Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: CrowdStrike Identifies Surge in North Korean IT Infiltration
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

CrowdStrike Identifies Surge in North Korean IT Infiltration

Highlights

  • North Korean operatives infiltrated global IT jobs more frequently this year.

  • CrowdStrike linked generative AI to more advanced cyber operations.

  • Cyber intrusions increasingly feature direct involvement over traditional malware attacks.

Ethan Moreno
Last updated: 4 August, 2025 - 10:19 am 10:19 am
Ethan Moreno 3 hours ago
Share
SHARE

Over the past year, cybersecurity firm CrowdStrike reported a steep rise in covert North Korean operatives securing remote technical roles within companies worldwide. These operatives, primarily affiliated with the group Famous Chollima, have strategically embedded themselves in both Fortune 500 and smaller businesses, often leveraging advanced tools to evade detection. The widening scope of their activities suggests significant operational support and planning from state-level actors in North Korea. In many cases, the salaries earned by these operatives are funneled back to Pyongyang, further fueling the ongoing national programs of the country.

Contents
How Have North Korean Operatives Increased Their Workforce Penetration?What Role Does Artificial Intelligence Play in These Operations?How Are Broader Cyber Threats Shifting?

Compared to incidents highlighted in past reports, recent findings show a marked escalation in the methods and scale of North Korean infiltration. Reports from several years ago primarily focused on malware-centric attacks and cryptocurrency thefts by North Korean actors. Current investigations demonstrate an evolution toward direct workforce penetration and the sophisticated use of generative artificial intelligence, setting today’s threat landscape apart from earlier cyber-attack approaches and indicating a higher frequency and technical maturity in these adversarial operations.

How Have North Korean Operatives Increased Their Workforce Penetration?

CrowdStrike’s annual threat hunting report revealed that its team responded to more than 320 incidents of North Korean operatives obtaining IT jobs at foreign entities in just one year. The company highlighted a 220% surge in Famous Chollima activity compared to the previous period. Representatives observed the trend’s expansion beyond U.S. borders to Europe, Latin America, and other regions.

“We saw a 220% year-over-year increase in the last 12 months of Famous Chollima activity,”

stated Adam Meyers, CrowdStrike’s senior vice president of counter adversary operations.

What Role Does Artificial Intelligence Play in These Operations?

The use of generative artificial intelligence (AI) has become central to North Korean operatives’ success in securing and maintaining remote positions. According to CrowdStrike, these individuals employ AI tools at every step, from crafting resumes and fake identities to participating in technical interviews and managing multi-job workloads. Meyers remarked in the report,

“They use generative AI across all stages of their operation.”

The widespread adoption of generative AI facilitates not only sophisticated deception during hiring processes but also improved productivity once employed within targeted organizations.

How Are Broader Cyber Threats Shifting?

Besides the increase in North Korean intervention, CrowdStrike observed a 27% rise in “hands-on-keyboard” cyber intrusions, where threat actors gain interactive system access, often bypassing traditional malware. The firm notes that 73% of such incidents now involve cybercrime rather than espionage exclusively. Over the last six months, CrowdStrike has identified 14 new threat groups or clusters, raising the tally of tracked adversaries to more than 265 and 150 developing clusters, highlighting the diversification and global reach of current cyber threats.

Cybersecurity professionals monitoring these developments should be attentive to the evolving tactics employed by both state-linked actors and independent groups. The integration of generative AI represents a significant shift in cyber operations, allowing adversaries to operate more discreetly and with greater efficiency. Strengthened identity verification procedures and proactive monitoring for anomalous employee behavior may become necessary countermeasures. Organizations must recognize how the fusion of human tactics with AI-driven tools is reshaping the threat landscape and adapt their defense strategies accordingly.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Senate Confirms Cairncross as National Cyber Director After Delay

Researchers Warn Users Fix Cursor Software to Block Remote Attacks

Hackers Use Social Engineering as Main Entry Point, Report Finds

Secret Blizzard Spies on Embassies, Exploits Russian ISPs

Google Project Zero Speeds Up Vulnerability Disclosures to Vendors

Share This Article
Facebook Twitter Copy Link Print
Ethan Moreno
By Ethan Moreno
Ethan Moreno, a 35-year-old California resident, is a media graduate. Recognized for his extensive media knowledge and sharp editing skills, Ethan is a passionate professional dedicated to improving the accuracy and quality of news. Specializing in digital media, Moreno keeps abreast of technology, science and new media trends to shape content strategies.
Previous Article Wordle Players Tackle ‘RIGID’ in Monday’s Puzzle Challenge

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Wordle Players Tackle ‘RIGID’ in Monday’s Puzzle Challenge
Gaming
AMD Gains on Intel as Steam Survey Shows Shift in CPU Use
Gaming
GOG Offers 13 Free NSFW Games to Challenge Gaming Censorship
Gaming
Tesla Expands Robotaxi Service Area Across Austin
Electric Vehicle
Drone Swarms Deliver Automated Solutions Across Key Industries
AI
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?