- North Korean pirates use Genai to occupy jobs in Western companies
- Okta new research reveals CVs and written messages
- This is an escalation of a campaign of existing false interview
New research from OKTA has revealed that the pirates of the Democratic People’s Republic of Korea (RPDC) use a generative AI in its malicious interview campaign – a series of tactics that involve a job in remote technical roles in Western companies, generally in industries with sensitive security data such as defense, aerospace or engineering.
This is not the first time that the false North Korean Pirates of Employment tasks have made an additional effort with their campaigns, but new research has revealed that Genai plays an essential role in employment programs.
AI models are used to “create convincing characters at many stages of job demand and interview process”, then, once hired, Genai is used again to help maintain several roles, all winning revenues for the state.
Malicious interview
The AI was used by these hackers in several ways, including the generation of CV and motivation letters, carrying out interviews simulated via the cat and the webcam, the translation, translation and summary of messages, as well as the management of communications for several jobs from different accounts and services.
To help you, hackers have a sophisticated network of “facilitators” which provide support in the country, technical infrastructure and “legitimate commercial coverage” – helping North Koreans with national addresses, legitimate documents and support during the recruitment process.
The campaign becomes more and more sophisticated, especially since the pirates now use on both sides of the job search process, targeting job seekers with false interviews, in which they deliver malware and infostators.
These elaborate patterns often start on legitimate platforms such as Linkedin or Upwork – with attackers who reach out to the victims to discuss potential opportunities. Anyone on hunting at work or in the hiring process should be very vigilant to whom they speak and should be careful not to download any unknown software.