Close Menu
National Security News
  • Ukraine War
  • Russia
  • Terrorism
  • China
  • Iran
  • Africa
  • Tech
    • Space
    • Nuclear
    • Cyber
  • Investigations

Trending

The targeting chain: how the IRGC exploits MTN-Irancell’s Gulf telecom connections to guide its missiles

March 5, 2026

US Navy to escort oil tankers through the Gulf to prevent attack from Iran

March 4, 2026

President Trump will not rule out sending troops into Iran

March 3, 2026

Israel’s new laser defence system intercepts rockets as regional tech race intensifies

March 3, 2026
Facebook X (Twitter) Instagram
National Security News
Subscribe
X (Twitter)
Login
IPSO Trusted Journalism in National Security
  • Ukraine War
  • Russia
  • Terrorism
  • China
  • Iran
  • Africa
  • Tech
    • Space
    • Nuclear
    • Cyber
  • Investigations
National Security News
  • Ukraine War
  • Russia
  • Terrorism
  • China
  • Iran
  • Africa
  • Tech
Home»Cyber
Cyber

Traditional employee background checks cannot be trusted, you might hire a foreign hacker

Staff WriterBy Staff WriterJuly 26, 20245 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email

Listen to the article

0:00
0:00

Key Takeaways

🌐 Translate Article

Translating...

📖 Read Along

💬 AI Assistant

🤖
Hi! I'm here to help you understand this article. Ask me anything about the content!
Stock image on the left versus the AI edited image submitted to HR on the right. (Source: KnowBe4)

Traditional background checks for employees are not good enough anymore as sophisticated state actors use stolen identities and artificial intelligence to get around security checks. Even a cyber security training firm discovered their new software engineer was actually a North Korean hacker. The hacker was exposed after he attempted to load information-stealing malware onto company systems.

Alberto Casares, the chief technology officer at the cyber security company Constella Intelligence, told National Security News that this threat is not new and “underscores the sophistication and persistence of state-backed actors.”

He explained: “The evolving landscape of cyber threats, including the recent case, underscores the limitations of traditional background checks and ID validation processes.

“These conventional methods are increasingly inadequate in detecting sophisticated attempts by threat actors to infiltrate organisations.

“As cybercriminals leverage AI to create more convincing fake identities and deception tactics, it’s clear that more advanced detection methods are needed.”

According to Casares, it is crucial to “integrate systems that can validate whether an identity has been previously compromised,” and assess risk based on provided personal information.

Fake passports and drivers licenses available for buy on Telegram (Source: Constella Intelligence)

Casares explains that Constella employs this method and offers it to other companies for integration into hiring, onboarding, or registration processes. He said this is effective because “an individual’s digital footprint is difficult to alter, providing a reliable indicator of potential risk.”

Casares added that these state actors “have the resources and time to execute complex and covert operations, using realistic personas to infiltrate organisations. This represents a shift from traditional cyberattacks to more nuanced tactics.”

A security firm infiltrated

Stu Sjouwerman, the CEO and president of KnowBe4, the targeted company, said: “We posted the job, received resumes, conducted interviews, performed background checks, verified references, and hired the person. We sent them their Mac workstation, and the moment it was received, it immediately started to load malware.”

The hacker is believed to be part of what is known as a “laptop farm” – a large-scale operation where North Korean hackers use stolen identities and remote access to infiltrate US companies.

The way the scam work, Sjouwerman explained, is the fake worker gets their workstation sent to an address linked to the “IT mule laptop farm”. They then use a VPN to mask their true location, which is in North Korea or China, and they work late to make it look like they are working U.S. hours.

(Source: Facebook/IT-Links)

“The scam is that they are actually doing the work, getting paid well, and give a large amount to North Korea to fund their illegal programs,” said Sjouwerman.

KnowBe4’s security operations centre began to ask questions after noticing the suspicious activity on the new hire’s device.

The hacker said “he was following steps on his router guide to troubleshoot a speed issue,” however, after further probing, he became unresponsive and the company blocked his device.

According to Casares, red flags should be raised if a new hire engages in “unusual or unauthorised network activity,” particularly outside of their job scope or regular working hours. This, he said, “could indicate reconnaissance or data exfiltration attempts.”

Explaining why the attacker tried to launch malicious software on the company laptop, Sjouwerman said: “We can only guess, but the malware was an infostealer targeting data stored on web browsers, and perhaps he was hoping to extract information left on the computer before it was commissioned to him.”

The firm said that they successfully stopped the attack before any data loss and came public with the incident because “If it can happen to us, it can happen to almost anyone.”

Stolen identity used

The new hire at KnowBe4 was a real person who stole the identify of a U.S. national to pass the background checks, also using AI to alter a stock image submitted with the application. 

Casares told NSN: “There are underground places from Telegram to forums where you find this type of information for sale.”

“You can find people selling their online profiles, which others use to create fake identities for background checks,” added Casares.

Online user selling their profile on Upwork, and American jobs platform. (Source: Constella Intelligence)

KnowBe4 shared their investigation with Mandiant, Google’s cybersecurity subsidiary, and the FBI who have been warning of “laptop farms” since 2022.    

In May 2024, prosecutors in the U.S. accused Christina Chapman and three North Korean national of setting up a laptop farm on behalf of North Korean workers. They allegedly stole the identifies of over 60 American citizens to aid foreign IT workers find remote jobs in the U.S. across 300 companies.

In a separate U.S. complaint, Oleksandr Didenko, a Ukrainian national, was also accused of operating a laptop farm which hosted around 79 computers in California, Tennessee and Virginia. Didenko allegedly created numerous fake accounts on U.S. IT job platforms and then sold these accounts to overseas workers, some in North Korean, to be used to apply for remote jobs. 

false identity laptop farm malware North Korean
Staff Writer

Keep Reading

ITC Secure and IronNet unite to form Collective Defence

Scientists at secret military base at centre of Novichok murder probe fear their details may have been stolen by cyber criminals

Two leading cyber companies sign agreement to launch AI powered cyber security defence system

Cybersecurity in South Africa: rising attacks, weak defences, and growing urgency

Cyber hackers target French submarine company

Synthetic identities and stolen credentials: Constella Intelligence’s report warns of national security risks

Editor's Picks

US Navy to escort oil tankers through the Gulf to prevent attack from Iran

March 4, 2026

President Trump will not rule out sending troops into Iran

March 3, 2026

Israel’s new laser defence system intercepts rockets as regional tech race intensifies

March 3, 2026

Who will be the next Iranian Supreme leader?

March 2, 2026

Trending

Israel’s new laser defence system intercepts rockets as regional tech race intensifies

Iran March 3, 2026

Who will be the next Iranian Supreme leader?

Iran March 2, 2026

Both ultimate shareholders of MTN-Irancell killed in US-Israeli strikes: what it means for South Africa’s most toxic asset

Iran March 1, 2026
Facebook X (Twitter) TikTok Instagram LinkedIn
© 2026 National Security News. All Rights Reserved.
  • About us
  • Privacy Policy
  • Terms
  • Contact
Home Topics Podcast NSN Lists

Type above and press Enter to search. Press Esc to cancel.

Sign In or Register

Welcome Back!

Login to your account below.

Lost password?