Blogs
The latest cybersecurity trends, best practices, security vulnerabilities, and more
Unmasking Hidden Threats: Spotting a DPRK IT-Worker Campaign
By Duy-Phuc Pham and John Fokker · September 23, 2025
In today's complex threat landscape, staying ahead of sophisticated adversaries is paramount. Organizations face constant pressure to identify threats that do not always involve traditional malware, and it is essential to focus on proactive intelligence that can reveal hidden risks and strengthen defenses.
A prominent example is the North Korean IT worker employment campaign, wherein skilled operatives from the DPRK (North Korea) pose as remote IT professionals to get hired at Western companies. These schemes enable attackers to legitimately enter a victim’s network as an employee, bypassing traditional security filters.
This example sets the stage for why, besides a solid security solution such as Trellix Email Security, proactive threat hunting and robust threat intelligence are crucial. In this blog, we will examine a real case of a North Korean IT worker scheme Trellix uncovered, dissect how it unfolded, and illustrate how combining threat intelligence with active hunting exposed the threat before harm was done. Notably, this incident is not isolated; we are currently investigating multiple additional DPRK IT-worker attempts across sectors.
The Evolving Threat: North Korean IT Worker Employment Fraud
In mid-2025, open-source intelligence (OSINT) research by independent analyst @SttyK uncovered approximately 1,400 email addresses linked to North Korean IT workers operating abroad. These findings, made public online, provided a critical list of indicators for security teams worldwide. Armed with this intelligence, our team at Trellix initiated a proactive hunt through telemetry data to find any matches. The effort paid off: We identified an ongoing DPRK IT worker campaign targeting a major U.S. healthcare provider’s hiring process.
In this case, an individual using the name “Kyle Lankford” had applied for a Principal Software Engineer position at the healthcare company. Communication was conducted via seemingly ordinary Gmail addresses—suptalentdev@gmail.com (which appeared in email headers) and kyle12lank@gmail.com—with nothing overtly suspicious at first glance. The hiring process progressed through normal steps: The applicant submitted a resume and was invited to complete a coding assessment. Table 1 below provides a timeline of key events in this campaign:
Date | Event | Details |
July 10, 2025 | Initial screening & Assessment invitation | Company (Talent Acquisition) emailed “Kyle Lankford” with instructions for an online CodeSignal technical assessment. The email came from a corporate address and contained standard test details and links. |
July 16, 2025 | Assessment completed | The candidate completed the coding test as instructed. No red flags were noted; all interactions used common platforms (CodeSignal) and showed expected behavior. |
August 4, 2025 | Follow-up from applicant | “Kyle” emailed the recruiter, politely asking if there were any updates on the application status after the assessment. This follow-up email appeared benign and professional. |
August 2025 | Threat hunt triggered (Trellix SecondSight) | Trellix’s SecondSight threat hunting service correlated the applicant’s email addresses with known DPRK IT worker indicators. This correlation raised an alert for further investigation, despite the absence of malware. |
August 2025 | Investigation & exposure | Upon deeper analysis of the email exchanges and background checks, the candidate was identified as a likely North Korean operative. Trellix's SecondSight notified the customer to prevent a potential insider threat. |
A closer look at the email communication in this case illustrates why these schemes are so challenging to detect. The emails exchanged between the “applicant” and the company contained no malware, no phishing URLs, and no obvious red flags.
Field | Value | Notes |
From | Kyle Lankford <kyle12lank@gmail.com> | Personal Gmail address—common for job applicants. No spoofing; DMARC alignment passed via Google. |
To | [Company Recruiter] | Legitimate corporate email of the recruiter (censored). |
Subject | Re: CodeSignal Technical Assessment—Important Details & FAQs (Principal Software Engineer Application) | The subject line is a reply to the company’s original assessment email. It appears routine, referencing the coding test for the role. |
Date | Mon, 4 Aug 2025 09:19:34 -0400 | A normal follow-up sent on a Monday morning (Eastern Time). Timing does not arouse suspicion. |
Attachments | image001.png | A signature logo, no malware attached. |
URLs in Body | Multiple links to codesignal.com help articles (via the company’s secure URL wrapper) and a mailto link to CodeSignal support. | All URLs were legitimate resources (e.g., MFA setup guide, assessment tips) wrapped by an email security gateway (urldefense), which found no issues. |
Originating IP | 209.85.128.196 (Google Mail server) | Google infrastructure IP—consistent with sending from Gmail’s web client. |
Nothing in these fields is inherently malicious. The sender and recipient addresses, subject, and dates all align with an authentic job application workflow.
The follow-up message from “Kyle” read:
Hi [CENSORED],
I hope you had a great weekend. I wanted to follow up regarding the Principal Software Engineer position. I completed the CodeSignal assessment on 7/16 and was wondering if there are any updates or next steps I should be aware of.
I look forward to hearing from you.
Thank you,
Kyle
The job applicant's polite, fluent, and professional email, replying to the recruiter's email with coding test instructions, showed no red flags. This case highlights the importance of proactive threat hunting; only by correlating subtle clues like suspicious email addresses and other open source intelligence could investigators uncover the deception, preventing the adversary from blending in as a new hire.
Why Is This Threat So Critical?
North Korean IT worker employment fraud poses multiple risks for organizations:
- Sanctions Violations: Hiring these individuals can inadvertently fund North Korean weapons programs. Financially, an employed developer can funnel tens or hundreds of thousands of dollars of salary to Pyongyang over time. Cumulatively, such schemes are estimated to bring in $250 million to $600 million per year for North Korea’s weapons programs. This is money that bypasses sanctions, directly undermining international pressure on the regime.
- Intellectual Property Theft: Providing access to company systems risks sensitive data exposure. The individual can potentially access sensitive data, proprietary code, customer information, and trade secrets. As noted, there have been cases of North Korean hires stealing export-controlled technology and cryptocurrency from their employers.
- Illicit Funding: Beyond the direct losses, every dollar paid to these fraudulent workers is illicit funding for the North Korean regime’s weapons and cyber programs.
- Supply Chain Risk: The access to a company's code opens the door to malicious code changes and future supply chain attacks.
Recent U.S. Department of Justice actions in June 2025 disrupted networks impacting over 100 companies and generating millions in fraudulent revenue—underscoring the scale of this threat.

Conclusion
The case of the North Korean IT worker employment fraud is a reminder that not all suspicious cyber events signal themselves with flashing red alerts. Some arrive as ordinary interactions—a job application, an email exchange, a routine login. Traditional security tools and reactive postures will miss these kinds of threats. It takes a proactive, intelligence-led approach to root out campaigns that are “malware-less” yet no less dangerous to an organization. This is precisely the reason why proactive threat hunting is a priority for Trellix and its customers.
Discover the latest cybersecurity research from the Trellix Advanced Research Center: https://www.trellix.com/advanced-research-center/
RECENT NEWS
-
Aug 14, 2025
Michael K. Green Joins Trellix as CISO
-
Aug 12, 2025
Trellix Extends Data Security to ARM-Compatible Devices
-
Jul 31, 2025
Trellix Appoints Natalie Polson Chief Revenue Officer
-
Jun 17, 2025
Trellix Accelerates Organizational Cyber Resilience with Deepened AWS Integrations
-
Jun 10, 2025
Trellix Finds Threat Intelligence Gap Calls for Proactive Cybersecurity Strategy Implementation
RECENT STORIES
Latest from our newsroom
Get the latest
Stay up to date with the latest cybersecurity trends, best practices, security vulnerabilities, and so much more.
Zero spam. Unsubscribe at any time.