
What information should you know?
In general, the scheme involves the use of deceptive tactics, including stolen identities and remote access technology tools, to secure IT employee or contractor positions within US-based employers. The allure of high pay for these roles, coupled with a comparatively low risk of detection, makes this scheme particularly enticing for DPRK operatives.
The US Department of Justice announced in a recent court-approved seizure action:1

What can you do with this information?
We recommend that companies mitigate this risk by using a risk-based approach to:

