What Happened:
On May 16, 2022, the US Department of State, US Department of Treasury, and the Federal Bureau of Investigation issued combined guidance (“IT Workers Advisory”) on efforts by North Korean nationals to secure freelance engagements as remote information technology (“IT”) workers by posing as non-North Korea nationals. The IT Workers Advisory provides employers with detailed information on how North Korean IT workers operate, highlights red flag indicators for companies hiring freelance developers and for freelance and payment platforms to identify these workers, and provides general mitigation measures for companies to better protect against inadvertently engaging these workers or facilitating the operations of the North Korean government in violation of US sanctions.
Bottom Line:
The North Korean government (“DPRK”) dispatches thousands of highly skilled North Korean IT workers around the world to generate revenue necessary to fund its weapons programs in violation of US sanctions. This creates cybersecurity and sanctions risk exposure for companies engaging or contracting with remote IT personnel. Companies can mitigate these risks by incorporating diligence for red flag indicators of North Korean nationals into cybersecurity and sanctions compliance programs.
The Full Story:
The IT Workers Advisory follows a 2021 UN panel report studying the scope of North Korea’s use of IT workers to earn foreign currency and its methods for evading employer due diligence efforts and know-your-customer/anti-money laundering protocols. The UN panel concluded that DPRK IT workers use several methods to obtain freelance IT work without revealing their identity, including by setting up accounts on freelance developer platforms with unwitting clients around the world, especially in China, Russia, Ukraine, Serbia, Canada, and the United States.
The IT Workers Advisory warns companies that DPRK IT workers specifically target freelance contract opportunities from employers located in wealthier nations, including those in North America, Europe, and East Asia. In many cases, DPRK IT workers present themselves as South Korean, Chinese, Japanese, or Eastern European, and US-based teleworkers. In some cases, DPRK IT workers further obfuscate their identities by creating arrangements with third-party sub-contractors. These sub-contractors are non-North Korean, freelance IT workers who complete contracts for the DPRK IT workers. DPRK IT managers have also hired their own teams of non-North Korean IT workers who are often unaware of the real identity of their North Korean employer or the fact that their employer is a DPRK company. The DPRK IT managers use their outsourced employees to make software purchases and interact with customers in situations that might otherwise expose a DPRK IT worker.
Risks to Companies
DPRK IT workers present a number of risks to companies that engage or contract with remote IT personnel, particularly those directly or indirectly engaging IT workers through freelance platforms:
Cybersecurity Risks
IT Workers Advisory warns that, although DPRK IT workers normally engage in non-malicious IT work, such as the development of a virtual currency exchange or a website, DPRK IT workers have used the privileged access gained as contractors to enable DPRK’s malicious cyber activity. Some overseas-based DPRK IT workers have also provided logistical support to DPRK-based malicious cyber actors, although the IT workers are unlikely to be involved in malicious cyber activities themselves. DPRK IT workers may share access to virtual infrastructure, facilitate sales of data stolen by DPRK cyber actors, or assist with the DPRK’s money-laundering and virtual currency transfers. DPRK IT workers have also assisted DPRK officials in procuring WMD and ballistic missile-related items for the DPRK’s prohibited weapons programs.
Sanctions Risks
The Department of the Treasury’s Office of Foreign Assets Control (“OFAC”) administers the US sanctions against North Korea. Under this sanctions program, US persons are prohibited from engaging in significant activities on behalf of DPRK, including activities that undermine cybersecurity or other malicious cyber-enabled activities, import from or export to North Korea any goods, services, or technology; sell, supply, transfer, or purchase (directly or indirectly), to or from North Korea or any person acting for or on behalf of DPRK, any software, or materially assist, sponsor or provide financial, material, or technological support for, or goods or services to or in support of, DPRK.
OFAC-administered sanctions are enforced on a strict liability basis. However, penalties for sanctions violations may be reduced for companies that conduct reasonable diligence as part of a sanctions compliance program. OFAC has issued guidance on what it terms a “risk-based approach” to sanctions compliance that advises companies to consider known risks in their business operations when designing and implementing a sanctions compliance program. Following the IT Workers Advisory, companies should consider the engagement of remote IT services, particularly through freelance platforms, as a potential point of sanctions exposure and update compliance programs accordingly consistent with OFAC’s guidance.
