DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies
The information technology (IT) workers associated with the Democratic People's Republic of Korea (DPRK) are now applying to remote positions using real LinkedIn accounts of individuals they're impersonating, marking a new escalation of the fraudulent scheme. "These profiles often have verified workplace emails and identity badges, which DPRK operatives hope will make their fraudulent
AI Analysis
Technical Summary
This threat involves DPRK-affiliated cyber operatives conducting a long-running, evolving campaign to infiltrate Western and other international companies by impersonating IT professionals on LinkedIn. The attackers create or hijack legitimate LinkedIn profiles with verified workplace emails and identity badges to apply for remote IT positions, thereby bypassing initial trust barriers. Once hired, these operatives gain administrative access to corporate infrastructure, enabling espionage, theft of sensitive intellectual property, and ransomware extortion. The campaign, tracked under various names such as Jasper Sleet and PurpleDelta, also includes sophisticated social engineering tactics like the 'Contagious Interview' scheme, where candidates are tricked into running malicious code disguised as part of a hiring process. This malware often leverages novel techniques such as EtherHiding, which uses blockchain smart contracts to host command-and-control infrastructure, complicating takedown efforts. The Koalemos RAT, deployed via malicious npm packages, provides attackers with extensive remote control capabilities, including file operations, discovery commands, and arbitrary code execution. The DPRK cyber apparatus is highly organized, with clusters like Labyrinth Chollima and its subgroups specializing in espionage and cryptocurrency theft. The attackers also use advanced money laundering techniques involving cryptocurrency chain-hopping and token swapping to obscure financial flows. The Norwegian Police Security Service has confirmed multiple incidents affecting Norwegian companies, indicating active targeting in Europe. The campaign exploits the rise of remote work and the challenges of verifying candidate identities in virtual hiring processes, making it a significant threat vector for corporate security.
Potential Impact
European organizations face multiple risks from this threat. First, the infiltration of corporate networks by DPRK operatives can lead to the theft of sensitive intellectual property, trade secrets, and confidential business information, undermining competitive advantage and national security interests. Espionage activities may target critical infrastructure, technology firms, and government contractors, potentially compromising strategic assets. Financially, the threat actors use their positions to siphon funds via cryptocurrency laundering, indirectly funding DPRK's weapons programs, which has broader geopolitical implications. The use of malware and RATs can disrupt business operations, cause data breaches, and facilitate ransomware attacks, leading to reputational damage and regulatory penalties under GDPR. The stealthy nature of the attacks, combined with advanced evasion techniques like blockchain-based C2 infrastructure, complicates detection and response efforts. Remote work environments prevalent in Europe increase the attack surface, as identity verification is more challenging and endpoint security may be inconsistent. Norway has already reported impacts, suggesting that other European countries with significant IT sectors and remote work adoption are at risk. The threat also stresses supply chain security, as malicious packages and trojanized software can propagate through trusted development workflows.
Mitigation Recommendations
European organizations should implement multi-layered defenses tailored to this threat. First, enhance candidate identity verification by requiring candidates to prove control over their LinkedIn accounts through direct communication and verification of official company emails before proceeding with hiring. Publicly warn individuals whose identities may be impersonated and encourage them to clarify legitimate communication channels. Strengthen endpoint security by deploying advanced malware detection capable of identifying RATs and suspicious npm packages, and monitor for unusual network traffic patterns, especially those involving blockchain-based command-and-control channels. Implement strict controls on software supply chains, including code repository access and package management, to detect and block trojanized dependencies. Conduct regular security awareness training focused on social engineering and fraudulent hiring schemes for HR and IT staff. Employ network segmentation and least privilege principles to limit the impact of compromised accounts. Monitor cryptocurrency transactions linked to payroll accounts for suspicious activity, leveraging blockchain analytics tools. Collaborate with law enforcement and cybersecurity communities to share threat intelligence and indicators of compromise. Finally, review and update remote work policies to include enhanced authentication and monitoring of remote employees.
