Skip to content

Details

North Korea (DPRK) uses global Information Technology Workers (ITWs) to bypass sanctions and fund weapons programs. These operatives embed themselves in legitimate tech ecosystems, posing as freelancers or remote employees. Their goals include earning foreign currency and gaining access to sensitive systems and emerging technologies—creating both economic and cyber risks.DPRK ITWs employ advanced tactics: fake identities, AI-generated profiles, and remote infrastructure to hide their origins. They target sectors like software development, blockchain, and AI, where remote work and weak vetting make infiltration easier. Hiring one—even unknowingly—can lead to compliance violations and reputational damage.For tech professionals, this is a real and growing threat. DPRK ITWs exploit common platforms and processes, from freelance marketplaces to code repositories. Vigilant identity checks, monitoring for unusual access, and strict remote access policies are essential. This challenge blends technical compromise with geopolitical consequences, making awareness and proactive defense critical.

We have a special guest from the Front Range: Jeremey Parkhurst is Senior Threat Specialist at Microsoft, specializing in insider threat

and counterintelligence issues. Currently he is focused on efforts to mature insider
threat monitoring and investigations across classified and unclassified environments.

Events in Grand Junction, CO
Cybersecurity
IT Infrastructure
Software Development

Members are also interested in