Mitigation Strategies
DPRK IT Worker Obfuscation Techniques
The IT Workers Advisory warns of a number of specific techniques used by DPRK IT workers. Specifically, that DPRK IT workers deliberately obfuscate their identities, locations, and nationality online, often using non-Korean names as aliases, making it difficult for employers to identify them. They will also use virtual private networks (“VPNs”), virtual private servers (“VPSs”), or utilize third-country IP addresses to appear as though they are connecting to the internet from inconspicuous locations and reduce the likelihood of scrutiny of their DPRK location or relationships. DPRK IT workers can rely on the anonymity of telework arrangements, use proxies for account creation and maintenance, and favor the use of intermediaries and communications through text-based chat instead of video calls.
The IT Workers Advisory also warns that DPRK IT workers use proxy accounts to bid on, win, work on, and get paid for projects on freelance software developer websites. These proxy accounts may belong to third-party individuals, some of whom sell their identification and account information to the DPRK IT workers. In some cases, DPRK IT workers pay fees to these individuals for use of their legitimate platform accounts. DPRK IT workers may populate freelance platform profiles with the real affiliations, references, and work experience of the proxy.
At times, DPRK IT workers engage other non-North Korean freelance workers on platforms to propose collaboration on development projects. DPRK IT workers can take advantage of these business relationships to gain access to new contracts and virtual currency accounts used to conduct IT work over US or European virtual infrastructure. Hiding their real locations allows DPRK IT workers to violate terms of service agreements for the online platforms and services they use to provide freelance IT work. As part of their tradecraft, DPRK IT workers may also use single, dedicated devices for each of their accounts, especially for banking services, to evade detection by fraud prevention, sanctions compliance, and anti-money laundering measures.
DPRK IT workers routinely use counterfeit, altered, or falsified documents, including identification documents, and forged signatures—either that they have made themselves using software such as Photoshop, or that they have paid a document forgery company to alter, combining the IT worker’s own or a provided photo with the identifying information of a real person.
Red Flags
The IT Workers Advisory sets forth a number of “red flags” that may be indications that DPRK IT workers are using freelance work or payment platforms, including:
- multiple logins into one account from various IP addresses in a relatively short period of time, especially if the IP addresses are associated with different countries, logins into multiple accounts on the same platform from one IP address, or logins into one account continuously for one or more days at a time;
- router port or other technical configurations associated with use of remote desktop sharing software, such as port 3389 in the router used to access the account, particularly if usage of remote desktop sharing software is not standard company practice;
- frequent use of document templates for things such as bidding documents and project communication methods, especially the same templates being used across different developer accounts;
- frequent transfers of money through payment platforms, especially to bank accounts in China, and sometimes routed through one or more companies to disguise the ultimate destination of the funds;
- use of digital payment services, especially China-linked services;
- seeking payment in virtual currency in an effort to avoid the formal financial system;
- inconsistencies in name spelling, nationality, claimed work location, contact information, educational history, work history, and other details across a developer’s freelance platform profiles, social media profiles, external portfolio websites, payment platform profiles, and assessed location and hours;
- surprisingly simple portfolio websites, social media profiles, or developer profiles;
- direct messaging or cold-calls from individuals purporting to be C-suite level executives of software development companies to solicit services or advertise proficiencies;
- receipt of items at an address not listed on the developer’s identification documentation (be particularly suspicious if a developer claims they cannot receive items at the address on their identification documentation);
- requesting payment for contracts without meeting production benchmarks or check-in meetings;
- inability to conduct business during required business hours;
- incorrect or changing contact information, specifically phone numbers and emails, or biographical information which does not appear to match;
- failure to complete tasks in a timely manner or to respond to tasks or inability to reach them in a timely manner, especially through “instant” communication methods.
