The Invisible
Workforce
How North Korean state actors, deepfake technology, and organized interview farms are embedding operatives inside European and global companies right now.
"The threat of unintentionally hiring North Korean IT workers is larger than most people realize. It is covert, it is global, and it is active right now."
The Numbers Don't Lie
What began as isolated incidents has become an industrial-scale global operation. These are the documented numbers — and they represent only what was caught.
Candidate profiles will be fake by 2028.
Your current hiring process was not designed for this. Nearly every Fortune 500 CISO has already encountered this threat inside their organization.
European Infiltration Map
LIVE* CrowdStrike reports investigating European incidents daily. Sources: FBI, ENISA, CrowdStrike, Mandiant, Palo Alto Unit 42.
How the Attack Works
From a synthetic LinkedIn profile to an operative with admin access to your production systems — this is the five-stage playbook.
AI generates a complete synthetic persona: name, photo (ThisPersonDoesNotExist.com), LinkedIn profile, fabricated work history, AI-generated references, and identity documents using Midjourney. The persona is optimized for the target region — Western names, European addresses, convincing digital footprints.
Your intrusion detection system won't trigger — because there's no intrusion.
The operative has valid credentials, approved system access, and a legitimate employment contract. Traditional security doesn't catch this. The human firewall does.
Case File Dossiers
Twelve documented incidents. Across multiple sectors. On three continents. All within 24 months. Click any case to open the file.
Wang Brothers — U.S. Laptop Farm Operators Sentenced for DPRK IT Worker Scheme
On April 15, 2026, the U.S. Department of Justice announced the sentencing of two New Jersey residents — Kejia Wang (42, Edison) and Zhenxing Wang (39, New Brunswick) — for operating the domestic infrastructure backbone of a multi-year North Korean IT worker infiltration scheme. Kejia Wang received 108 months in prison; Zhenxing Wang, 92 months. Between 2021 and October 2024, the two men ran and coordinated a network of 'laptop farms' — physical arrays of hundreds of company-issued computers — that allowed overseas North Korean IT workers to appear as if they were physically present in the United States. Using KVM (keyboard-video-mouse) switches for remote access, the fake workers secured employment at more than 100 U.S. companies, including Fortune 500 firms, by exploiting the stolen identities of at least 80 American citizens. Kejia Wang traveled to Shenyang and Dandong, China in 2023 to coordinate with overseas handlers — including a former classmate he knew to be North Korean. The two men created shell companies — Hopana Tech LLC, Tony WKJ LLC, and Independent Lab LLC — to receive and launder scheme proceeds, channeling millions to overseas co-conspirators. For their facilitation, the six U.S.-based participants collectively received nearly $700,000. The broader scheme generated over $5 million for the DPRK regime and caused at least $3 million in legal, remediation, and network damage costs to victim companies. In one case, an overseas co-conspirator remotely accessed a California-based AI defense contractor and exfiltrated data explicitly controlled under ITAR (International Traffic in Arms Regulations). Eight co-conspirators named in the original June 2025 indictment remain at large; the U.S. State Department's Rewards for Justice program is offering up to $5 million for information on their whereabouts. This case is the clearest judicial confirmation yet that the DPRK IT worker program is not a theoretical risk — it is an active, coordinated, state-sponsored operation with domestic U.S. infrastructure, real victims, real financial damage, and now, real prison sentences for those who enable it. The fundamental attack vector is unchanged: trust. Trusted identities, trusted vendors, trusted hiring processes — all weaponized through a single layer of human facilitation. Source: U.S. Department of Justice press release, April 15, 2026.
axios npm Package — Supply Chain RAT via One Compromised Account
In April 2026, Elastic Security Labs published an analysis of a supply chain attack targeting the axios npm package — one of the most widely used JavaScript libraries in the world, with over 100 million weekly downloads. An attacker compromised the credentials of a single package maintainer and published infected versions containing a cross-platform Remote Access Trojan (RAT) capable of running on Windows, macOS, and Linux. The entire attack window lasted just 39 minutes. To understand the blast radius: 100 million weekly downloads means 100 million environments — servers, CI/CD pipelines, developer workstations, production systems — that pulled the package in the affected window. Every one of those environments is a potentially compromised system. Not every download results in execution, but the attacker did not need to compromise all of them — only a fraction. At 100 million weekly downloads, even a 0.1% active exploitation rate represents 100,000 infected systems. The relevance to insider threat and personnel security programs extends far beyond software: the attacker did not need to bypass a firewall, exploit a zero-day, or breach a hardened perimeter. They needed the credentials of one trusted person — one link in the chain. A compromised maintainer, a breached vendor, an infiltrated contractor. The principle is the same: adversaries enter through the door you hold open because you trust what is on the other side. Organizations invest heavily in perimeter defenses while rarely asking the critical questions: Who is actually behind the supplier we trust? Who has access to systems we treat as inherently safe? What screening and due diligence was applied to the people working for us — directly or through a third party? This incident is a reminder that insider threat does not require a malicious employee. It requires only a trusted account in the wrong hands. One weak link is enough to break the entire chain. Source: Elastic Security Labs — 'Axios: One RAT to Rule Them All.'
Delve — Fake Compliance-as-a-Service
Delve, a Y Combinator-backed compliance startup ($32M Series A at a $300M valuation, led by Insight Partners), was accused of fabricating compliance certifications for hundreds of customers — a practice whistleblower 'DeepDelver' called 'structural fraud.' Delve generated auditor conclusions, test procedures, and final report evidence before any independent review occurred, then had partner audit firms (Accorp and Gradient — both nominally India-based, with only a nominal US presence) rubber-stamp the results. Customers received certifications claiming HIPAA, SOC 2, and GDPR compliance they had never actually achieved — exposing them to criminal regulatory liability and significant fines. 'By generating auditor conclusions before independent review, Delve places itself in the role of both implementer and examiner. This is not a technicality. It is structural fraud that invalidates the entire attestation,' wrote DeepDelver. In addition, a security researcher separately reported accessing Delve's own sensitive data — including employee background checks and equity vesting schedules — through multiple 'gaping security holes' in its external attack surface. Delve halted all demos; Insight Partners deleted its investment blog post. Delve denies wrongdoing, calling the pre-filled evidence 'templates.' The direct relevance to insider threat programs: when onboarding IT vendors or staffing providers, organizations routinely accept compliance badges and background check certificates at face value. Delve proves such paperwork can be fabricated at industrial scale. Require the actual audit trail — not just the certificate — and always verify independently.
LPP Holding — Pardubice Arson Attack
On March 20, 2026, a warehouse at LPP Holding's Pardubice industrial facility was deliberately set ablaze. 'The Earthquake Faction' claimed responsibility, citing the company's alleged cooperation with Israeli drone manufacturer Elbit Systems. One warehouse destroyed; second building damaged; no casualties. The Ministry of Interior classified the event as a probable terrorist attack; BIS (Czech Security Information Service) joined the investigation. The operational precision of the attack raises questions about possible insider intelligence — shift schedules, camera positions, guard routines. UPDATE (March 24): The attack had a second dimension — the group also exfiltrated confidential documents from the facility during the assault. Days later, The Earthquake Faction issued an extortion letter demanding LPP Holding publicly distance itself from Elbit Systems and condemn the 'occupation of Palestine' by April 20 — or the stolen documents will be published. LPP maintains the Elbit collaboration was planned two years ago but never materialized. Three suspects were arrested (one in Slovakia, two in Czech Republic; US and Czech nationals). Intelligence analysts warn the 'pro-Palestinian' framing may be a deliberate smokescreen: LPP Holding supplies drones to Ukraine, giving Russia direct motive to disrupt the factory. 'The language is written to evoke left-wing activism — but you cannot draw conclusions from the text alone,' said analyst Josef Kraus. Whether this is genuine activism or a state-sponsored false flag operation remains unresolved.
Slavia Pojišťovna — Czech Insurance Provider
In March 2026, Czech insurance company Slavia Pojišťovna allegedly suffered a 150GB data exfiltration. Leaked data includes medical records, ultrasound imagery, insurance policies, accident and claims reports, and a customer database. The attacker exploited an Adminer vulnerability to deploy a webshell and reverse shell for persistent extraction. Critically, the threat actor claims active network access is still maintained at time of reporting. Investigation is ongoing — whether an insider facilitated initial access or lateral movement remains unconfirmed. This is a live case study in how external breach and insider threat converge.
Berlin Power Grid — Vulkangruppe Arson
In the early hours of January 4, 2026, far-left militant group Vulkangruppe (Volcano Group) set fire to high-voltage cables on a bridge over the Teltow canal near the Lichterfelde power station in south-west Berlin. The attack cut electricity to 45,000 households and 2,200 businesses across four districts — the longest blackout in Berlin's post-war history. Power was not fully restored until January 8, leaving ~100,000 people without heat for five days in below-freezing temperatures. Schools, hospitals, and care homes ran on emergency generators. In a 2,500-word statement, the group cited the climate crisis and AI data center energy consumption as its motivation — explicitly targeting 'the ruling class.' Initial authorities considered Russian state sabotage, underscoring the operational sophistication of the strike. The attack was not the group's first: Vulkangruppe previously claimed a 2024 arson at the Tesla gigafactory pylon and a September 2025 attack that blacked out south-east Berlin for 60 hours. The precision of target selection — disabling the specific cables with maximum grid impact — raises the question of whether reconnaissance benefited from insider knowledge of maintenance windows, patrol schedules, or cable routing. This remains uninvestigated.
NHS Synnovis Data Breach
A database administrator hired by NHS pathology contractor Synnovis — serving major London hospitals — spent six months systematically exfiltrating 4.2 million patient records: medical histories, mental health assessments, genetic test results. The breach directly contributed to a ransomware attack that disrupted services across multiple NHS facilities. The operative claimed British citizenship with flawless documentation.
Chapman Laptop Farm Operation
Christina Chapman, 50, operated 90 company-issued laptops at her Arizona home — all received on behalf of North Korean workers. She installed remote access software so operatives overseas could work as if in the US. Result: 309 fraudulent hires across major US companies, $17.1M in illicit revenue. Nearly 70 Americans had their identities stolen. Nike confirmed it was among the victims. Chapman received an 8.5-year prison sentence.
European Interview Farm Operations
Czech IT recruiters documented a consistent pattern: perfect resumes, flawless written communication, then on video calls — cameras 'malfunctioning', multiple voices in background, IP addresses showing Asian locations despite EU residence claims. When confronted, candidates immediately disconnected and never responded again. In 9 of 10 such cases, the candidate vanished. CrowdStrike has since confirmed laptop farms in Romania and Poland.
German Energy Infrastructure Operator
A major German energy operator (classified under EU CER Directive and KRITIS) discovered an IT contractor had gained privileged access to operational technology systems. The contractor, claiming credentials from Eastern European firms, was later identified as a fraudulent operative. The breach triggered mandatory incident reporting under NIS2 and German KRITIS regulations, and exposed vulnerabilities in third-party contractor screening policies.
Warsaw Financial Institution
A senior developer at a Warsaw financial firm worked for 8 months before his scheme was uncovered: he had embedded code that rounded down wire transfers by fractions of a cent, diverting the difference to cryptocurrency wallets. Over 8 months, €840,000 was siphoned. His Polish citizenship documents and claimed employment history at Estonian and Lithuanian banks were entirely AI-fabricated. Polish regulators used the case to push for enhanced personnel security in finance.
KnowBe4 — A Cybersecurity Company
KnowBe4 — a company that trains organizations on cybersecurity — inadvertently hired a North Korean IT worker. He passed background checks, conducted professional interviews, and received a company laptop. Within minutes of receiving it, he attempted to load malware onto the corporate workstation. Security systems detected the suspicious activity before damage occurred. The incident became a landmark case study in the threat.
Czech Cloud Services Company
A software developer named 'Denys Emil L.' claimed Danish citizenship and applied via LinkedIn. Documents looked professional — but Scaut's analysts found they were AI-generated fakes. He had borrowed a real Danish citizen's identity and trade license. Investigation revealed a Chinese national systematically targeting multiple Western tech companies simultaneously, later linked to a North Korean-affiliated group.
Spot the Fake
Below is a real candidate profile that came through a European tech company's hiring pipeline. Click on every element you think is a red flag. Can you catch what their HR team missed?
Below is a real candidate profile that came through a European tech company's hiring pipeline.
Is Your Organization at Risk?
8 questions. No login required. Designed for HR leaders, CISOs, and security teams. Find out where your hiring process is most vulnerable.
When you hire someone, do you verify their identity documents independently (not just accept copies)?
How do you verify a candidate's previous employment?
For remote hires, how do you conduct video interviews?
Do you screen contractors and third-party service providers to the same standard as employees?
For candidates claiming non-local residence (EU but from abroad), do you verify foreign criminal records?
Is there clear ownership between HR and cybersecurity teams for employment fraud prevention?
Are your recruiters trained to detect deepfakes and interview-farm red flags?
After hiring, do you continuously monitor privileged employees for behavioral anomalies?
◼ INTELLIGENCE BRIEFING
Listen & Watch
Explore the threat in depth — through an AI-generated podcast and an upcoming video briefing.
Deepfake Workers Fund North Korean Nukes
An AI-generated deep-dive into how North Korean IT workers are systematically funding weapons programs through employment fraud — and what organizations can do right now.
The Invisible Workforce — Video Briefing
A visual walkthrough of the full threat report — covering the infiltration tactics, real-world cases, and what your organisation can do right now.
The Human Firewall
Background screening is your first and most critical line of defense. Here's what to look for — and what to do.
Strategic Recommendations
Assign clear ownership
Create a cross-functional team (HR + IT Security + Legal). Employment fraud prevention must have an owner — not fall between departments.
Mandate video with verification
Require video for all remote interviews. Ask candidates to describe their surroundings. Request environmental checks. Record interviews for review.
Deploy document authentication
Use Regula Forensics, Trustmatic, or Scaut to verify identity documents. AI-generated IDs are indistinguishable to the human eye.
Extend screening to contractors
Fraudulent candidates are found 3–4× more often in contractor pipelines. Make background verification a contractual obligation for all third parties with system access.
Train recruiters on deepfakes
Specific deepfake detection techniques: hand wave test, window description, audio desync. FBI guidance is publicly available — distribute it.
Implement continuous monitoring
Pre-employment screening is not enough. Monitor privileged users for behavioral anomalies post-hire. The NHS breach ran 6 months before detection.
The threat doesn't break in.
It gets invited.
Scaut is Europe's first provider of automated background screening purpose-built for the modern threat landscape. Founded in Prague in 2020, we track emerging threats — from state-sponsored employment fraud to supply chain attacks — and build the tools to stop them.
Sources: FBI, ENISA, CrowdStrike, Mandiant / Google Threat Intelligence Group, Palo Alto Unit 42, DTEX Systems, Okta, Gartner. Report compiled January 2026.
© 2026 Scaut.com — Advanced Background Screening, Prague, Czech Republic