0.0
July 15, 2024, Clearwater, Florida, 9,055 p
5.66
.m.
6.04
Eastern Time.
7.62
A security alert fires inside the monitoring systems
11.039
of NoB4,
12.4
a cybersecurity training company with over 50 million
15.88
users across 54,000 organizations.
19.859
The alert flags anomalous activity on a newly
22.98
provisioned workstation.
24.14
The workstation was delivered earlier that day to
27.78
a newly hired principal software engineer.
30.3
He had passed four video interviews.
32.679
His references had checked out.
34.5
His background investigation had come back clean.
37.579
The engineer is 25 minutes into his first
40.939
shift.
42.92
He is installing malware on the workstation, delivered
46.5
via a Raspberry Pi connected to the same
48.96
network.
50.0
His photograph is a stock image modified by
53.5
artificial intelligence.
54.14
His name belongs to a real American he
58.06
has never met.
59.28
His actual physical location is either within North
62.74
Korea or across the border in northeastern China.
66.56
This is not an isolated incident.
69.04
NoB4 is a company that teaches other organizations
71.7
how to detect exactly this kind of threat.
75.039
They were not the first target.
76.54
They were not the hundredth.
78.399
This is a case file about a labor
80.14
market with an adversary embedded inside it.
82.739
The Democratic...
84.14
The Democratic People's Republic of Korea has, since
86.68
approximately 2011,
88.7
pursued information technology as a strategic national priority.
93.48
The directive originates with Kim Jong-un's assent.
96.459
Under sanctions that isolate the regime from global
99.2
trade, conventional revenue streams have narrowed.
102.299
Cyber operations, theft, espionage, fraud have expanded to
107.18
fill the gap.
108.299
The specific program in this case is operated
111.019
by a unit designated Department 53.
121.619
To Demonstrate this the Korean Department線
130.5
ccl
142.719
Expertsare
142.759
are
144.139
from 6,800 in 2022 to 8,400
148.759
in 2024.
151.08
The increase tracks the expansion of remote work
153.78
norms after the pandemic.
156.06
U.S.
156.78
government estimates place the collective annual earnings of
159.86
this
160.02
workforce at over $500 million.
162.96
Individual operators can generate up to $300,000
166.259
per year, sometimes by holding
168.68
multiple simultaneous positions at different American companies.
172.34
Most of the revenue was laundered through Chinese
175.46
accounts
175.96
and routed back to Pyongyang.
178.08
It funds the regime directly, including, according to
181.4
U.S.
181.74
Treasury designations, its weapons of mass destruction programs.
185.879
The Federal Bureau of Investigation classifies this scheme
189.659
as an
190.259
active national security threat.
192.46
It has been operating at scale since at
194.84
least 2018.
196.219
The mechanics proceed in six stages.
199.28
Stage 1.
201.3
Identity Fabrication.
202.34
The operator acquires the personal information of a
206.3
real American citizen,
207.74
usually through identity theft channels available on the
211.099
dark web.
211.919
Full legal name.
214.139
Social security number.
215.62
Date of birth.
217.259
Employment history.
218.759
In one federal case, a single operation compromised
222.039
the identities of more than 80
223.979
Americans.
225.459
The operator then constructs a professional identity on
228.84
top of the stolen one.
230.399
A LinkedIn profile with fabricated information.
232.319
A fabricated job history.
233.46
A GitHub account with code that is often
236.099
scraped or cloned.
237.34
A passable photograph, frequently a stock image, edited
240.68
through generative AI to make
242.58
reverse image searches fail.
245.039
Stage 2.
246.0
The Application.
247.62
The operator applies to remote-only positions, typically
251.479
software engineering,
252.96
front-end development, or full-stack roles.
255.879
Some applications are routed through staffing agencies.
259.1
Some go direct.
261.04
Stage 3.
262.319
The Interview.
263.43
Most American employers conduct video interviews for remote
266.62
positions.
267.5
The operator attends with camera on.
270.29
Pre-rehearsed responses.
