{"id":3045,"date":"2026-03-07T15:12:34","date_gmt":"2026-03-07T07:12:34","guid":{"rendered":"https:\/\/moonsshieldhk.com\/?p=3045"},"modified":"2026-03-10T15:14:50","modified_gmt":"2026-03-10T07:14:50","slug":"north-korean-apts-use-ai-to-enhance-it-worker-scams","status":"publish","type":"post","link":"https:\/\/moonsshieldhk.com\/index.php\/en\/2026\/03\/07\/north-korean-apts-use-ai-to-enhance-it-worker-scams\/","title":{"rendered":"North Korean APTs Use AI to Enhance IT Worker Scams"},"content":{"rendered":"\n<p>While threat actors across the board struggle to meaningfully upgrade their cyberattacks with artificial intelligence (AI), North Korean threat actors are making more practical use of the same technology to perpetuate their classic IT worker scams.<\/p>\n\n\n\n<p>In a new report, Microsoft&#8217;s threat intelligence team described how two clusters of malicious actors tied to the Democratic People&#8217;s Republic of Korea (DPRK) \u2014 &#8220;Jasper Sleet&#8221; and &#8220;Coral Sleet&#8221; \u2014&nbsp;<a target=\"_blank\" href=\"https:\/\/www.cybersecuritydive.com\/news\/openai-microsoft-state-actors-ai\/707661\/\" rel=\"noreferrer noopener\">use AI<\/a>&nbsp;in a variety of ways to improve the scale and precision of their&nbsp;<a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2026\/03\/06\/ai-as-tradecraft-how-threat-actors-operationalize-ai\/\" rel=\"noreferrer noopener\">fraudulent campaigns<\/a>, enabling &#8220;sustained, large-scale misuse of legitimate access&#8221; to organizations that don&#8217;t know better. They&#8217;re using it to more effectively fabricate their identities, maintain those identities, and socially engineer their prospective employers in all kinds of small but meaningful ways.<\/p>\n\n\n\n<p>None of the tactics, techniques, and procedures (TTPs) described in the report are novel. Still, they&#8217;re useful for organizations to know about, as the same old shtick has continued to bring the bad guys success for years now, despite more widespread awareness and&nbsp;<a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/doj-multinational-dprk-it-worker-scam\">law enforcement counteraction<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"How AI Helps Fake IT Workers Apply for Jobs\">How AI Helps Fake IT Workers Apply for Jobs<\/h2>\n\n\n\n<p>There&#8217;s no stage of an IT worker scam that isn&#8217;t touched by \u2014 if not entirely enabled by \u2014 AI technology.<\/p>\n\n\n\n<p>Long before a company receives a fake r\u00e9sum\u00e9 and cover letter in its inbox, threat actors use AI tools to research the jobs they want to target on platforms like Upwork, and how to most effectively apply for them. They use them to extract useful terminology from job postings, and identify the requirements that might make a fake application look good, such as certifications, skills, or tools applicants are expected to possess.<\/p>\n\n\n\n<p>Working with a linguistic and cultural gap, the threat actors within a group like Jasper Sleet will then prompt&nbsp;<a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/dark-llms-petty-criminals\">large language model (LLM) chatbots<\/a>&nbsp;for fake names, email addresses, and social media handles that might appear convincing to their intended victims. It goes without saying that they also use chatbots to write their r\u00e9sum\u00e9s and cover letters.<\/p>\n\n\n\n<p>Finally, threat actors bring all of this information together to create convincing digital personas mimicking IT talent. These personas can be used repeatedly to apply for various jobs across different employers.<\/p>\n\n\n\n<p>Sometimes these personas are AI-generated, from the details of a r\u00e9sum\u00e9 through the polished headshot used at the top. In other cases, Jasper Sleet has used a commercial face swapping app called Faceswap to insert their own chosen faces into real individuals&#8217; stolen identity documents. And in interviews with prospective employers, it supplements fake visuals with voice-changing software.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"How AI Helps Fake IT Workers Do their Jobs\">How AI Helps Fake IT Workers Do their Jobs<\/h2>\n\n\n\n<p>Securing a gig is just phase one of the attack. AI remains essential when fake IT workers actually have to do their jobs.