https://blog.knowbe4.com/how-a-north-korean-fake-it-worker-tried-to-infiltrate-us

A security firm, KnowBe4, has foiled an attempt by a North Korean hacker to infiltrate its systems by posing as a legitimate software engineer. The company successfully identified and contained the threat before any damage was done.

The attacker, believed to be affiliated with North Korea, submitted a fabricated resume and underwent a seemingly standard hiring process, including background checks and reference verification. However, upon receiving their work computer, the “employee” immediately attempted to download malware. KnowBe4’s security team detected the suspicious activity and launched an investigation.

The investigation revealed that the applicant’s photo was a deepfake generated from stock photography. Additionally, the attacker used social engineering tactics to explain away the suspicious activity, claiming to troubleshoot internet speed issues.

This incident highlights the evolving tactics of nation-state attackers and the importance of robust security measures for businesses. KnowBe4 recommends several preventative steps, including:

  • Enhanced vetting procedures: This could involve verifying physical location, scrutinizing resume inconsistencies, and conducting video interviews.
  • Improved background checks: Don’t rely solely on email references and ensure thorough name verification.
  • Continuous security monitoring: Monitor for suspicious activity and unauthorized access attempts.
  • Employee security awareness training: Educate employees on social engineering tactics used by attackers.

The KnowBe4 case demonstrates the critical need for collaboration between HR, IT, and security teams to defend against sophisticated cyberattacks.