Inside the North Korean Remote Worker Threat: TTPs and Impact
When
July 24, 2025 at 2:00 PM ET
Where
Virtual
The Rise of Remote Work Opened the Door—North Korea Stepped Through
As remote work reshapes the global workforce, it’s also become a strategic vulnerability. North Korean cyber operatives are infiltrating global organizations by posing as freelance developers, IT staff, and contractors, embedding themselves deep inside trusted workflows.
These operations are sophisticated, financially motivated, and directly tied to funding the DPRK’s weapons programs.
Flashpoint analysts have uncovered rare, firsthand intelligence from compromised systems—captured through infostealer malware infections—providing a behind-the-scenes view of how these actors operate, evade detection, and monetize access.
In this session, we’ll cover:
- The Deception Playbook: See the precise tactics, techniques, and procedures (TTPs) North Korean operatives use to bypass defenses and embed themselves within unsuspecting organizations, straight from their compromised systems.
- Scale & Impact: Understand the true financial and operational scope of these illicit networks and the tangible risks they pose to your intellectual property and financial assets.
- Intelligence-Driven Defenses: Equip your teams with primary-source evidence of North Korean threat actor behavior—offering the clarity needed to inform risk assessments, shape internal safeguards, and support cross-functional decision-making.
