朝鲜10万名虚假IT工人为金正恩每年带来5亿美元收入。
North Korean's 100k fake IT workers net $500M a year for Kim

原始链接: https://www.theregister.com/2026/03/18/researchers_lift_the_lid_on/

## 朝鲜IT工人计划:日益增长的威胁 IBM X-Force和Flare Research的最新报告详细介绍了朝鲜渗透公司、使用虚假IT工人背后复杂的运作。这些工人可能遍布40个国家,总数高达10万,每年为平壤带来约5亿美元的收入,他们通过远程和全职职位窃取资金和敏感数据。 该运作涉及分层结构:招聘人员、协助者、IT工人以及合作者(提供身份的西方人)。工人们擅长网页开发和.NET,通常不知道计划的真实性质,最初被告知他们加入的是“隐秘的初创公司”,例如“C Digital LLC”。他们使用虚假的在线资料和工具,如谷歌翻译、朝鲜VPN(OConnect/NetKey)以及安全消息应用程序IPMsg。 研究人员发现证据表明工人们在Upwork等自由职业平台上追踪“投标”和“消息”。一旦受雇,他们便利用协作支持来取得成功并获得系统访问权限。缓解策略包括仔细审查在线面试行为中的不一致之处,留意人工智能修改过的视觉内容,并使用“致命问题”——直接询问关于金正恩的问题,朝鲜工人会立即结束通话以避免回答。

## 朝鲜IT劳动力:摘要 一份最新报告详细说明了朝鲜通过约10万名IT劳工每年产生约5亿美元的收入。这些劳工并非“虚假”的,即并非不生产力,他们是真实存在的人,经常使用被盗身份来掩盖其所在地和工作单位。他们经常远程工作,有时会得到外部协助,并且可能非常成功,年收入高达30万美元。 主要的受益者不是个人劳工,而是朝鲜国家,它会收取他们收入的大部分。这种做法引发了对潜在安全风险的担忧,因为这些劳工可能被用于间谍活动或网络攻击。 讨论的重点在于合适的术语——“欺诈”、“欺骗”甚至是“奴隶劳动”,以及雇佣实际上是被迫从事这项工作的个人的伦理影响。一些评论员指出这与其他地方的剥削性劳动实践相似,而另一些人则强调独特的地缘政治背景和朝鲜政权的控制。这些劳工如何获得工作并维持其掩护的后勤问题也在争论之中,一些人认为招聘公司内部存在同谋。
相关文章

原文

Researchers at IBM X‑Force and Flare Research have uncovered data that sheds light on how North Korea's fake IT worker schemes operate and infiltrate companies in order to funnel money back to the regime and steal sensitive information.

In a published report, "Inside the North Korean infiltrator threat," the pair detail evidence of the top-level infrastructure used to manage the operations, how workers apply for and secure IT roles, and mitigation strategies businesses can use to avoid falling victim.

The threat of North Korean nationals operating as remote IT contractors or full-time technology staff inside unsuspecting companies has come to light over the past several years, yet the report says security experts are only starting to realize the scale and sophistication of the operation.

It cites information from the US Government that these IT workers can earn more than $300,000 a year, and upwards of 100,000 North Koreans are spread across 40 countries generating approximately $500 million a year for Pyongyang.

The researchers found documents and spreadsheets revealing the roles within the fake IT worker ecosystem, comprising recruiters, facilitators, IT Workers and collaborators/brokers.

Recruiters are, like bona fide recruitment staff, responsible for screening potential IT staff and recording interviews. These are sent to facilitators who decide whether to accept or deny them for employment, much like a hiring manager.

However, it is unclear whether many candidates realize they are being recruited to work for the Norks. Recruiters may tell them the company they are applying to is an "early-stage stealth startup" with no published corporate information, often using the name "C Digital LLC."

Candidates are mentored in applying for employment at western-based companies and given a US-based identity to use.

Facilitators and IT workers are the most important roles within the system. These are expected to have experience in full stack web app development, .NET and Wordpress. Collaborators are Westerners that provide their identities for use in the IT worker fraud scheme, and may assist in other ways.

Timesheets found by the researchers detail hours worked on "Bids" and "Msg" by the fake workers, where "Bids" is how many bids in a day they made on freelancing sites such as Upwork, and Msg likely refers to how many messages or connections a worker made on UpWork, LinkedIn, or Freelancer.

The workers make use of fake identities to pursue work opportunities -counterfeit accounts or verified accounts linked to real individuals who may have unwillingly given the worker access.

Once employed in a full-time role, fake workers are often very successful, since they sometimes have multiple people helping them to produce their work, with the hope of getting a promotion and gaining more privileged access to the IT systems.

One of the most essential tools for North Korean IT workers is Google Translate, the report says. This is used in nearly every part of their online activity, including for translating job descriptions, creating applications and communicating with others as part of their work.

The report identifies some tools associated with fake workers, which companies can watch out for. One is known as OConnect and/or NetKey, - a known North Korean VPN - likely used to connect to internal networks in Pyongyang.

Also common is IP Messenger, or IPMsg, an open-source messaging application that does not require a central server, meaning it doesn't rely on centralized platforms operated by US companies such as Discord or Google.

The report outlines some mitigation strategies, including warning signs like fake backgrounds, AI face changers, or AI voice changers during online interviews. Employers should also watch for discrepancies between the candidate's resume and what they say in interviews, such as what languages they claim to speak and where they claim to reside.

Alternatively, there is a killer interview question, as reported by The Register previously: ask them something like "How fat is Kim Jong Un?" and if they are a North Korean, they will terminate the call instantly. ®

联系我们 contact @ memedata.com