FB pixel

Deepfakes contributing to North Korea’s war chest, global intelligence ops

Hiring fraud making headlines described as the tip on an iceberg
Deepfakes contributing to North Korea’s war chest, global intelligence ops
 

Hundreds of companies from among the Fortune 500 have been unwitting pawns in a scheme by North Korea to violate international sanctions through employment fraud facilitated by synthetic identities.

IT analysts and law enforcement officials describe an operation in which laptop farms are established in America and remotely controlled by teams of North Koreans in China and Russia, both of which are aware of the fraud, Fortune reports. Altogether they have raked in at least hundreds of millions of dollars, perhaps as much as $1 billion, according to FBI estimates. A researcher at CRDF Global talking to Radio Free Asia put the total closer to $1.7 billion in cryptocurrency alone.

Those committing the crimes are separated from their families and kept in conditions compared in the report to modern slavery. The regime confiscates most of their salaries to finance its military ambitions, according to the report.

They sometimes buy and sometimes steal real identities from Americans and then build profiles on top of them to evade detection during background checks. They have also appeared in the video meetings now common in remote work. Cybersecurity research firm ESET has discovered North Korean workers using AI to manipulate photos in online account profiles and CVs, and to carry out real-time video injection attacks that swap in the face of the person whose identity is being impersonated.

As explained in a recent report from Reality Defender, there are tools available to detect deepfake videos injected into online interviews and conference calls that will seem like the real thing to others on the call.

There are probably between one thousand and ten thousand of them working for companies around the world, KnowBe4’s Roger Grimes told Fortune.

North Korean hackers have found jobs at aerospace manufacturers, U.S. banks and crypto startups. They have taken freelance and contract positions. They have also targeted businesses in Europe, Saudi Arabia and Australia.

But North Korean hackers aren’t just targeting businesses with deepfakes and AI fraud. Government officials, journalists, human-rights activists and researchers have also been contacted by North Koreans posing as real or manipulated identities. In some cases, the identity fraud is related to phishing, and in others, attempts to gain information useful to the country’s intelligence apparatus.

RFA has produced a three-part series, titled “Whack A Mole: North Korea’s Cyber Threat” detailing the use of a wide range of impersonation tactics, from manipulated and false identity data in social media posts and applications all the way up to deepfakes.

And deepfakes can be introduced even before the business has a chance to put the employee’s authenticity to the test in a video call.

An attack against a South Korean target reported in September by Bloomberg was carried out by a state-sponsored North Korean group, and reportedly used a deepfake of a military ID created by ChatGPT. Threat intelligence company Genians found that OpenAI’s LLM initially refused to break South Korean law by replicating a military ID document, but was convinced to do so by altering the prompt.

The third video from RFA describes the attacks as persistent, and notes a particular interest in working on development projects involving smart contracts, which could set up future thefts.

Related Posts

Article Topics

 |   |   |   |   | 

Latest Biometrics News

 

Face biometrics use cases outnumbered only by important considerations

With face biometrics now used regularly in many different sectors and areas of life, stakeholders are asking questions about a…

 

Biometric Update Podcast explores identification at scale using browser fingerprinting

“Browser fingerprinting is this idea that modern browsers are so complex.” So says Valentin Vasilyev, Chief Technology Officer of Fingerprint,…

 

Passkeys now pervasive but passwords persist in enterprise authentication

Passkeys are here; now about those passwords. Specifically, passkeys are now prevalent in the enterprise, the FIDO Alliance says, with…

 

Pornhub returns to UK, but only for iOS users who verify age with Apple

In the UK, “wanker” is not typically a term of endearment. However, the case may be different for Pornhub, which…

 

Europol operated ‘shadow’ IT systems without data safeguards: Report

Europol has operated secret data analysis platforms containing large amounts of personal information, such as identity documents, without the security…

 

EU pushes AI Act deadlines for high-risk systems, including biometrics

The EU has reached a provisional agreement on changes to the AI Act that postpone rules on high-risk AI systems,…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events