Imagine hiring a remote engineer who passes interviews, technical tests, and background checks—only to discover they’re a cyber spy. This isn't fiction. It happened in 2024, when cybersecurity firm KnowBe4 discovered one of its new hires manipulating suspicious files and running unauthorized software.
After an internal investigation, they found the employee was a North Korean national, part of a global network of fake professionals deceiving companies to gain access to corporate systems and steal sensitive information.
This is not an isolated case. It’s part of a growing trend exposing a new risk: insider threats disguised as remote hires.
Since 2017, the FBI and companies like ESET and Microsoft have tracked WageMole, a group linked to North Korea focused on placing fake workers in Western companies.
Microsoft data shows that between 2020 and 2022, over 300 companies—including several Fortune 500 firms—fell victim to this tactic. In June 2022 alone, Microsoft suspended 3,000 Outlook and Hotmail accounts used by fake applicants.
And the issue has gone global:
A U.S. court case revealed that some infiltrators earned over $860,000 across at least 60 companies.
These attackers craft full digital identities, mixing real and fake data to appear legitimate. They create email accounts, social media profiles, and developer pages on platforms like GitHub or LinkedIn. Some even use deepfakes or voice/face changers during video interviews.
Their goal is to convince recruiters they’re qualified remote professionals.
Once hired, these fake employees can:
ESET notes that WageMole also collaborates with DeceptiveDevelopment, a group that tricks real developers into solving “technical challenges” using infected code. The criminals then steal those identities and reuse them in hiring scams.
Learn more: Cyberespionage Against Executives and Politicians
Behind each fake candidate is a network of foreign collaborators who help maintain the disguise. These facilitators:
Once hired, the fake employee receives the company’s laptop—which is sent to a “laptop farm” in the target country. The real worker in North Korea connects via VPN, proxies, or VPS, making it seem like they are based in the company’s country.
Hiring a cyber infiltrator isn’t just a security breach—it can also lead to legal and reputational damage. Affected organizations may unknowingly pay sanctioned individuals, violating international finance and trade laws.
These individuals often gain privileged access to critical environments, leading to:
In short, one poorly managed hire can turn into a catastrophic operational and reputational failure.
At TecnetOne, we believe cybersecurity starts at recruitment. Here are key steps to protect your company:
a. Suspicious downloads or unauthorized software installs
b. IP logins from high-risk regions (e.g., China, Russia, North Korea)
c. Remote Management Tool (RMM) use on corporate devices
Similar titles: How to Detect and Remove Spyware Apps on Android
Prevention isn’t only about tools. Combining tech controls with human insight is key to detecting anomalies.
Reinforce hiring and access processes with:
And most importantly, promote a culture of active vigilance. HR and IT must collaborate, sharing information about suspicious candidates or employees.
The KnowBe4 case proves the threat isn’t always outside—it can be inside your team. In a remote-first world with hyper-realistic AI tools, attackers have learned to pose as ideal professionals.
At TecnetOne, we urge you to fortify your hiring process with rigorous interviews, smart monitoring, and technical safeguards. That’s how you’ll protect your data, your team, and your reputation.