• CONTACT
  • MARKETCAP
  • BLOG
Crypto NEWS
  • BOOKMARKS
  • Home
  • Shop
  • Bitcoin
  • Crypto News
  • Altcoin
  • Blockchain
  • Market Trends
  • Legal Docs
    • Contact
    • Privacy Policy
    • Terms and Conditions
    • About CryptoNewsUpdate.com
Reading: Are You a Freelancer? North Korean Spies May Be Using You
Share

Crypto NEWS

0
Font ResizerAa
  • Home
  • Shop
  • Bitcoin
  • Crypto News
  • Altcoin
  • Blockchain
  • Market Trends
  • Legal Docs
Search
  • Home
  • Shop
  • Bitcoin
  • Crypto News
  • Altcoin
  • Blockchain
  • Market Trends
  • Legal Docs
    • Contact
    • Privacy Policy
    • Terms and Conditions
    • About CryptoNewsUpdate.com
Have an existing account? Sign In
Follow US
© Crypto NEWS Update. All Rights Reserved.
Crypto NEWS > Blog > Bitcoin > Are You a Freelancer? North Korean Spies May Be Using You
Bitcoin

Are You a Freelancer? North Korean Spies May Be Using You

yangzeph4@gmail.com
Last updated: November 5, 2025 9:33 am
yangzeph4@gmail.com Published November 5, 2025
Share

North Korea’s IT operatives are shifting strategies and recruiting freelancers to provide proxy identities for remote jobs.

Operatives are contacting job seekers on Upwork, Freelancer and GitHub before moving conversations to Telegram or Discord, where they coach them through setting up remote access software and passing identity verifications.

In earlier cases, North Korean workers scored remote gigs using fabricated IDs. According to Heiner García, a cyber threat intelligence expert at Telefónica and a blockchain security researcher, operatives are now avoiding those barriers by working through verified users who hand over remote access to their computers.

The real owners of the identities receive only a fifth of the pay, while the rest of the funds are redirected to the operatives through cryptocurrencies or even traditional bank accounts. By relying on real identities and local internet connections, the operatives can bypass systems designed to flag high-risk geographies and VPNs.

Cryptocurrencies, Cybercrime, North Korea, Crimes, Cybersecurity
The recruitment process allows operatives to maintain ongoing access to identities and shift to new ones when flagged. Source: Heiner García/SEAL

Inside the evolving recruitment playbook of North Korean IT workers

Earlier this year, García set up a dummy crypto company and, together with Cointelegraph, interviewed a suspected North Korean operative seeking a remote tech role. The candidate claimed to be Japanese, then abruptly ended the call when asked to introduce himself in Japanese.

García continued the conversation in private messages. The suspected operative asked him to buy a computer and provide remote access.

The request aligned with patterns García would later encounter. Evidence linked to suspicious profiles included onboarding presentations, recruitment scripts and identity documents “reused again and again.”

Related: North Korean spy slips up, reveals ties in fake job interview

García told Cointelegraph:

They install AnyDesk or Chrome Remote Desktop and work from the victim’s machine so the platform sees a domestic IP.”

The people handing over their computers “are victims,” he added. “They are not aware. They think they are joining a normal subcontracting arrangement.”

Cryptocurrencies, Cybercrime, North Korea, Crimes, Cybersecurity
An email thread shows how recruiting is conducted through a freelancer platform. Source: Heiner García/SEAL

According to chat logs he reviewed, recruits ask basic questions such as “How will we make money?” and perform no technical work themselves. They verify accounts, install remote-access software and keep the device online while operatives apply for jobs, speak to clients and deliver work under their identities.

Though most appear to be “victims” unaware of who they’re interacting with, some appear to know exactly what they are doing.

In August 2024, the US Department of Justice arrested Matthew Isaac Knoot of Nashville for running a “laptop farm” that allowed North Korean IT workers to appear as US-based employees using stolen identities.

More recently in Arizona, Christina Marie Chapman was sentenced to more than eight years in prison for hosting a similar operation that funneled more than $17 million to North Korea.

