North Korean-linked cyber actors are posing as U.S.-based software and technology firms to secure funds for national objectives, according to a recent report by security researchers from SentinelOne, Tom Hegel, and Dakota Cary.
Deceptive Tactics and Global Network
In a coordinated global campaign identified as Wagemole by Palo Alto Networks' Unit 42, North Korean IT workers, often hidden under front companies, create fake identities to secure remote jobs with businesses worldwide. This scheme aims to circumvent international sanctions and funnel earnings back to North Korea, supporting its weapons programs. In October 2023, U.S. authorities seized 17 websites pretending to be U.S. IT companies. These websites enabled North Korean IT professionals to disguise their identities and secure remote work contracts internationally. Some of these IT workers were linked to Yanbian Silverstar Network Technology Co. Ltd. and Volasys Silver Star, both based in China and Russia, respectively, as noted by the U.S. Department of Justice.
SentinelOne Findings and Continued Threat
SentinelOne further uncovered four additional front companies registered through NameCheap, masquerading as legitimate software and consulting firms by copying formats from authentic businesses. These companies include: - Independent Lab LLC (inditechlab[.]com), mirroring Kitrum, a U.S. firm - Shenyang Tonywang Technology LTD (tonywangtech[.]com), copying Urolime, another U.S. company - Tony WKJ LLC (wkjllc[.]com), replicating ArohaTech IT Services from India - HopanaTech (hopanatech[.]com) using ITechArt's template These fraudulent sites were seized as of October 10, 2024. Additionally, Shenyang Huguo Technology Ltd. (huguotechltd[.]com) mirrored Indian company TatvaSoft’s website, showing similar tactics.
Strategic Implications and Security Recommendations
The strategic use of the global digital economy by North Korean entities for state funding highlights the need for companies to enforce strong vetting procedures for contractors and suppliers to avoid inadvertently supporting such operations.
Underlying Intrusion Activities
The Unit 42 investigation revealed affiliations between North Korean group CL-STA-0237 and past cyber intrusions using malware-laden video conference software. Known for deploying BeaverTail malware, CL-STA-0237 exploited a U.S.-based SMB IT firm to seek other employment opportunities. In 2022, this cluster successfully secured a job at a major tech company, although the nature of the compromise remains unclear. It’s suspected CL-STA-0237 may have either stolen credentials or was hired as an outsourced associate, further leveraging such positions to spread malware. Unit 42 cautions that North Korean operatives are evolving from revenue-generation to more aggressive roles, including insider threats and malware dissemination, primarily operating from Laos. North Korean operations continue to pose significant cybersecurity threats, highlighting their sophisticated and adaptive approaches to fund state activities.