Business

North Korean Hackers Are Using Freelancers As Proxies

North Korean hackers are finding new ways to infiltrate global platforms by logging in via unsuspecting freelancers’ accounts.
North Korean Hacker

Key Takeaways

  • North Korean hackers are exploiting freelancers as identity proxies to access remote jobs.

  • Victims unknowingly provide verified accounts and domestic IP addresses, making the hackers appear legitimate.

  • Some participants are complicit, running “laptop farms” for profit.

  • Recruits often come from vulnerable or low-income backgrounds.

  • Remote access requests are the clearest sign of a scam.

 

A New Front In Cyber Espionage

According to cybersecurity expert Heiner García of Telefónica, North Korean operatives are contacting freelancers and job seekers online before moving conversations to encrypted platforms such as Telegram or Discord.

There, they coach recruits on how to set up remote access tools like AnyDesk or Chrome Remote Desktop.

North Korean Hacker Recruitment

The Hackers’ Tried-And-Tested Recruitment Process

Source: Heiner García/SEAL

Freelancers As Identity Proxies

Once access is granted, operatives work behind these verified profiles, performing technical tasks, applying for projects, and collecting payments, all under someone else’s identity.

The freelancer typically receives only 20% of the earnings, while the rest is funneled back to North Korea through cryptocurrencies or traditional bank transfers.

Why This Strategy Works

This approach helps North Korean hackers sidestep the digital barriers that platforms use to detect high-risk IP addresses and VPN usage.

Since the connection appears to originate from a legitimate, verified user in a safe location, the operatives blend seamlessly into the global freelance workforce.

Inside The North Korean Recruitment Playbook

Earlier this year, García and Cointelegraph set up a dummy crypto startup to investigate the scheme.

They interacted with a supposed Japanese candidate who abruptly ended a call when asked to speak Japanese. Later, the same person asked García to buy a computer and provide remote access, a now-familiar tactic among North Korean IT operatives.

Further analysis revealed recycled onboarding presentations, recruitment scripts, and ID documents, all reused across multiple fake freelancer profiles.

García explained:

“They install AnyDesk or Chrome Remote Desktop and work from the victim’s machine so the platform sees a domestic IP. The freelancers often think it’s a subcontracting arrangement, they don’t realize they’re being exploited.”

Criminal Cases Highlight The Scale Of The Operation

Several high-profile arrests in the United States confirm how deep this problem runs.

  • In August 2024, Matthew Isaac Knoot of Nashville was arrested for operating a “laptop farm” that helped North Korean IT workers appear as U.S.-based freelancers.

  • In Arizona, Christina Marie Chapman received an eight-year prison sentence for a similar operation that processed more than $17 million on behalf of North Korean actors.

 

Chapman Laptop

Chapman’s Laptop Farm Duped More Than 300 US Companies

Source: Office of Public Affairs

 

These schemes tricked hundreds of U.S. companies, proving that even reputable platforms can be manipulated when hackers operate through legitimate accounts.

How North Korean Hackers Target The Vulnerable

North Korean cyber recruiters are not just looking for any freelancer, they’re seeking economically vulnerable individuals who may overlook red flags.

García’s research uncovered emails targeting users from Ukraine, Southeast Asia, and low-income regions, including attempts to recruit people with disabilities.

García said:

“They target low-income people. They target vulnerable people. They even approach individuals with disabilities, promising easy remote income.”

This manipulation aligns with North Korea’s long-standing goal of using cyber operations to fund its weapons and missile programs, according to the United Nations.

It’s Not Just About Crypto

While cryptocurrency theft remains a cornerstone of North Korean cybercrime, García’s findings show the strategy has expanded.

Operatives have used stolen or borrowed identities to take on projects in architecture, design, and customer support, even delivering legitimate work.

Some operatives now request direct bank payments, not just crypto transfers. This shift shows how deeply integrated their methods have become in both digital and traditional financial systems.

Why Detection Is Still So Difficult

Even as platforms like Upwork and Freelancer tighten verification standards, North Korean hackers continue to exploit human loopholes.

When an account is flagged or suspended, the operatives simply move on, sometimes asking the same freelancer to recruit family members and create new accounts.

The challenge is that every signal looks legitimate:

  • The identity belongs to a real person.

  • The internet connection is local.

  • The paperwork checks out.

By the time suspicious behavior surfaces, the hackers have already moved on to new accounts and fresh victims.

How Freelancers Can Protect Themselves

The biggest warning sign is any request to install remote-access software or share control of your device. No legitimate employer or client needs direct access to your computer or account.

Rule of thumb: If someone asks to “work from your account,” they are not hiring you, they are using you.

FAQ

Why are North Korean hackers targeting freelancers?

They use freelancers’ verified identities and computers to bypass geographic restrictions and earn money through remote jobs, laundering funds into North Korea.

How do they contact potential victims?

Most initial contact happens through legitimate freelance sites like Upwork, followed by chats on Telegram or Discord.

What kind of work do these hackers perform?

Everything from IT and crypto projects to architecture and customer support, anything that can generate foreign income.

How can I stay safe as a freelancer?

Never share your computer, install remote desktop software for clients, or let anyone use your verified accounts. Report suspicious requests immediately to the platform.

FreelancerHackerLazarus GroupNorth Korea

Join Our FREE Newsletter

Subscribe to stay informed and receive latest updates on the latest happenings in the crypto world!


By submitting this form, you are consenting to receive marketing emails from: Crypto Weekly, 36 Blue Jays Way, Toronto, ON, M5V 3T3, http://cryptoweekly.co. You can revoke your consent to receive emails at any time by using the SafeUnsubscribe® link, found at the bottom of every email. Emails are serviced by Constant Contact

Haider Jamal

Content Strategist

Haider is a fintech enthusiast and Content Strategist at CryptoWeekly with over four years in the Crypto & Blockchain industry. He began his writing journey with a blog after graduating from Monash University Malaysia. Passionate about storytelling and content creation, he blends creativity with insight. Haider is driven to grow professionally while always seeking the next big idea.

Read More >

Join Our FREE Newsletter

Subscribe to stay informed and receive latest updates on the latest happenings in the crypto world!


By submitting this form, you are consenting to receive marketing emails from: Crypto Weekly, 36 Blue Jays Way, Toronto, ON, M5V 3T3, http://cryptoweekly.co. You can revoke your consent to receive emails at any time by using the SafeUnsubscribe® link, found at the bottom of every email. Emails are serviced by Constant Contact

Search

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

News: