The AI-Powered IT Scam: How North Korean Hackers Are Infiltrating Western Businesses
The shift to remote work has opened up a global talent pool for businesses looking to hire IT professionals and software developers. Unfortunately, it has also opened the door to a highly sophisticated, state-sponsored cyber threat.
According to a recent threat intelligence report from Microsoft, North Korean agents are deploying advanced Artificial Intelligence (AI) tools to trick Western companies into hiring them for remote IT roles. Once inside, these fraudulent employees funnel their salaries back to the North Korean regime and, in some alarming cases, threaten to leak sensitive company data if they are fired.
At Alvarez Technology Group, we want to ensure our clients and local businesses are aware of this escalating threat—and know how to protect themselves.
The Anatomy of the Scam
Microsoft’s cybersecurity analysts have identified these threat clusters under the names Jasper Sleet and Coral Sleet. The objective of these state-backed scammers is simple: secure high-paying remote tech jobs in the West to generate revenue for Kim Jong-un’s government.
To pull this off, the scammers rely heavily on “facilitators” based in the targeted companies’ home countries and, increasingly, on a sophisticated arsenal of AI tools to mask their true identities.

How Hackers are Weaponizing AI to Get Hired
The days of easily spotting a scammer through a poorly written email are over. According to the report, North Korean agents are leveraging AI across the entire employment lifecycle—to get hired, stay hired, and exploit their access:
- Deepfake Identities: Scammers are using AI applications like Face Swap to insert their faces into stolen identity documents and generate polished, professional headshots for fake CVs.
- Voice-Changing Software: During remote audio or video interviews, these fake applicants utilize real-time voice-altering tools to mask their accents, allowing them to convincingly pass as Western candidates.
- Automated Persona Creation: Agents use generative AI to bulk-create “culturally appropriate” names and matching email address formats, ensuring their applications look completely localized and legitimate.
- Tailored Resumes: By scraping job boards like Upwork with AI, these bad actors analyze the exact skill requirements of open roles and instantly generate highly optimized, keyword-rich resumes.
- Faking Competence: Once they land the job, the deception doesn’t stop. These fake workers rely on AI to write professional emails, translate documents, and even generate code to mask their lack of actual skills and avoid being fired for poor performance.
The Risk to Your Business
The financial loss of paying a fraudulent employee is only the tip of the iceberg. The true danger lies in the access these individuals have to your corporate network.
By unwittingly handing over login credentials and network access to a state-sponsored hacker, businesses risk massive data breaches, intellectual property theft, and severe compliance violations. Microsoft notes that some of these fake workers have resorted to extortion, threatening to release proprietary company data after their employment was terminated.
How to Protect Your Hiring Process
To head off this threat, businesses must modernize their hiring and onboarding protocols. Here are a few immediate steps you can take:
- Mandate Video or In-Person Interviews: Never hire an IT worker based solely on text or audio communication.
- Look for the “Tells” of Deepfakes: Train your HR and hiring managers to look for visual inconsistencies during video calls. Microsoft advises watching for pixelation at the edges of faces, ears, and glasses, or unnatural lighting and shadows that fail to sync with the speaker’s movements.
- Implement Zero Trust Architecture: Ensure that all employees—especially remote workers—are operating under the principle of least privilege. They should only have access to the specific data and systems required to do their job, minimizing the blast radius if an account is compromised.
The Alvarez Technology Group Advantage
Navigating the modern cybersecurity landscape while trying to build a competent IT team is a daunting task for any business. You shouldn’t have to worry if the remote developer you just hired is actually a state-sponsored threat actor.
By partnering with Alvarez Technology Group, you eliminate the guesswork. Whether you need fully managed IT services, co-managed support, or robust cybersecurity solutions, you get access to a team of thoroughly vetted, highly certified, and locally accountable professionals.
Don’t leave your company’s digital keys in the hands of unverified remote workers. Contact Alvarez Technology Group today to learn how we can secure your network, streamline your IT operations, and keep your business safe from next-generation AI threats.