272.06
In more sophisticated cases, face substitution technology is
276.56
used to map a synthetic or live
278.54
image onto the operator's face in real time.
281.949
According to the cybersecurity firm SentinelOne, approximately 1
286.22
,000 job applications received by
288.68
the company in recent years have been linked
291.04
to suspected normalization.
292.319
The company has been in the business since
293.439
the beginning of its existence.
293.439
According to Mandiant, a company that has been
295.819
a major source of information for the
295.819
According to Mandiant, now a unit of Google
296.86
Cloud, nearly every Fortune 500 chief information
300.3
security officer interviewed on the topic has acknowledged
303.639
that their company has,
305.3
knowingly or unknowingly, hired at least one.
308.959
Stage 4.
310.3
The Shipment.
311.6
Upon hire, the company issues a laptop, typically
314.879
a MacBook.
315.779
The operator provides a US shipping address.
318.36
The address is never the claimed residence.
321.139
The company's clients are often the same.
322.3
They're either a facilitator's home or commercial location.
325.86
This is the laptop farm.
327.66
The laptop farm is the operation's physical anchor.
331.38
A typical facility is a residence or small
334.24
commercial space, somewhere in the United
336.339
States, operated by a facilitator, often a US
340.199
citizen, sometimes compensated, sometimes
342.98
only partially aware of the full structure.
345.8
Inside, dozens of employer-issued laptops are connected
349.6
to a single local network.
351.339
Each laptop has a separate network.
352.279
Each laptop is configured for persistent remote access.
355.139
The operator, physically in North Korea or across
358.959
the Chinese border, connects via VPN
361.579
or commercial remote desktop software into the laptop
365.279
at the farm.
366.3
From the employer's perspective, the employee's session originates
370.5
from a residential US IP
372.06
address during US business hours on a company
375.399
-issued device.
376.579
All telemetry is clean.
379.98
Stage 5.
380.819
The Facilitator.
381.259
The facilitator's role is to provide a service.
382.279
It is structural.
383.3
Receive shipments.
384.8
Power the devices.
386.439
Handle occasional on-site IT tasks.
389.319
Process paychecks through shell companies into accounts controlled
392.92
by co-conspirators
394.22
abroad.
395.12
In April 2026, a federal court in Massachusetts
399.199
sentenced two New Jersey residents, Kajiya
402.66
Wong and Zhenxing Wong, no relation, to nine
406.379
years and seven and a half years in
408.459
prison,
408.86
respectively.
409.68
The two were sentenced to four years in
411.079
prison.
411.079
The court's court is set to sentence Kajiya
412.06
Wong and Zhenxing Wong to nine years and
412.259
seven
413.479
years in prison while Kajiya Wong is sentenced
416.18
to 10 years and eight and a half
419.0
years in
419.24
prison.
420.519
Kajiya Wong and Zhenxing Wong lived together in
422.24
southern LA's transformation latitude.
422.24
Kajiya Wong tuning out, living alone, making fuerte
422.42
knowing that he was a criminal, keeps
423.72
C communicates with her peers at UO.
424.42
A avete dezenes.
425.319
When it comes to dubbing, nothing matters and
426.899
they are10 years younger than玉heere.
432.139
The most interesting part of all debuting is
434.12
that the captain, Stant, worked for the Tetra.
437.959
He was spent doing his hair and today
440.399
think of Maisel and write games in his
440.48
hair with
440.839
personal values.
441.74
Her operation touched more than 300 American companies
445.279
and funneled over $17 million to North Korea.
449.16
She pleaded guilty and received a sentence of
451.779
102 months.
453.779
Chapman's operation compromised the personal identities of at
457.579
least 60 Americans.
459.68
Her house was, for three years, connected by
462.439
fiber optic to a nuclear weapons program on
465.16
the other side of the world.
466.819
Return to Clearwater.
468.54
Return to the 25-minute window.
471.74
No B-4's security operations center, alerted by
474.839
automated detection, reached out to the new employee
477.779
to inquire about the anomalous activity.