Mitigation
The IT Worker Advisory provides the following risk mitigation strategies for employers:
- conduct video interviews to verify a potential freelance worker’s identity;
- conduct a pre-employment background check, drug test, and fingerprint/biometric log-in to verify identity and claimed location;
- avoid payments in virtual currency and require verification of banking information corresponding to other identifying documents;
- use extra caution when interacting with freelance developers through remote collaboration applications, such as remote desktop applications;
- consider disabling remote collaboration applications on any computer supplied to a freelance developer;
- verify employment and higher education history directly with the listed companies and educational institutions, using contact information identified through a search engine or other business database, not directly obtained from the potential freelance worker or from their profile;
- check that the name spelling, nationality, claimed location, contact information, educational history, work history, and other details of a potential hire are consistent across the developer’s freelance platform profiles, social media profiles, external portfolio websites, payment platform accounts, and assessed location and hours of work (be extra cautious of simple portfolio websites, social media profiles, or developer profiles);
- be cautious of a developer requesting to communicate on a separate platform outside the original freelance platform website where a company initially found the IT worker;
- if sending to a developer documents or work-related equipment such as a laptop, only send to the address listed on the developer’s identification documents and obtain additional documentation if the developer requests that the laptop or other items be sent to an unfamiliar address (be suspicious if a developer cannot receive items at the address on their identification documentation); and
- be vigilant for unauthorized, small-scale transactions that may be fraudulently conducted by contracted IT workers (in one case cited by the IT Workers Advisory, DPRK IT workers engaged as developers by a US company fraudulently charged the US company’s payment account and stole over $50,000 in 30 small installments over a matter of months. The US company was not aware the developers were North Korean or of the ongoing theft activity due to the slight amounts).
US companies engaging or contracting with remote IT workers, particularly through freelance IT worker platforms, should consider the cybersecurity and sanctions exposure presented by DRPK IT worker activity carefully and take steps to mitigate risks through a sanctions compliance program. Non-US individuals and companies should also be aware of this issue, and OFAC’s authority to sanction non-US persons engaged in certain prohibited activities or take enforcement action against non-US persons who cause or conspire to cause a US person to violate US sanctions. Violations of US sanctions may result in significant civil or criminal penalties as well as reputational harm.
Hunton Andrews Kurth LLP will continue to monitor closely the development of this and other cybersecurity, US sanctions, and worker engagement matters. Please contact us if you have any questions or would like further information regarding these new developments.
The Hunton Andrews Kurth Blockchain Blog features opinions and legal analysis as we follow the development and use of distributed ledger technology known as the blockchain.
Search
Recent Posts
Categories
Tags
- 2019 Leaders’ Declaration
- 2020 National Strategy for Combating Terrorist and Other Illicit Financing (the 2020 Strategy)
- Advancing Innovation to Assist Law Enforcement Act
- Airdrops
- AML compliance program
- AML/CFT
- anonymity-enhanced cryptocurrencies
- Anti-Money Laundering
- Anti-Money Laundering Act of 2020 (AMLA)
- Anti-Money Laundering Compliance
- Antifraud
- Aon and Marsh
- Arizona
- Arkansas
- Artificial Intelligence
- Artificial Intelligence (AI)
- Australia
- Australian Competition and Consumer Commission (ACCC)
