{"id":334751,"date":"2026-03-08T02:55:29","date_gmt":"2026-03-08T02:55:29","guid":{"rendered":"https:\/\/www.newsbeep.com\/ie\/334751\/"},"modified":"2026-03-08T02:55:29","modified_gmt":"2026-03-08T02:55:29","slug":"north-korea-is-using-ai-to-sneak-fake-it-workers-into-western-companies-microsoft-warns-united24-media","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/ie\/334751\/","title":{"rendered":"North Korea Is\u00a0Using AI\u00a0to\u00a0Sneak Fake IT\u00a0Workers Into Western Companies, Microsoft Warns \u2014 UNITED24 Media"},"content":{"rendered":"<p>North Korean operatives are increasingly using artificial intelligence tools to\u00a0fraudulently secure remote jobs in\u00a0Western technology companies. <\/p>\n<p>According to\u00a0Microsoft, individuals linked to\u00a0the North Korean government have been applying for remote IT\u00a0positions using fabricated identities and AI-assisted deception techniques. <\/p>\n<p>We bring you stories from the ground. Your support keeps our team in the field.<\/p>\n<p><a href=\"https:\/\/united24media.com\/donate?banner_variant=article_small\" target=\"_blank\" class=\"f-btn f-btn--sm f-btn--primary\" rel=\"nofollow noopener\">DONATE NOW<\/a><\/p>\n<p>After obtaining employment, the workers reportedly <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2026\/03\/06\/ai-as-tradecraft-how-threat-actors-operationalize-ai\/#post-compromise-misuse-of-ai\" rel=\"external noopener nofollow\" target=\"_blank\">transfer<\/a> their earnings to\u00a0the North Korean state while maintaining access to\u00a0corporate systems.<\/p>\n<p>The scheme typically involves applicants submitting resumes for remote software development or\u00a0IT\u00a0roles under stolen or\u00a0synthetic identities. In\u00a0many cases, intermediaries located in\u00a0the same country as\u00a0the employer assist with establishing a\u00a0local presence and facilitating the hiring process.<\/p>\n<p>Artificial intelligence tools are used during several stages of\u00a0the operation. Voice-modulation software is\u00a0reportedly used during interviews to\u00a0conceal accents and present applicants as\u00a0candidates from Western countries.<\/p>\n<p><img data-src=\"https:\/\/www.newsbeep.com\/ie\/wp-content\/uploads\/2026\/03\/1cf428a9dfc7fd8a0238a2d0f70cda21.jpg\" data- alt=\"North Korean Hackers Stole $2 Billion in\u00a0Crypto in\u00a02025\u2014And They\u2019re Not Done Yet\" width=\"1058\" height=\"596\" class=\"lazy\"\/><\/p>\n<p>Read more<\/p>\n<p>Category<a href=\"https:\/\/united24media.com\/latest-news\" class=\"c-entry__category\" rel=\"nofollow noopener\" target=\"_blank\">Latest news<\/a><a href=\"https:\/\/united24media.com\/latest-news\/north-korean-hackers-stole-2-billion-in-crypto-in-2025-and-theyre-not-done-yet-12311\" class=\"u-link-overlay\" rel=\"nofollow noopener\" target=\"_blank\">North Korean Hackers Stole $2 Billion in\u00a0Crypto in\u00a02025\u2014And They\u2019re Not Done Yet<\/a><\/p>\n<p>\n            Oct 08, 2025 14:05\n        <\/p>\n<p> Image-manipulation applications such as\u00a0FaceSwap allow operators to\u00a0insert faces into stolen identity documents and generate professional-looking profile photos for resumes.<\/p>\n<p>The same tools are also used to\u00a0build convincing digital identities at\u00a0scale. Actors generate lists of\u00a0culturally appropriate names and corresponding email addresses, then combine them with AI-assisted resumes and cover letters tailored to\u00a0specific technology roles. <\/p>\n<p>They also analyze job listings on\u00a0platforms such as\u00a0Upwork and other hiring websites to\u00a0extract required skills and adapt applications to\u00a0individual vacancies.<\/p>\n<p>Microsoft reported that once hired, the workers continue using artificial intelligence tools to\u00a0maintain the appearance of\u00a0legitimate employment. AI\u00a0systems assist with writing emails, translating internal communications, and generating code, allowing the operators to\u00a0perform routine work tasks and avoid raising suspicion inside companies.