BRITS could be helping North Korean spies pose as IT workers to infiltrate Western companies, an intelligence report has warned.
The fake IT workers are hired for fully remote jobs using stolen or fake identities to earn cash for Kim Jong-un’s regime.



Once inside the North Korean fraudsters exploit the companies – stealing funds and information.
The scams have had a devastating impact on companies across the country and left them wondering just how North Korea pulled them off.
Now, an intelligence report has revealed that Brits could have been helping all along.
As per the findings from Google Threat Intelligence, North Korean intelligence operatives utilize individuals known as “local facilitators” to assist them in securing employment and confirming their identities.
These intermediaries employ remote desktop software, enabling individuals from North Korea to access a company’s internal servers, creating the illusion that they are operating from within the nation.
During their investigation, Google experts discovered that a laptop provided by a US-based firm was being operated from London, raising concerns that individuals from the UK might be involved in this covert operation.
Principal i3 Insider Investigator at DTEX Systems, Michael Barnhart, told The Sun: “The London-based facilitator previously acted as the primary ‘farmer’ and enterprise representative in the operation, having established a front company in collaboration with another facilitator who was the main North Korean IT worker.”
Barnhart said that all evidence of the operation has now been removed.
This follows a wider trend across the US where American citizens have been accused of helping the fake IT workers remain undetected.
Matthew Knoot, 38, was arrested for allegedly helping North Korean workers in Nashville, Tennessee last year.
Knoot allegedly helped the workers use stolen identities to pose as US citizens and hosted company laptops at his home.
From there he ran a “laptop farm” – allowing the North Korean actors to log in to the computers from China.
Knoot is also believed to have helped launder money from the remote IT jobs to accounts tied to North Korean and Chinese actors.
United States Attorney Henry Leventis said at the time that Knoot helped funnel hundreds of thousands of dollars to the North Korean government through the scheme.
HOW DO THE SCAMS WORK?
The North Korean spies reportedly use stolen or fake identities to set up accounts on remote job sites – including LinkedIn, Upwork and Freelancer – to apply for work.
And to make sure they’re not detected they use “aliases, false or fraudulent personae and proxies,” according to the HM Treasury’s Office of Financial Sanctions Implementations.
Once they make it to interview stage, they often use AI-generated deepfakes to look and sound like the person they are claiming to be.
These AI deep-fakes are becoming increasingly easy to purchase, with a full identity complete with an ID doc and proof of address available from as little as $200 on the dark web.
Head of National Security Intelligence at Chainanalysis Andrew Fierman told The Sun: “All you need are a few photos and a very small clip of voice of the person you’re attempting to be and you can effectively be that person”


After being recruited the North Korean workers use their stolen credentials to breeze through the onboarding process.
And they often ask their employers to send their work laptops to front addresses – run by “local facilitators” – which allows them to remain undetected.
Once fully onboarded the fraudsters work hard to establish themselves within the company, gaining its trust before they pounce.
Companies often allow high-performing workers to refer future employees – allowing them to slowly amass an army of cyber warriors.
They then set about hatching plans to “exploit and steal funds from the organisations”.
Fierman explained that there are a number of cunning tactics that the North Korean workers use.
Fierman said: “It’s all about getting someone within an organisation to give you an access point unknowingly.”
He added: “For example, if it’s bonus season and North Korea knows it’s bonus season at your organisation, they might send out an email saying here’s the details of your upcoming bonus.
“Somebody is going to get excited and click the link and then they’ve given North Korea access to the entire infrastructure of their organisation.”
These sly tactics allow the North Korean workers to access sensitive information as well as money.
They reportedly use this information as a bargaining chip if needed – dishing out threats of sharing it with competitors.
UK sanctions on North Korea
DPRK targets are on OFSI’s consolidated list of financial sanctions and are subject to an asset freeze.
This regime also includes sectoral financial sanctions, which contain both restrictions and requirements. These include those placed on:
- The sale or purchase of bonds
- DPRK credit and financial institutions including branches, subsidiaries and representative offices)
- UK credit and financial institutions from dealing with DPRK credit and financial institutions (including branches, subsidiaries and representative offices)
- Representative offices belonging to designated persons
- Business arrangements with designated persons
- Financial support for trade
- Investment and commercial activities
- Bank accounts for DPRK diplomats and diplomatic missions
- Leasing or, otherwise making available, real property
Source: HM Treasury’s Office of Financial Sanctions Implementations (OFSI)
KIM’S CASH-STARVED REGIME
North Korea has been hit by many sanctions over the years forcing Kim Jong-un to think outside the box.
The tyrant has long relied on cyber activity to fund his cash-starved regime and the fake IT worker scams are the latest in a string of shady tactics.
Fierman told The Sun: “None of these North Korean workers are operating of their own will or fruition, they’re doing it on behalf of the North Korean government.”
And it’s thought that the money is going straight into the country’s weapons programmes.
A UN investigation in 2022 confirmed these suspicions and said that cyber attacks were an “important revenue source” for Pyongyang’s nuclear and ballistic missile programme
The recent worker scams come after a shocking crypto heist saw North Korea’s Lazarus Group accused of stealing $1.2billion back in February.
Hackers were able to gain control of an Ethereum wallet and rip all of its contents, in what has been dubbed the largest heist in crypto’s history.