朝鲜10万名虚假IT工人为金正恩每年带来5亿美元收入。
North Korean's 100k fake IT workers net $500M a year for Kim

原始链接: https://www.theregister.com/2026/03/18/researchers_lift_the_lid_on/

## 朝鲜IT工人计划:日益增长的威胁 IBM X-Force和Flare Research的最新报告详细介绍了朝鲜渗透公司、使用虚假IT工人背后复杂的运作。这些工人可能遍布40个国家,总数高达10万,每年为平壤带来约5亿美元的收入,他们通过远程和全职职位窃取资金和敏感数据。 该运作涉及分层结构:招聘人员、协助者、IT工人以及合作者(提供身份的西方人)。工人们擅长网页开发和.NET,通常不知道计划的真实性质,最初被告知他们加入的是“隐秘的初创公司”,例如“C Digital LLC”。他们使用虚假的在线资料和工具,如谷歌翻译、朝鲜VPN(OConnect/NetKey)以及安全消息应用程序IPMsg。 研究人员发现证据表明工人们在Upwork等自由职业平台上追踪“投标”和“消息”。一旦受雇,他们便利用协作支持来取得成功并获得系统访问权限。缓解策略包括仔细审查在线面试行为中的不一致之处,留意人工智能修改过的视觉内容,并使用“致命问题”——直接询问关于金正恩的问题,朝鲜工人会立即结束通话以避免回答。

## 朝鲜的IT收入来源 一份最新报告详细说明朝鲜通过约10万名IT人员的网络,每年产生大约5亿美元的收入。Hacker News上的讨论集中在将这些工人定义为“虚假”的准确性上,许多人认为他们是真正的人,在完成真实工作,尽管情况具有欺骗性——通常使用被盗身份。 该计划涉及个人在国际上获得IT工作,并得到他人的支持来完成任务,他们的收入被转移回金氏政权。引发的担忧包括这些工人可能被用作未来网络攻击的“内部威胁”,以及公司在不知情的情况下雇用与敌对国家有关联人员的伦理问题。 评论员强调了朝鲜境内法律的合法性(或缺乏),与当地收入相比,美国工资的吸引力,以及促成这项活动更广泛的地缘政治背景——包括来自中国的保护以及与西方国家冲突的历史。有些人甚至将其与传统的间谍战术相提并论。
相关文章

原文

Researchers at IBM X‑Force and Flare Research have uncovered data that sheds light on how North Korea's fake IT worker schemes operate and infiltrate companies in order to funnel money back to the regime and steal sensitive information.

In a published report, "Inside the North Korean infiltrator threat," the pair detail evidence of the top-level infrastructure used to manage the operations, how workers apply for and secure IT roles, and mitigation strategies businesses can use to avoid falling victim.

The threat of North Korean nationals operating as remote IT contractors or full-time technology staff inside unsuspecting companies has come to light over the past several years, yet the report says security experts are only starting to realize the scale and sophistication of the operation.

It cites information from the US Government that these IT workers can earn more than $300,000 a year, and upwards of 100,000 North Koreans are spread across 40 countries generating approximately $500 million a year for Pyongyang.

The researchers found documents and spreadsheets revealing the roles within the fake IT worker ecosystem, comprising recruiters, facilitators, IT Workers and collaborators/brokers.

Recruiters are, like bona fide recruitment staff, responsible for screening potential IT staff and recording interviews. These are sent to facilitators who decide whether to accept or deny them for employment, much like a hiring manager.

However, it is unclear whether many candidates realize they are being recruited to work for the Norks. Recruiters may tell them the company they are applying to is an "early-stage stealth startup" with no published corporate information, often using the name "C Digital LLC."

Candidates are mentored in applying for employment at western-based companies and given a US-based identity to use.

Facilitators and IT workers are the most important roles within the system. These are expected to have experience in full stack web app development, .NET and Wordpress. Collaborators are Westerners that provide their identities for use in the IT worker fraud scheme, and may assist in other ways.

Timesheets found by the researchers detail hours worked on "Bids" and "Msg" by the fake workers, where "Bids" is how many bids in a day they made on freelancing sites such as Upwork, and Msg likely refers to how many messages or connections a worker made on UpWork, LinkedIn, or Freelancer.

The workers make use of fake identities to pursue work opportunities -counterfeit accounts or verified accounts linked to real individuals who may have unwillingly given the worker access.

Once employed in a full-time role, fake workers are often very successful, since they sometimes have multiple people helping them to produce their work, with the hope of getting a promotion and gaining more privileged access to the IT systems.

One of the most essential tools for North Korean IT workers is Google Translate, the report says. This is used in nearly every part of their online activity, including for translating job descriptions, creating applications and communicating with others as part of their work.

The report identifies some tools associated with fake workers, which companies can watch out for. One is known as OConnect and/or NetKey, - a known North Korean VPN - likely used to connect to internal networks in Pyongyang.

Also common is IP Messenger, or IPMsg, an open-source messaging application that does not require a central server, meaning it doesn't rely on centralized platforms operated by US companies such as Discord or Google.

The report outlines some mitigation strategies, including warning signs like fake backgrounds, AI face changers, or AI voice changers during online interviews. Employers should also watch for discrepancies between the candidate's resume and what they say in interviews, such as what languages they claim to speak and where they claim to reside.

Alternatively, there is a killer interview question, as reported by The Register previously: ask them something like "How fat is Kim Jong Un?" and if they are a North Korean, they will terminate the call instantly. ®

联系我们 contact @ memedata.com