By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: behind is North Korea
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Mobile > behind is North Korea
Mobile

behind is North Korea

News Room
Last updated: 2026/03/16 at 9:21 PM
News Room Published 16 March 2026
Share
behind is North Korea
SHARE

A European company publishes an offer for a remote technological position and, after several filters, hires a candidate who perfectly fits the profile. The resume is solid, the interviews are carried out without problems and, on paper, this incorporation becomes integrated into the team as one more. But there is a possibility that until recently many companies did not even consider: that this worker is not who they say they are. Cybersecurity experts maintain that this phenomenon comes almost exclusively from North Korea, a practice documented in the United States and whose first signs are also beginning to be seen in Europe.

The problem of fake employees in Europe. To understand why it is now starting to cause concern in this part of the world, it is worth first looking at what has already happened in the North American country. There, authorities and cybersecurity specialists have been investigating a very specific pattern for years: supposed technology professionals who were actually part of networks linked to Pyongyang. According to data from the Department of Justice, these operations managed to infiltrate more than 300 companies between 2020 and 2024, generating at least $6.8 million in income for the North Korean country.

How deception works. The process usually begins with building a compelling professional identity. According to the Financial Times, operatives can take over inactive LinkedIn accounts or even pay their owners to use them, and from there create apparently legitimate profiles with falsified resumes and recommendations generated by other members of the network. Language models also help them create culturally appropriate names, plausible email addresses, and messages that reduce linguistic or cultural cues that could previously give them away. In the interview phase, technology plays an increasingly important role: these networks can resort to digital masks, avatars or video filters, and when some companies tighten controls, they also go so far as to pay real intermediaries to appear on video calls in their place.

The success of this scheme is not explained only by the technological tools used by false candidates. It also has to do with a structural weakness within many organizations. According to cybersecurity experts cited by the aforementioned newspaper, the hiring process has rarely been considered a corporate security front. For years it has been managed mainly from human resources, with controls designed to evaluate talent, not to detect infiltration operations. That approach has left a vulnerability that these networks are exploiting.

Once inside the company. Getting through the hiring process is only the first phase of the operation. Some of these schemes include intercepting the laptops that companies send to their new employees to work remotely. After accessing the equipment, operatives can connect from other locations and carry out their work activity using tools based on language models and chatbots. This system allows them to fulfill the tasks assigned by the company and, in some cases, manage several technological jobs at the same time. Furthermore, the risk is not limited to collecting salaries; some also steal information or infect systems with malware.

For threat analysts, the first signs of expansion towards Europe are already visible. According to information collected by the Financial Times, researchers have identified signs that networks linked to North Korea are trying to reproduce in the region the same model that was previously observed in the North American country. One of the elements that has attracted attention is the appearance in the United Kingdom of the so-called laptop farmsspaces where remotely connected laptops are concentrated so that operatives can work as if they were physically in the country. This type of infrastructure suggests that the scheme could also be beginning to be replicated in Europe.

Images | WorldOfSoftware with Nano Banana

In WorldOfSoftware | We knew that North Korea has been infiltrating workers into Western companies for years. Now we know how they do it

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article we ranked the saga from worst to best we ranked the saga from worst to best
Next Article Best Amazon Big Spring Sale Apple deals: Save on M4 iPad Air, AirPods Pro 3, and more Best Amazon Big Spring Sale Apple deals: Save on M4 iPad Air, AirPods Pro 3, and more
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Spotify is getting ready for its debut on smart glasses
Spotify is getting ready for its debut on smart glasses
News
Your UX Is Telling Users Whether or Not They Should Trust You | HackerNoon
Your UX Is Telling Users Whether or Not They Should Trust You | HackerNoon
Computing
MacBook Neo can be modded to run faster, but you probably shouldn't
MacBook Neo can be modded to run faster, but you probably shouldn't
News
Today's NYT Connections: Sports Edition Hints, Answers for March 17 #540
Today's NYT Connections: Sports Edition Hints, Answers for March 17 #540
News

You Might also Like

we ranked the saga from worst to best
Mobile

we ranked the saga from worst to best

12 Min Read
Iran, first mass test of AI-assisted warfare
Mobile

Iran, first mass test of AI-assisted warfare

10 Min Read
Nutanix Agentic AI, more facilities for the adoption of agentic AI in the company
Mobile

Nutanix Agentic AI, more facilities for the adoption of agentic AI in the company

4 Min Read
these are the best bargains
Mobile

these are the best bargains

7 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?