<\/p>\n<p><img data-src=\"https:\/\/www.newsbeep.com\/ie\/wp-content\/uploads\/2026\/03\/6309e9c909603f1dffa0d0874f0a4d6c.jpg\" data- alt=\"Russia Supplies North Korea With Over 100\u00a0Elite Horses for Kim Jong Un\u2019s Military Units\" width=\"1058\" height=\"596\" class=\"lazy\"\/><\/p>\n<p>Read more<\/p>\n<p>Category<a href=\"https:\/\/united24media.com\/latest-news\" class=\"c-entry__category\" rel=\"nofollow noopener\" target=\"_blank\">Latest news<\/a><a href=\"https:\/\/united24media.com\/latest-news\/russia-supplies-north-korea-with-over-100-elite-horses-for-kim-jong-uns-military-units-15564\" class=\"u-link-overlay\" rel=\"nofollow noopener\" target=\"_blank\">Russia Supplies North Korea With Over 100\u00a0Elite Horses for Kim Jong Un\u2019s Military Units<\/a><\/p>\n<p>\n            Feb 02, 2026 17:54\n        <\/p>\n<p>The activity is\u00a0associated with several North Korean cyber groups tracked by\u00a0researchers as\u00a0Jasper Sleet and Coral Sleet. The operation appears to\u00a0combine financial objectives with long-term access to\u00a0corporate environments.<\/p>\n<p>The company has previously disrupted infrastructure connected to\u00a0the scheme, including thousands of\u00a0email accounts used during recruitment and communication with employers.<\/p>\n<p>Microsoft noted that artificial intelligence is\u00a0increasingly being integrated across multiple stages of\u00a0cyber operations, including reconnaissance, social engineering, and malware development. The same technologies can accelerate phishing campaigns, assist with vulnerability research, and help analyze stolen data after a\u00a0breach.<\/p>\n<p>Earlier, Newsweek <a href=\"https:\/\/united24media.com\/latest-news\/kim-jong-uns-13-year-old-daughter-reportedly-given-leadership-role-in-north-koreas-missile-bureau-16189\" target=\"_self\" rel=\"nofollow noopener\">reported<\/a> that North Korean leader Kim Jong Un\u00a0had reportedly given his daughter, Kim Ju\u00a0Ae\u2014believed to\u00a0be\u00a0around 13\u00a0years old\u2014a leadership role within the country\u2019s Missile Administration, the body responsible for overseeing Pyongyang\u2019s nuclear forces, citing South Korean intelligence and a\u00a0senior government official.<\/p>\n<p><img data-src=\"https:\/\/www.newsbeep.com\/ie\/wp-content\/uploads\/2026\/02\/(x810-y167-w1190-h672)-7f54d6f9a1e9b10de9b3e7ee663a18d9.png\" data- alt=\"On the Frontline of Truth\" width=\"1026\" height=\"577\" class=\"lazy\"\/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/united24media.com\/static\/build\/img\/logo.qJ-S0EWo.svg\" alt=\"Logo\" width=\"169\" height=\"16\"\/><a href=\"https:\/\/united24media.com\/donate?banner_variant=article_06_melnik_truth\" target=\"_blank\" rel=\"noopener external nofollow\" class=\"u-link-overlay\" data-donation-link=\"\">On the Frontline of Truth<\/a><\/p>\n<p>Our reporters work on the frontlines to show what\u2019s really happening in Ukraine. Your support helps them keep reporting.<\/p>\n","protected":false},"excerpt":{"rendered":"North Korean operatives are increasingly using artificial intelligence tools to\u00a0fraudulently secure remote jobs in\u00a0Western technology companies. According to\u00a0Microsoft,&hellip;\n","protected":false},"author":2,"featured_media":334752,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20],"tags":[220,218,219,61,60,80],"class_list":{"0":"post-334751","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-artificial-intelligence","8":"tag-ai","9":"tag-artificial-intelligence","10":"tag-artificialintelligence","11":"tag-ie","12":"tag-ireland","13":"tag-technology"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/posts\/334751","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/comments?post=334751"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/posts\/334751\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/media\/334752"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/media?parent=334751"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/categories?post=334751"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/tags?post=334751"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}