Every Company Is a Target: Remote Hiring as an Attack Surface
There's a common assumption in security circles that threat actors go where the valuable data is: Defense contractors, financial institutions, healthcare systems. If your company doesn't fit that profile you're probably not worth the effort.
DPRK IT worker operations don't work that way.
These schemes target hiring workflows, not industries. The attack surface is the process of extending trust to someone you've never met in person, issuing them credentials, and giving them access to your systems. That process looks nearly identical across a mid-market SaaS company, a logistics firm, and a Fortune 500 enterprise. Which means the exposure is nearly identical too.
The Workflow Is the Target
Remote hiring has converged on a predictable pattern: post a role, screen applicants, conduct video interviews, run a background check, onboard. DPRK IT worker operations are built around exploiting exactly that sequence. According to U.S. government advisories from the Departments of State, Treasury, and the FBI, these aren't individuals improvising their way through job applications. They're organized teams with specialized roles. The person on the video call, the person doing the work, and the person receiving payment may be three different members of the same operation.
That level of organization means the attack doesn't depend on any single participant being exceptional. It depends on the system working as designed. And because hiring workflows are standardized, what works at one company transfers directly to the next.
Why No Company Is Too Small to Target
Conventional threat modeling treats risk as proportional to the value of what an attacker might access. That framing makes sense for network intrusion or ransomware. It doesn't apply here because the primary objective of these operations is the wage, not the data.
Any organization that pays a salary or an hourly rate is a viable target. Access to sensitive systems or proprietary information is upside, not the driver. As AI has lowered the cost of executing identity fraud, attacks that once required real investment to be worth attempting now cost almost nothing to run. There's no longer a meaningful reason for operators to be selective about who they target.
The DOJ's November 2025 enforcement actions illustrated this concretely: facilitators helped place DPRK workers fraudulently into positions at more than 136 U.S. victim companies across a wide range of industries. These weren't all high-security targets with classified data. They were organizations with remote roles, payroll systems, and VPN access.
The Gap That Controls Don't Close
Background checks, resume screening, video interviews, KYC processes: These controls do what they were designed to do, which is verify that the identity presented is legitimate. The problem is that verifying a valid identity isn't the same as confirming that the person using that identity is the person who was checked.
DPRK operators frequently present real or fraudulently obtained identities that pass verification. Background checks come back clean because the underlying record is clean. As we covered in our previous blog, faceswapped IDs can slide easily through standard background checks.
What none of these controls address is the continuity question: is the person operating under these credentials today the same person who was verified at hire? That question was never part of the design. These tools were built to validate identity at a point in time, not to maintain a persistent binding between a verified identity and the person using it day to day.
Why Placed Operators Are Hard to Detect
Once someone is inside with legitimate credentials, the detection problem gets harder, not easier. Internal monitoring is calibrated to flag anomalous behavior relative to a role. A worker behaving consistently with their assigned responsibilities generates no signal.
There's also a financial dynamic that makes DPRK IT workers specifically difficult to detect. As long as they're collecting payment, exfiltration or sabotage creates risk of exposure that would end the income stream. So this primary objective actively suppresses the behaviors that detection systems are built to catch. Federal guidance has documented placements that persisted undetected for months or years. Low incident reporting reflects a detection gap, not low prevalence.
The New York State Department of Financial Services noted this in its November 2024 advisory: companies often fail to notice anything unusual because these workers use native tools that blend into normal network activity. There's no behavioral shift to observe, no moment of betrayal to trigger an alert. The deception is fully in place from the first interaction and never changes.
What a Better Approach Looks Like
The starting point is being clear about what different controls actually verify. Document checks and background checks are artifact-verifying controls. They confirm that a record is clean, that a credential checks out. They don't confirm that the person presenting the credential is who they claim to be, and they certainly don't confirm it on an ongoing basis.
Operator-verifying controls address a different question: is the person using these credentials right now the person who was hired? These two categories aren't interchangeable. Most organizations have only the former.
The shift required is from one-time credentialing at hire to ongoing confirmation throughout the employment relationship. Government advisories have been consistent on this point. The threat doesn't end at onboarding, as the employment relationship itself is where these schemes operate. A worker who passed every check on day one is still operating inside the organization months later, with the same assumed trust and the same access. Mapping where identity claims convert into access privileges, then identifying which controls verify the operator rather than the artifact, is where the audit needs to start.
The asymmetry here is real. A successful placement requires one attempt. Closing the gap requires addressing it across every hiring cycle, for every remote role, indefinitely. That's not a reason to be discouraged; It's a reason to be clear about what the problem actually is.