ZachXBT exposes North Korean IT employees working 30 pretend identities throughout improvement platforms

Blockchain investigator ZachXBT uncovered a complicated North Korean IT employee operation that infiltrates Western expertise firms by means of distant improvement positions.
In an Aug. 13 report, the investigator highlighted that an unnamed supply compromised a tool belonging to one in every of 5 DPRK IT employees, offering unprecedented entry to their operational strategies.
The workforce systematically bought pretend social safety numbers, Upwork and LinkedIn accounts, cellphone numbers, and pc leases to safe developer jobs at numerous tasks.
Google Drive exports and Chrome browser profiles revealed that the employees extensively used Google merchandise to prepare workforce schedules, duties, and budgets whereas speaking primarily in English.
Weekly stories from 2025 revealed that workforce members had been fighting job necessities, with one noting, “I can’t perceive job requirement, and don’t know what I must do,” alongside the directive to “put sufficient efforts in coronary heart.”
Operational strategies and expertise stack
The DPRK employees adopted a constant sample of buying Upwork and LinkedIn accounts, shopping for or renting computer systems, then utilizing AnyDesk distant entry software program to conduct work for his or her employers.
Expense spreadsheets documented purchases of synthetic intelligence subscriptions, VPNs, proxies, and different instruments wanted to take care of their pretend identities.
Assembly schedules and scripts had been maintained for every pretend identification, together with detailed personas like “Henry Zhang” with full backstories and work histories.
The employees used a pockets tackle to ship and obtain funds, to which ZachXBT linked a number of fraudulent operations.
The pockets tackle tied the workforce to the $680,000 Favrr exploit from June 2025, the place the corporate’s CTO and different builders had been revealed as DPRK IT employees utilizing fraudulent paperwork.
ZachXBT recognized the Favrr CTO “Alex Hong” as having a suspicious background with lately deleted LinkedIn profiles and unverifiable work historical past.
Unsophisticated however persistent
Browser historical past from the compromised units confirmed frequent Google Translate utilization with Korean translations whereas working from Russian IP addresses.
The proof confirmed the employees’ North Korean origins regardless of their subtle English communications and Western personas.
ZachXBT famous the primary problem in combating DPRK IT employees stems from a lack of collaboration between companies and the non-public sector, mixed with negligence by hiring groups who turn into defensive when alerted about potential infiltration.
The employees convert earnings from improvement work into cryptocurrency by means of Payoneer, with the investigator noting they’re “by no means subtle however are persistent since there are such a lot of flooding the job market globally for roles.”
The publicity reveals the dimensions of North Korean infiltration into Western expertise firms, with the compromised operation representing only one workforce amongst doubtlessly a whole lot working comparable schemes throughout distant improvement platforms.