Threat Analysis

How To Proactively Mitigate The DPRK IT Worker Employment Scam

by | Mar 27, 2025 | Blog, Research

Executive Summary

Nisos is tracking a network of likely North Korean (DPRK)-affiliated IT workers posing as Singaporean, Turkish, Finnish and US nationals with the goal of obtaining employment in remote IT, engineering, and full-stack blockchain positions. Through our research and client work we have detected and identified a number of fake personas since 2023. Successful mitigation of the risk relies on an improved vetting process for external remote candidates, which heavily relies on open-source intelligence (OSINT) checks of portfolio content and contact information, as the network re-uses this information. To assist security teams and business leaders with protecting their organizations and their clients, Nisos provides several steps that we recommend businesses implement in their hiring process to mitigate the DPRK-affiliated IT worker threat. Nisos also provides examples of how we used OSINT to identify four active fake personas. Karl Chong, currently appears to be employed as an engineer at a US-based strategic digital consultancy company. Two additional fake personas, Roman Kryveha and Ram Maharjan, who share contact information with Karl Chong, were likely created to also obtain remote employment as part of the employment scheme. Nisos also identified a fourth fake persona, John Alexander Bird, whose resume was created and updated via GitHub account imcode65 in 2024. This persona does not have an active personal website, suggesting that it is likely not actively seeking employment as part of the employment scheme yet.

Risk Mitigation Steps

The DPRK IT worker scheme is pervasive and targets companies of all sizes and in numerous industries, including cybersecurity. Learning opportunities for enterprise leaders include the following, which we recommend communicating to HR and IT teams within the organization:

  • Conduct reverse image searches to identify digitally manipulated profile pictures.
  • Conduct expeditious OSINT checks to verify whether the provided phone numbers, email addresses, and GitHub accounts belong to the applicant and/or have been associated with other individuals.
  • Review phone numbers and email addresses to determine whether applicants applied using the same contact information.
  • Review stylometric attributes of the resume content to determine whether other resumes include the same language.
  • Verify that locations match for all accounts linked to the applicant.
  • Conduct a detailed review of the applicant’s online presence for consistency in name, appearance, work history, education, and other biographical details.
  • Verify prior employment. Applicants often list major companies in their employment history, likely both to inflate their experience and to deter the hiring organization from contacting their provided references.
  • Verify educational claims by contacting the institution’s registrar office.
  • Collect and retain all contact information for the references reviewed by HR in relation to the job applicant. References are often the same individual or connected to the same network of people as the job applicant.
  • Ensure the interview process involves on-camera and/or in-person interviews.

Nisos researchers were able to identify four active personas by researching GitHub account activity and cross referencing contact information and profile photos. Nisos solely used OSINT checks and did not rely on proprietary tools or paid third party subscription tools.

Fake Persona Network

Nisos identified one persona, Karl Chong, who appears to have gained employment and three newly created personas seeking remote positions in Singapore, Turkey, Finland, and the United States. The newly created personas were all created and updated in 2024 in repositories linked to GitHub account imcode65. The account is associated with the email address kanbei0605@gmail[.]com, which is also associated with the persona Karl Chong.

Graphic 1: Network map of likely DPRK-affiliated personas.
Graphic 1: Network map of likely DPRK-affiliated personas.

Karl Chong

Nisos identified Karl Chong—used by a likely DPRK IT worker to obtain remote work in the United States—by investigating the GitHub account superredstar, which Nisos previously linked to a likely DPRK-affiliated network of remote worker personas. [1] The GitHub account superredstar was used to create a resume website for Karl Chong via GitHub in April 2022.[2] