Imagine waking up to discover your company’s latest batch of job applicants included hundreds of covert agents working for North Korea, angling for your remote software gigs to bankroll weapons programs. It might sound like something clawed from the fever-dreams of security consultants, but it’s uncomfortably real. Amazon, of all places, just reported blocking over 1,800 such job applications. And if you think this problem stops at Amazon’s doorstep, you’re not paying attention.
Remote Work: The Perfect Cover for Bad Actors
For years, tech companies convinced themselves that remote work was a silver bullet for productivity and talent access. Turns out, it’s also a gold mine for anyone trying to quietly burrow into an organization. And North Korea—infamous for moonlighting in cybercrime to offset sanctions—saw the opportunity and ran with it, targeting remote IT positions with renewed fervor.
The approach is textbook: take advantage of the faceless, paperwork-heavy nature of modern hiring. It’s all done over Slack, Zoom, and endless email threads. Human Resources may be patting themselves on the back for landing that affordable mid-tier developer in Denver, but in reality, they could’ve just paid for a new missile test in Pyongyang.
Identity Theft as a Business Model
North Korean operatives aren’t trying to breeze in through the front door. They’re crafting clever backstories, hijacking dormant LinkedIn accounts (ones nobody bothered to memorialize or delete), and impersonating real engineers. The blandest, “believable” profile wins. If you look hard enough, you might spot the cracks—some weird formatting in the phone number, maybe an alma mater that folds quicker than a Ponzi scheme when you go to verify it. But unless you obsess over every detail, these candidates whiz past the average recruiter’s filter.
Most companies don’t have the luxury (or the budget) to comb through every credential. North Korea banks on that apathy, literally. And why wouldn’t they? The quarterly growth in these application attempts, up 27% in just the last year, shows there’s little deterrence worth mentioning.
Laptop Farms: When a Bedroom in Pyongyang Looks Like Your Office in Ohio
The innovation doesn’t stop at fake résumés. Enter the “laptop farm”: dozens of U.S.-based computers, physically planted stateside but remotely commandeered from Korea. From a network admin’s perspective, it looks like any other employee logging in after binge-watching reality TV. Sure, the typing speed occasionally goes haywire, latency pings don’t quite add up, but who’s got time to chase every digital ghost?
- 29 illegal laptop farms uncovered in the U.S. in June 2025
- Over 300 U.S. tech companies unwittingly compromised
- More than $17 million in wages funneled to the regime—enough to make any bureaucrat in Pyongyang do a little victory dance
And that’s just the stuff we know about. The real number? Who knows, probably double.
Amazon’s AI: The Bouncer at the Tech Industry’s Front Door
Credit where it’s due: Amazon isn’t asleep at the wheel. Their AI models liken themselves to bouncers at an exclusive club. These systems are sifting through connections to 200 or so “high-risk” organizations, parsing timelines, and flagging applications that don’t pass the sniff test. If you’re pretending to have graduated from a ghost university while accessing systems from a suspicious IP address, your odds just dropped to zero.
But AI alone doesn’t do the whole job. After the ride on the algorithmic merry-go-round, Amazon’s people pick up the slack: running credential checks, grilling candidates in interviews, even analyzing typing patterns for that telltale lag you get from controlling a laptop on the other side of the world. Paranoid? Not anymore—it’s just ordinary due diligence.
This Mess Isn’t Amazon’s Alone
There’s the rub: while Amazon claims the headlines, they’re hardly the lone target. Every midsize tech company, every SaaS startup burning investor cash, and every sleepy HR department in corporate America faces the same threat. The U.S. Department of Justice knows it, companies know it, and—let’s not kid ourselves—Pyongyang knows it. For every major breach publicized, hundreds of quieter infiltration attempts probably make it to payday.
This is the world you work in now. Companies look for talent globally, and so do state-backed hackers. The taboo of remote hiring has vanished, but so has any illusion of national borders protecting your payroll. Now, the person onboarded into your IT department after only a video call and a handful of reference checks could just as easily contribute to your bottom line—or someone else’s missile program.
How Companies Can Keep the Wolves Out
You may not have Amazon’s budget, but you can still avoid becoming a North Korean ATM. Here’s what’s on the must-have list:
- Tight Verification: Check those references. Confirm the schools actually exist. Don’t outsource vetting to LinkedIn or, even worse, your gut.
- Activity Monitoring: Odd login hours? Laggy keystrokes? Suspicious remote access sessions? Automate alerts and hire someone who actually cares to monitor them.
- Collaboration Matters: No company is an island. Talk to law enforcement when something smells fishy. Share what you learn, because someone else’s breach could just as easily be yours.
Sure, these steps sound obvious. But when you’re moving fast and breaking things, “obvious” often ends up in the backlog until it’s woefully too late. And by the time you spot the anomaly on a payroll report or IT log, those wages are halfway to funding god-knows-what.
The Unending Arms Race
North Korea isn’t going to get bored and stop because of a news cycle. Neither will Russia, nor any other regime desperate for cash. They’ll iterate. They’ll probe. The days of assuming a remote hire is who they claim to be—those are done. Tech companies, for all their bravado about disruption, now have to spend as much time rooting out digital imposters as they do chasing innovation.
This is more than a headline. It’s your HR department’s problem, your IT team’s nightmare, and your CEO’s favorite new excuse for doubling the security budget. Welcome to hiring in 2025: Everyone wants your open role, and not all of them care about your business goals. Some just want your direct deposit.