- Australian Securities and Investments Commission (ASIC)
- Automated Clearing House (ACH)
- Bank of England
- Bank Secrecy Act
- Bank Secrecy Act (BSA)
- Bank Term Fund Program
- Bermuda
- Biden Administration
- BIS
- Bitcoin
- Bitcoin Cash
- Bitfinex
- BitLicense
- Blockchain
- Blockchain Incubators
- Blockchain Legislation
- Blockchain Regulatory Certainty Act
- Blockchain Technology Act
- Brazil
- Breach of Contract
- Broker-Dealer
- Broker-Dealers
- BSA
- BSA Enforcement
- BTFP
- Bureau of Economic Analysis
- California
- Canada
- Captive Insurance
- CCPA
- Celebrity Endorsers
- Central Bank
- Central Bank Digital Currency (CBDC)
- Centre for Information Policy Leadership (CIPL)
- CFTC
- Chapter 15
- China
- Christopher Giancarlo
- Civil Enforcement
- Class Actions
- Clearweb
- Colorado
- Commissioner
- Commodity Exchange Act
- Commodity Exchange Act (CEA)
- Commodity Futures Trading Commission
- Complaint Bulletin
- Compliance
- Compliance Note
- Congress
- Connecticut
- Consent
- Consumer Financial Protection Bureau (CFPB)
- Consumer Protection
- Convertible Virtual Currency
- Corporate Compliance
- Corporate Governance
- Corporate Transparency Act (CTA)
- Council of Institutional Investors
- Council of the European Union
- Countering the Financing of Terrorism (CFT)
- Cross-Border Data Transfer
- crypto arbitrage trading accounts
- Crypto Assets
- crypto bank
- crypto custody
- Crypto Hackers
- Crypto Mining
- Crypto-commodity
- Crypto-currency
- Cryptoassets
- Cryptocurrency
- Cryptopia Limited
- Cryptosweep
- CVCs
- cybercrime
- Cybersecurity
- Dalia Blass
- DAO Report
- Darknet
- darknet marketplaces
- Data Privacy
- Data Protection Authority
- Davos
- decentralized finance (DeFi)
- DeFi
- Del. Michael San Nicolas
- Delaware
- Department of Business and Industry
- Department of Justice
- Department of Treasury
- DFS
- Digital Asset
- Digital Asset Securities
- Digital Assets
- Digital Commodities Consumer Protection Act of 2022
- digital currency
- digital currency ATM operators
- digital currency exchangers
- digital currency flows
- Digital Financial Assets Law (the Act)
- Digital Token Act
- digital token sales
- Digital Tokens
- Distributed Ledger
- Documentary Stamp Tax (DST)
- Dodd-Frank
- DOJ
- Economic Sanctions
- EDPB
- Eleventh Circuit
- Endorsement Guides
- Enforcement Action
- ePrivacy
- Ether
- Ether Classic
- EU General Data Protection Regulation (GDPR)
- EU Regulation
- European Central Bank
- European Commission
- Exchange Act
- Exchange Traded Fund
- FDIC
- Federal Election Commission
- Federal Reserve
- Federal Reserve Board
- Federal Trade Commission
- FedNow
- fiat currency MSBs
- Fiat-Backed
- Fight Illicit Networks and Detect Trafficking Act
- Figure Lending LLC
- Final Guidance
- Financial Action Task Force (FATF)
- Financial Crimes Enforcement Network (FinCEN)
- Financial Privacy
- Financial Stability Board
- Financial Stability Oversight Council
- Financial Stability Report
- Financial Technology Protection Act
- FinCEN
- FINRA
- FinTech
- Florida
- Foreign Corrupt Practices Act (FCPA)
- Foreign Extortion Prevention Act (FEPA)
- Form BE-12
- fractional interests
- FTC
- Gemini Dollar
- Gemini Trust Company
- Global Consortium for Digital Currency Governance
- Group of Seven
- Group of Twenty (G20) Finance Ministers
- H.R. 5635
- Hard Fork
- Heath Tarbert
- Her Majesty’s Revenue & Customs (HMRC)
- HM Revenue & Customs (HMRC)
- home equity lines of credit (HELOCs)
- Homeland Security Assessment of Terrorists’ Use of Virtual Currencies Act
- House of Representatives
- House of Representatives’ Financial Services Committee
- Howey
- Howey test
- IEO
- iFinex Inc.
- Illinois
- India
- Information Sheet 225
- Initial Chain Offering
- initial exchange offerings (IEOs)
- Insurance
- Intellectual Property
- International
- International Monetary Fund (IMF)
- Investor Protection
- IRS
- Jefferies Funding LLC
- Kenneth Blanco
- KYC/AML requirements
- Lael Brainard
- Large Platform Utility
- Legislation
- Legislature
- Liechtenstein Parliament
- liquidity
- Litecoin
- Litigation
- Louisiana
- Ltd.