<\/p>\n\n\n\n<p>Part of it is about keeping up the ruse. Having initially presented as a certain kind of person, with certain qualifications and a certain character of speech, the threat actors then have to perform the actions and maintain the tone of voice their employer expects. That could mean successfully fulfilling tasks handed to them by their employer, or presenting consistently across email and chat platforms used for daily communication.<\/p>\n\n\n\n<p>In a lot of ways, though their intent is different, DPRK threat actors also use AI just like your average business user. They ask it to help them respond to emails, generate snippets of code, and carry out any number of&nbsp;<a target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchenterpriseai\/feature\/Battle-of-the-bots-Best-GenAI-chatbots-for-business\" rel=\"noreferrer noopener\">other little tasks<\/a>. And like those users, Microsoft has also observed threat actors experimenting with agentic AI.&nbsp;<\/p>\n\n\n\n<p>&#8220;Although not yet observed at scale and limited by reliability and operational risk, these efforts point to a potential shift toward more adaptive threat actor tradecraft that could complicate detection and response,&#8221; the researchers wrote.<\/p>\n\n\n\n<p>Though&nbsp;<a target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/news\/252518378\/Axie-Infinity-hack-highlights-DPRK-cryptocurrency-heists\" rel=\"noreferrer noopener\">revenue generation<\/a>&nbsp;for Kim Jong-Un&#8217;s regime is the first goal of any IT worker scam, exploiting insider access to Western organizations is always a nice bonus. Beyond doing their jobs, actors like Coral Sleet use AI \u2014 and sometimes jailbreak it \u2014 to quickly develop Web infrastructure, generate and refine malware, and, of course, assist with social engineering. Coral Sleet also uses agentic AI to string together a fully automated cyberattack workflow: to create fake company websites, remotely provision infrastructure, test and deploy malicious payloads, and more.<\/p>\n\n\n\n<p>Brian Hussey, senior vice president of Cyber Fusion at Cyderes, argues that attackers will have to continue upgrading their IT worker scams with AI because organizations are catching onto their longstanding tricks.<\/p>\n\n\n\n<p>&#8220;Increased awareness among hiring teams is clearly making a difference. Many organizations are now incorporating verification questions during remote interviews, such as asking applicants about local landmarks or activities in the city they claim to live in. Some even ask cultural or political questions that a covert North Korean operator would be hesitant to answer candidly. These approaches are not foolproof, but they demonstrate that organizations are becoming more vigilant,&#8221; he says.<\/p>\n\n\n\n<p>Anecdotally, he adds, &#8220;We have seen fewer investigations related to this activity over the past six months. That may not fully reflect the broader threat landscape, but it could suggest a temporary slowdown or a shift in tactics.&#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>While threat actors across the board struggle to meanin [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3046,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-3045","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category--en"],"_links":{"self":[{"href":"https:\/\/moonsshieldhk.com\/index.php\/wp-json\/wp\/v2\/posts\/3045","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/moonsshieldhk.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/moonsshieldhk.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/moonsshieldhk.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/moonsshieldhk.com\/index.php\/wp-json\/wp\/v2\/comments?post=3045"}],"version-history":[{"count":0,"href":"https:\/\/moonsshieldhk.com\/index.php\/wp-json\/wp\/v2\/posts\/3045\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/moonsshieldhk.com\/index.php\/wp-json\/wp\/v2\/media\/3046"}],"wp:attachment":[{"href":"https:\/\/moonsshieldhk.com\/index.php\/wp-json\/wp\/v2\/media?parent=3045"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/moonsshieldhk.com\/index.php\/wp-json\/wp\/v2\/categories?post=3045"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/moonsshieldhk.com\/index.php\/wp-json\/wp\/v2\/tags?post=3045"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}