Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies

0
Medium
Vulnerabilityremote
Published: Tue Feb 10 2026 (02/10/2026, 17:44:00 UTC)
Source: The Hacker News

Description

The information technology (IT) workers associated with the Democratic People's Republic of Korea (DPRK) are now applying to remote positions using real LinkedIn accounts of individuals they're impersonating, marking a new escalation of the fraudulent scheme. "These profiles often have verified workplace emails and identity badges, which DPRK operatives hope will make their fraudulent

AI-Powered Analysis

AILast updated: 02/11/2026, 12:15:07 UTC

Technical Analysis

This threat involves DPRK-affiliated cyber operatives conducting a long-running, evolving campaign to infiltrate Western and other international companies by impersonating IT professionals on LinkedIn. The attackers create or hijack legitimate LinkedIn profiles with verified workplace emails and identity badges to apply for remote IT positions, thereby bypassing initial trust barriers. Once hired, these operatives gain administrative access to corporate infrastructure, enabling espionage, theft of sensitive intellectual property, and ransomware extortion. The campaign, tracked under various names such as Jasper Sleet and PurpleDelta, also includes sophisticated social engineering tactics like the 'Contagious Interview' scheme, where candidates are tricked into running malicious code disguised as part of a hiring process. This malware often leverages novel techniques such as EtherHiding, which uses blockchain smart contracts to host command-and-control infrastructure, complicating takedown efforts. The Koalemos RAT, deployed via malicious npm packages, provides attackers with extensive remote control capabilities, including file operations, discovery commands, and arbitrary code execution. The DPRK cyber apparatus is highly organized, with clusters like Labyrinth Chollima and its subgroups specializing in espionage and cryptocurrency theft. The attackers also use advanced money laundering techniques involving cryptocurrency chain-hopping and token swapping to obscure financial flows. The Norwegian Police Security Service has confirmed multiple incidents affecting Norwegian companies, indicating active targeting in Europe. The campaign exploits the rise of remote work and the challenges of verifying candidate identities in virtual hiring processes, making it a significant threat vector for corporate security.

Potential Impact

European organizations face multiple risks from this threat. First, the infiltration of corporate networks by DPRK operatives can lead to the theft of sensitive intellectual property, trade secrets, and confidential business information, undermining competitive advantage and national security interests. Espionage activities may target critical infrastructure, technology firms, and government contractors, potentially compromising strategic assets. Financially, the threat actors use their positions to siphon funds via cryptocurrency laundering, indirectly funding DPRK's weapons programs, which has broader geopolitical implications. The use of malware and RATs can disrupt business operations, cause data breaches, and facilitate ransomware attacks, leading to reputational damage and regulatory penalties under GDPR. The stealthy nature of the attacks, combined with advanced evasion techniques like blockchain-based C2 infrastructure, complicates detection and response efforts. Remote work environments prevalent in Europe increase the attack surface, as identity verification is more challenging and endpoint security may be inconsistent. Norway has already reported impacts, suggesting that other European countries with significant IT sectors and remote work adoption are at risk. The threat also stresses supply chain security, as malicious packages and trojanized software can propagate through trusted development workflows.

Mitigation Recommendations

European organizations should implement multi-layered defenses tailored to this threat. First, enhance candidate identity verification by requiring candidates to prove control over their LinkedIn accounts through direct communication and verification of official company emails before proceeding with hiring. Publicly warn individuals whose identities may be impersonated and encourage them to clarify legitimate communication channels. Strengthen endpoint security by deploying advanced malware detection capable of identifying RATs and suspicious npm packages, and monitor for unusual network traffic patterns, especially those involving blockchain-based command-and-control channels. Implement strict controls on software supply chains, including code repository access and package management, to detect and block trojanized dependencies. Conduct regular security awareness training focused on social engineering and fraudulent hiring schemes for HR and IT staff. Employ network segmentation and least privilege principles to limit the impact of compromised accounts. Monitor cryptocurrency transactions linked to payroll accounts for suspicious activity, leveraging blockchain analytics tools. Collaborate with law enforcement and cybersecurity communities to share threat intelligence and indicators of compromise. Finally, review and update remote work policies to include enhanced authentication and monitoring of remote employees.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://thehackernews.com/2026/02/dprk-operatives-impersonate.html","fetched":true,"fetchedAt":"2026-02-11T12:13:29.735Z","wordCount":1640}

Threat ID: 698c726b4b57a58fa193baa1

Added to database: 2/11/2026, 12:13:31 PM

Last enriched: 2/11/2026, 12:15:07 PM

Last updated: 2/11/2026, 1:25:20 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats