US Issues Guidance to Companies Warning of Cybersecurity and Sanctions Risks Posed by IT Workers Directed by North Korea
Time 11 Minute Read
Categories: Regulatory

What Happened

On May 16, 2022, the US Department of State, US Department of Treasury, and the Federal Bureau of Investigation issued combined guidance (“IT Workers Advisory”) on efforts by North Korean nationals to secure freelance engagements as remote information technology (“IT”) workers by posing as non-North Korea nationals. The IT Workers Advisory provides employers with detailed information on how North Korean IT workers operate, highlights red flag indicators for companies hiring freelance developers and for freelance and payment platforms to identify these workers, and provides general mitigation measures for companies to better protect against inadvertently engaging these workers or facilitating the operations of the North Korean government in violation of US sanctions.

Bottom Line:

The North Korean government (“DPRK”) dispatches thousands of highly skilled North Korean IT workers around the world to generate revenue necessary to fund its weapons programs in violation of US sanctions. This creates cybersecurity and sanctions risk exposure for companies engaging or contracting with remote IT personnel. Companies can mitigate these risks by incorporating diligence for red flag indicators of North Korean nationals into cybersecurity and sanctions compliance programs.

The Full Story:

The IT Workers Advisory follows a 2021 UN panel report studying the scope of North Korea’s use of IT workers to earn foreign currency and its methods for evading employer due diligence efforts and know-your-customer/anti-money laundering protocols. The UN panel concluded that DPRK IT workers use several methods to obtain freelance IT work without revealing their identity, including by setting up accounts on freelance developer platforms with unwitting clients around the world, especially in China, Russia, Ukraine, Serbia, Canada, and the United States.

The IT Workers Advisory warns companies that DPRK IT workers specifically target freelance contract opportunities from employers located in wealthier nations, including those in North America, Europe, and East Asia. In many cases, DPRK IT workers present themselves as South Korean, Chinese, Japanese, or Eastern European, and US-based teleworkers. In some cases, DPRK IT workers further obfuscate their identities by creating arrangements with third-party sub-contractors. These sub-contractors are non-North Korean, freelance IT workers who complete contracts for the DPRK IT workers. DPRK IT managers have also hired their own teams of non-North Korean IT workers who are often unaware of the real identity of their North Korean employer or the fact that their employer is a DPRK company. The DPRK IT managers use their outsourced employees to make software purchases and interact with customers in situations that might otherwise expose a DPRK IT worker.

Risks to Companies

DPRK IT workers present a number of risks to companies that engage or contract with remote IT personnel, particularly those directly or indirectly engaging IT workers through freelance platforms:

Cybersecurity Risks

IT Workers Advisory warns that, although DPRK IT workers normally engage in non-malicious IT work, such as the development of a virtual currency exchange or a website, DPRK IT workers have used the privileged access gained as contractors to enable DPRK’s malicious cyber activity. Some overseas-based DPRK IT workers have also provided logistical support to DPRK-based malicious cyber actors, although the IT workers are unlikely to be involved in malicious cyber activities themselves. DPRK IT workers may share access to virtual infrastructure, facilitate sales of data stolen by DPRK cyber actors, or assist with the DPRK’s money-laundering and virtual currency transfers. DPRK IT workers have also assisted DPRK officials in procuring WMD and ballistic missile-related items for the DPRK’s prohibited weapons programs.

Sanctions Risks

The Department of the Treasury’s Office of Foreign Assets Control (“OFAC”) administers the US sanctions against North Korea. Under this sanctions program, US persons are prohibited from engaging in significant activities on behalf of DPRK, including activities that undermine cybersecurity or other malicious cyber-enabled activities, import from or export to North Korea any goods, services, or technology; sell, supply, transfer, or purchase (directly or indirectly), to or from North Korea or any person acting for or on behalf of DPRK, any software, or materially assist, sponsor or provide financial, material, or technological support for, or goods or services to or in support of, DPRK.

OFAC-administered sanctions are enforced on a strict liability basis. However, penalties for sanctions violations may be reduced for companies that conduct reasonable diligence as part of a sanctions compliance program. OFAC has issued guidance on what it terms a “risk-based approach” to sanctions compliance that advises companies to consider known risks in their business operations when designing and implementing a sanctions compliance program. Following the IT Workers Advisory, companies should consider the engagement of remote IT services, particularly through freelance platforms, as a potential point of sanctions exposure and update compliance programs accordingly consistent with OFAC’s guidance.

Mitigation Strategies

DPRK IT Worker Obfuscation Techniques

The IT Workers Advisory warns of a number of specific techniques used by DPRK IT workers. Specifically, that DPRK IT workers deliberately obfuscate their identities, locations, and nationality online, often using non-Korean names as aliases, making it difficult for employers to identify them. They will also use virtual private networks (“VPNs”), virtual private servers (“VPSs”), or utilize third-country IP addresses to appear as though they are connecting to the internet from inconspicuous locations and reduce the likelihood of scrutiny of their DPRK location or relationships. DPRK IT workers can rely on the anonymity of telework arrangements, use proxies for account creation and maintenance, and favor the use of intermediaries and communications through text-based chat instead of video calls.

The IT Workers Advisory also warns that DPRK IT workers use proxy accounts to bid on, win, work on, and get paid for projects on freelance software developer websites. These proxy accounts may belong to third-party individuals, some of whom sell their identification and account information to the DPRK IT workers. In some cases, DPRK IT workers pay fees to these individuals for use of their legitimate platform accounts. DPRK IT workers may populate freelance platform profiles with the real affiliations, references, and work experience of the proxy.

At times, DPRK IT workers engage other non-North Korean freelance workers on platforms to propose collaboration on development projects. DPRK IT workers can take advantage of these business relationships to gain access to new contracts and virtual currency accounts used to conduct IT work over US or European virtual infrastructure. Hiding their real locations allows DPRK IT workers to violate terms of service agreements for the online platforms and services they use to provide freelance IT work. As part of their tradecraft, DPRK IT workers may also use single, dedicated devices for each of their accounts, especially for banking services, to evade detection by fraud prevention, sanctions compliance, and anti-money laundering measures.

DPRK IT workers routinely use counterfeit, altered, or falsified documents, including identification documents, and forged signatures—either that they have made themselves using software such as Photoshop, or that they have paid a document forgery company to alter, combining the IT worker’s own or a provided photo with the identifying information of a real person.

Red Flags

The IT Workers Advisory sets forth a number of “red flags” that may be indications that DPRK IT workers are using freelance work or payment platforms, including:

  • multiple logins into one account from various IP addresses in a relatively short period of time, especially if the IP addresses are associated with different countries, logins into multiple accounts on the same platform from one IP address, or logins into one account continuously for one or more days at a time;
  • router port or other technical configurations associated with use of remote desktop sharing software, such as port 3389 in the router used to access the account, particularly if usage of remote desktop sharing software is not standard company practice;
  • frequent use of document templates for things such as bidding documents and project communication methods, especially the same templates being used across different developer accounts;
  • frequent transfers of money through payment platforms, especially to bank accounts in China, and sometimes routed through one or more companies to disguise the ultimate destination of the funds;
  • use of digital payment services, especially China-linked services;
  • seeking payment in virtual currency in an effort to avoid the formal financial system;
  • inconsistencies in name spelling, nationality, claimed work location, contact information, educational history, work history, and other details across a developer’s freelance platform profiles, social media profiles, external portfolio websites, payment platform profiles, and assessed location and hours;
  • surprisingly simple portfolio websites, social media profiles, or developer profiles;
  • direct messaging or cold-calls from individuals purporting to be C-suite level executives of software development companies to solicit services or advertise proficiencies;
  • receipt of items at an address not listed on the developer’s identification documentation (be particularly suspicious if a developer claims they cannot receive items at the address on their identification documentation);
  • requesting payment for contracts without meeting production benchmarks or check-in meetings;
  • inability to conduct business during required business hours;
  • incorrect or changing contact information, specifically phone numbers and emails, or biographical information which does not appear to match;
  • failure to complete tasks in a timely manner or to respond to tasks or inability to reach them in a timely manner, especially through “instant” communication methods.

Mitigation

The IT Worker Advisory provides the following risk mitigation strategies for employers:

  • conduct video interviews to verify a potential freelance worker’s identity;
  • conduct a pre-employment background check, drug test, and fingerprint/biometric log-in to verify identity and claimed location;
  • avoid payments in virtual currency and require verification of banking information corresponding to other identifying documents;
  • use extra caution when interacting with freelance developers through remote collaboration applications, such as remote desktop applications;
  • consider disabling remote collaboration applications on any computer supplied to a freelance developer;
  • verify employment and higher education history directly with the listed companies and educational institutions, using contact information identified through a search engine or other business database, not directly obtained from the potential freelance worker or from their profile;
  • check that the name spelling, nationality, claimed location, contact information, educational history, work history, and other details of a potential hire are consistent across the developer’s freelance platform profiles, social media profiles, external portfolio websites, payment platform accounts, and assessed location and hours of work (be extra cautious of simple portfolio websites, social media profiles, or developer profiles);
  • be cautious of a developer requesting to communicate on a separate platform outside the original freelance platform website where a company initially found the IT worker;
  • if sending to a developer documents or work-related equipment such as a laptop, only send to the address listed on the developer’s identification documents and obtain additional documentation if the developer requests that the laptop or other items be sent to an unfamiliar address (be suspicious if a developer cannot receive items at the address on their identification documentation); and
  • be vigilant for unauthorized, small-scale transactions that may be fraudulently conducted by contracted IT workers (in one case cited by the IT Workers Advisory, DPRK IT workers engaged as developers by a US company fraudulently charged the US company’s payment account and stole over $50,000 in 30 small installments over a matter of months. The US company was not aware the developers were North Korean or of the ongoing theft activity due to the slight amounts).

US companies engaging or contracting with remote IT workers, particularly through freelance IT worker platforms, should consider the cybersecurity and sanctions exposure presented by DRPK IT worker activity carefully and take steps to mitigate risks through a sanctions compliance program. Non-US individuals and companies should also be aware of this issue, and OFAC’s authority to sanction non-US persons engaged in certain prohibited activities or take enforcement action against non-US persons who cause or conspire to cause a US person to violate US sanctions. Violations of US sanctions may result in significant civil or criminal penalties as well as reputational harm.

Hunton Andrews Kurth LLP will continue to monitor closely the development of this and other cybersecurity, US sanctions, and worker engagement matters. Please contact us if you have any questions or would like further information regarding these new developments.

The Hunton Andrews Kurth Blockchain Blog features opinions and legal analysis as we follow the development and use of distributed ledger technology known as the blockchain.

Search

Subscribe Arrow

Recent Posts

Categories

Tags

Authors

Archives

Jump to Page