Cryptocurrencies, Cybercrime, North Korea, Crimes, Cybersecurity
Chapman’s laptop farm duped over 300 US companies. Source: Office of Public Affairs

A recruitment model built around vulnerability

The most prized recruits are in the US, Europe and some parts of Asia, where verified accounts provide access to high-value corporate jobs and fewer geographic restrictions. But García also observed documents belonging to individuals from regions with economic instability, such as Ukraine and Southeast Asia.

“They target low-income people. They target vulnerable people,” García said. “I even saw them trying to reach people with disabilities.”

Cryptocurrencies, Cybercrime, North Korea, Crimes, Cybersecurity
Email evidence shows operatives targeting professionals with disabilities. Source: Heiner García/SEAL

North Korea has spent years infiltrating the tech and crypto industries to generate revenue and gain corporate footholds abroad. The United Nations said DPRK IT work and crypto theft are allegedly funding the country’s missile and weapons programs.

Related: From Sony to Bybit: How Lazarus Group became crypto’s supervillain

García said the tactic goes beyond crypto. In one case he reviewed, a DPRK worker used a stolen US identity to present themselves as an architect from Illinois, bidding on construction-related projects on Upwork. Their client received completed drafting work.

Despite the focus on crypto-related laundering, García’s research found that traditional financial channels are also being abused. The same identity-proxy model allows illicit actors to receive bank payments under legitimate names.

Cryptocurrencies, Cybercrime, North Korea, Crimes, Cybersecurity
A suspected operative requests payment to a bank account after completing freelance work. Source: Heiner García

“It’s not only crypto,” García said. “They do everything — architecture, design, customer support, whatever they can access.”

Why platforms still struggle to spot who’s really working

Even as hiring teams grow more alert to the risk of North Korean operatives securing remote roles, detection typically arrives only after unusual behavior triggers red flags. When an account is compromised, the actors pivot to a new identity and keep working.

In one case, after an Upwork profile was suspended for excessive activity, the operative instructed the recruit to ask a family member to open the next account, according to chat logs reviewed.

Cryptocurrencies, Cybercrime, North Korea, Crimes, Cybersecurity
Account provider “Ana” is asked to tap family members for new accounts. Source: Heiner García

This churn of identities makes both accountability and attribution difficult. The person whose name and paperwork are on the account is often deceived, while the individual actually doing the work is operating from another country and is never directly visible to freelancing platforms or clients.

The strength of this model is that everything a compliance system can see looks legitimate. The identity is real, and the internet connection is local. On paper, the worker meets every requirement, but the person behind the keyboard is someone entirely different.

García said the clearest red flag is any request to install remote-access tools or let someone “work” from your verified account. A legitimate hiring process doesn’t need control of your device or identity.

Magazine: Bitcoin OG Kyle Chassé is one strike away from a YouTube permaban

You Might Also Like

Dunamu’s Q3 Profit Surges Over 300% to $165M Amid Regulatory Clarity

American Fast Food Chain Steak ‘n Shake Is Coming to El Salvador

Crypto’s Long-Term Fundamentals ‘Have Never Been Stronger’ — Bitwise CEO

How Blockchain Tech and DATs Are Decentralizing Scientific Research

If Quantum Computing Breaks Through, What Happens to Satoshi’s Bitcoin?

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Copy Link Print
Previous Article Bitcoin, Ether ETF Outflows Deepen as SOL Inflows Surge Amid Macro Jitters
Next Article Bitcoin Is Infrastructure, Not Digital Gold
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Follow US

Find US on Socials

Subscribe to our newslettern

Get Newest Articles Instantly!

Popular News
Blocktech Brew Join Hands With Qila To Promote Web3 Services Across Industries!
$150M money market funds added to Arbitrum’s RWA ecosystem
Is $200,000 a Realistic Bitcoin Price Target for This Cycle?

Follow Us on Socials

We use social media to react to breaking news, update supporters and share information

Twitter Youtube Telegram Linkedin
Crypto NEWS

We influence 20 million users and is the number one business blockchain and crypto news network on the planet.

Subscribe to our newsletter

You can be the first to find out the latest news and tips about trading, markets...

Ad image
© Crypto NEWS Update. All Rights Reserved.
Welcome Back!

Sign in to your account

Lost your password?