- Malicious Cyber Activity
- Malicious Cyber Actor
- managed stablecoin
- Martin Act
- Maryland
- Metaverse
- model rule
- Monetary Policy
- Money Laundering
- Money Service Business
- money services businesses (MSBs)
- Mortgages
- Multi-Level Marketing Program (MLM)
- Mutual Fund
- Nakamoto
- narcotics
- NASAA
- Nebraska
- network maturity
- Nevada
- New Jersey
- New York
- New York Attorney General
- New York Department of Financial Services (DFS)
- New Zealand
- NFT (Non-Fungible Token)
- NFTs
- Non-fungible tokens
- North Dakota
- North Korea
- NY Department of Financial Services
- OFAC
- Office of Investor Education and Advocacy
- Office of the Comptroller of the Currency (OCC)
- Ohio
- Oklahoma
- Patent
- Paxos Standard
- Paxos Trust Company
- peer-to-peer exchangers
- Penalty
- Pennsylvania
- Personal Data
- Personal Information
- President’s Working Group (PWG)
- Privacy
- privacy coins
- Provenance.io
- Proxy Voting
- Public Blockchain
- rapid settlement
- real estate
- Regulation and Enforcement
- Rep. Sylvia Garcia
- Rescission
- Retail
- Ripple
- Ripple Labs
- Rule 233-1
- Russia
- Sanctions
- Sanctions Compliance Program (SHP)
- SAR lookback review
- SD8 coins
- SDN List
- SEC
- SEC crypto-securities
- SEC registration
- Securities
- Securities Act
- Securities Act of 1933
- Securities and Exchange Commission
- Securities and Exchange Commission (SEC)
- Securities Exchange Commission
- security tokens
- Self-disclosure
- Senate Committee on Banking Housing and Urban Affairs
- Shareholder
- Shareholders
- SIFI
- Signature Bank
- Silicon Valley Bank
- South Carolina
- South Dakota
- Spencer Dinwiddie
- stablecoins
- Stablecoins are Securities Act of 2019
- State-Sponsored Malicious Cyber Groups
- Suspicious Activity Report
- suspicious activity reporting (SARs)
- SVB
- SWIFT messaging system
- Swiss Financial Market Supervisory Authority (FINMA)
- Switzerland
- synthetic hegemonic currency
- Taxation
- Templum
- Tennessee
- Terrorist Financing
- Tether Limited
- Texas
- Texas Business Organizations Code (TBOC)
- Texas Senate Bill 1859
- Texas Senate Bill 1971
- The World Bank
- three-year safe harbor
- Token and TT Service Provider Act
- token developers
- token transfer limits
- tokenization
- tokenized assets
- Trademark
- Travel Rule
- Trump Administration
- TT Identifier
- TT System
- TVTG
- U.S. Virtual Currency Market and Regulatory Competitiveness Act of 2019
- UCC Article 12
- UK Tax Rules
- unhosted wallets
- Uniform Commercial Code
- United Kingdom (UK)
- United Specialty Insurance Company
- United States Bankruptcy Code
- United States Patent and Trademark Office
- US central bank digital currency (US CBDC)
- US Department of the Treasury
- US Department of the Treasury’s Office of Foreign Assets Control (OFAC)
- US dollar
- US Treasury
- USTR
- Utah
- Vermont
- Virginia
- Virtual Asset Service Providers
- Virtual currencies
- Virtual Currency
- Virtual Currency Consumer Protection Act of 2019
- Virtual Currency Exchange
- virtual currency license
- Virtual Currency Tax Fairness Act of 2020
- Virtual Markets Integrity Initiative
- Washington
- Weapons of Mass Destruction Proliferators Sanctions Regulations
- World Economic Forum
- Wyoming
- XRP
Authors
- Jimmy Bui
- Mayme Donohue
- Nicholas Drews
- Andrew Feiner
- Jason Feingertz
- Hannah Flint
- Kevin E. Gaunt
- Armin Ghiam
- Carleton Goss
- Gregory G. Hesse
- Scott H. Kimpel
- Marysia Laskowski
- Michael S. Levine
- Phyllis H. Marcus
- Lorelie S. Masters
- Patrick M. McDermott
- Uriel A. Mendieta
- Alex D. Pappas
- Daryl B. Robertson
- Natalia San Juan
- Caitlin A. Scipioni