy. These teams are the first line of defense against the initial persona-creation phase. They should pay close attention to:
Promoting Scrutiny in the Interview Process: HR teams must be aware of potential red flags, such as candidates showing reluctance to turn on their cameras, using deepfake technology to obscure their identity, or having unexplained video/audio quality issues that could be masking a manipulated image. As deepfake technology improves, heightened suspicion becomes even more warranted.
Establishing Baseline Expected Behavior: Security teams should partner with HR and managers to clearly define the expected technical activities and data access for every role. Enforcing role-based access and least privilege is critical to recognizing indicators that an employee may be trying to access corporate data that falls outside their daily job scope.
Looping Security into Onboarding: Outlining a periodic review process of onboarding processes acts as another good measure, providing the opportunity to verify background check processes and ensuring strong asset management controls. This also serves as an opportunity to review any process with how an organization selects, onboards, and works with contractors and third-parties, another significant source of insider risk.
Technical Detection and Hunting
From a security operations perspective, detection should focus on anomalous behavior that suggests a remote, non-standard workflow, including:
RMM and VPN Monitoring: Implement strict policies limiting approved RMM and VPN tools. Hunt for unsanctioned software installations and monitor external VPN connections, especially those known to be associated with adversarial campaigns.
Anomalous Activity: Monitor network logs and data loss prevention (DLP) platforms for volume-based data exfiltration or access to sensitive data that falls outside the user's expected duties.
The "Mouse Jiggler" Indicator: Hunt for tools like Caffeine or other mouse jiggling tools designed to keep sessions persistent and prevent laptops from going to sleep. Their presence can be an indicator of remote operation from a laptop farm.
USB Device Monitoring: Implement strict logging and alerting around the use of non-standard USB devices, which could include KVM peripheral hardware or unauthorized storage devices used to exfiltrate data.
Organizations must approach detection by first establishing a baseline of activity within their environment. Alerting on the presence of RMM tools or VPNs is often unfeasible due to high organizational noise; therefore, the focus must be on creating high-fidelity detections that flag only highly suspicious tools or prohibited behavior.
A Shifting Security Imperative
The DPRK IT worker campaign represents a serious shift in tactics for North Korea specifically and insider threats more broadly. Rather than a (still dangerous) disgruntled employee, these actors form a highly-resourced, state-sponsored operation embedded for long-term financial and strategic gain.
To combat this, organizations must recognize it an organization-wide concern, rather than a problem for IT Security to solve. Security leaders must proactively engage HR, IT, and business leaders to educate them on the indicators of attack (IOAs) that occur before a technical breach (i.e., during the hiring process). By establishing clear policies on remote access tools, investing in sophisticated behavioral analytics, and creating a unified defense across the enterprise, organizations can significantly raise the cost and complexity for these unique and highly organized adversaries.
NEWSLETTER
Get insights straight to your inbox