Affected Countries
Norway, United Kingdom, Germany, France, Netherlands, Sweden, Finland, Denmark, Ireland
DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies
Description
The information technology (IT) workers associated with the Democratic People's Republic of Korea (DPRK) are now applying to remote positions using real LinkedIn accounts of individuals they're impersonating, marking a new escalation of the fraudulent scheme. "These profiles often have verified workplace emails and identity badges, which DPRK operatives hope will make their fraudulent
AI-Powered Analysis
Technical Analysis
This threat involves DPRK-affiliated cyber operatives conducting a long-running, evolving campaign to infiltrate Western and other international companies by impersonating IT professionals on LinkedIn. The attackers create or hijack legitimate LinkedIn profiles with verified workplace emails and identity badges to apply for remote IT positions, thereby bypassing initial trust barriers. Once hired, these operatives gain administrative access to corporate infrastructure, enabling espionage, theft of sensitive intellectual property, and ransomware extortion. The campaign, tracked under various names such as Jasper Sleet and PurpleDelta, also includes sophisticated social engineering tactics like the 'Contagious Interview' scheme, where candidates are tricked into running malicious code disguised as part of a hiring process. This malware often leverages novel techniques such as EtherHiding, which uses blockchain smart contracts to host command-and-control infrastructure, complicating takedown efforts. The Koalemos RAT, deployed via malicious npm packages, provides attackers with extensive remote control capabilities, including file operations, discovery commands, and arbitrary code execution. The DPRK cyber apparatus is highly organized, with clusters like Labyrinth Chollima and its subgroups specializing in espionage and cryptocurrency theft. The attackers also use advanced money laundering techniques involving cryptocurrency chain-hopping and token swapping to obscure financial flows. The Norwegian Police Security Service has confirmed multiple incidents affecting Norwegian companies, indicating active targeting in Europe. The campaign exploits the rise of remote work and the challenges of verifying candidate identities in virtual hiring processes, making it a significant threat vector for corporate security.
Potential Impact
European organizations face multiple risks from this threat. First, the infiltration of corporate networks by DPRK operatives can lead to the theft of sensitive intellectual property, trade secrets, and confidential business information, undermining competitive advantage and national security interests. Espionage activities may target critical infrastructure, technology firms, and government contractors, potentially compromising strategic assets. Financially, the threat actors use their positions to siphon funds via cryptocurrency laundering, indirectly funding DPRK's weapons programs, which has broader geopolitical implications. The use of malware and RATs can disrupt business operations, cause data breaches, and facilitate ransomware attacks, leading to reputational damage and regulatory penalties under GDPR. The stealthy nature of the attacks, combined with advanced evasion techniques like blockchain-based C2 infrastructure, complicates detection and response efforts. Remote work environments prevalent in Europe increase the attack surface, as identity verification is more challenging and endpoint security may be inconsistent. Norway has already reported impacts, suggesting that other European countries with significant IT sectors and remote work adoption are at risk. The threat also stresses supply chain security, as malicious packages and trojanized software can propagate through trusted development workflows.
Mitigation Recommendations
European organizations should implement multi-layered defenses tailored to this threat. First, enhance candidate identity verification by requiring candidates to prove control over their LinkedIn accounts through direct communication and verification of official company emails before proceeding with hiring. Publicly warn individuals whose identities may be impersonated and encourage them to clarify legitimate communication channels. Strengthen endpoint security by deploying advanced malware detection capable of identifying RATs and suspicious npm packages, and monitor for unusual network traffic patterns, especially those involving blockchain-based command-and-control channels. Implement strict controls on software supply chains, including code repository access and package management, to detect and block trojanized dependencies. Conduct regular security awareness training focused on social engineering and fraudulent hiring schemes for HR and IT staff. Employ network segmentation and least privilege principles to limit the impact of compromised accounts. Monitor cryptocurrency transactions linked to payroll accounts for suspicious activity, leveraging blockchain analytics tools. Collaborate with law enforcement and cybersecurity communities to share threat intelligence and indicators of compromise. Finally, review and update remote work policies to include enhanced authentication and monitoring of remote employees.
Affected Countries
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2026/02/dprk-operatives-impersonate.html","fetched":true,"fetchedAt":"2026-02-11T12:13:29.735Z","wordCount":1640}
Threat ID: 698c726b4b57a58fa193baa1
Added to database: 2/11/2026, 12:13:31 PM
Last enriched: 2/11/2026, 12:15:07 PM
Last updated: 2/11/2026, 1:25:20 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Microsoft to Refresh Windows Secure Boot Certificates in June 2026
MediumCVE-2025-62853: CWE-22 in QNAP Systems Inc. File Station 5
MediumCVE-2025-54170: CWE-125 in QNAP Systems Inc. Qsync Central
MediumCVE-2025-54169: CWE-125 in QNAP Systems Inc. File Station 5
MediumCVE-2025-54162: CWE-22 in QNAP Systems Inc. File Station 5
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.