480.839
The employee responded that he was following a
483.5
router troubleshooting guide, that it may have caused
486.3
a false alarm.
487.699
No B-4's security team requested a live
490.48
call.
491.24
The employee said he was unavailable.
493.399
Shortly after, he became unresponsive.
496.72
At 10,020 p.m.
498.459
Eastern Time, his workstation was contained.
501.74
No B-4 made the incident public in
503.98
a detailed blog post authored by its chief
506.199
executive, Stu Schauerman.
508.139
The post described the specific technical action taken
511.18
by the operator.
512.32
He used a Raspberry Pi to download the
514.84
malware.
516.68
The malware was an info-stealer.
519.159
Its target was credential data left in browser
521.799
sessions, residual authentication tokens from the laptop's prior
525.679
provisioning.
526.5
The operator's intent was to harvest what remained
529.179
on the machine before it had been fully
531.419
secured.
531.74
No customer data was exposed.
535.399
The operator was terminated before gaining broader access.
539.019
But the operator had cleared every pre-employment
541.98
control, background check phenotype, identity verification, four video
546.82
interviews with four different members of the team.
549.82
All of them had spoken with someone who
552.58
did not exist.
553.899
The United States Department of Justice has, as
557.08
of this recording, unsealed at least four major
560.0
indictments related to the scheme.
561.72
More than 29 laptop farms have been searched
564.879
across 16 states.
566.5
The FBI has issued public advisories in May
569.74
2022, October 2023, May 2024.
574.379
The enforcement pressure has not caused the operation
577.36
to contract.
579.08
A researcher at No B-4 compared the
582.139
economics to the drug trade.
584.0
For every facilitator arrested, two are already available
587.82
to replace them.
589.139
The supply of U.S.-based co-conspirators is
591.7
increasing.
591.72
Whether financially motivated or partially deceived exceeds prosecutorial
597.139
throughput.
597.879
The structural reason is labor market asymmetry.
602.919
Remote hiring is a global, asynchronous process.
606.98
Identity verification at most American companies remains a
611.039
domestic, synchronous one.
612.759
A stolen Social Security number will pass an
615.759
automated credit check.
617.08
A purchased LinkedIn endorsement looks identical to an
620.58
organic one.
621.259
A laptop shipped to a U.S.
623.44
zip code presents as a laptop in the
625.639
United States.
626.779
The operators do not defeat these systems.
630.019
They pass through them exactly as designed.
633.1
Many of them also do the job.
635.32
A significant portion of North Korean operators deliver
639.019
legitimate software engineering work.
641.659
Their American employers receive functional code, met deadlines,
645.94
and acceptable performance reviews.
648.24
The exfiltration of salary is the entire process.
651.24
The exfiltration of data when it happens is
655.159
a secondary harvest.
657.039
The question that cannot be answered from public
659.799
information is how many operators remain employed inside
663.34
American companies at this moment.
666.24
Mandiant's assessment that nearly every Fortune 500 chief
669.899
information security officer has admitted to at least
672.759
one known case establishes a floor, not a
675.899
ceiling.
676.419
The admitted cases are those that were detected.
679.0
The undetected cases remain, by definition, in payroll
682.679
systems.
684.94
No encryption defeats this attack.
687.539
No network segmentation closes it.
689.96
No firewall recognizes an employee who was legitimately
693.539
hired.
694.46
The defense of surface is human resources.
697.779
The case file remains open.
700.08
As of April 2026, two of the most
703.7
recently indicted facilitators are serving federal sentences in
707.299
Massachusetts.
707.659
Nine additional individuals connected to the same operation
711.7
remain at large.
712.94
The U.S.
713.86
State Department is offering a $5 million reward
716.46
for information leading to the arrest of those
718.94
still outside custody.
720.82
Department 53 in Pyongyang continues to operate.
726.6
Fragment Zero will track the case file.
728.899
The next time an American company posts a
731.84
remote software engineering role, approximately one in a
736.46
thousand applications will be reported.
737.639
The defense of question is not whether an
743.72
organization will encounter this operation.
747.74
It is whether the organization will notice.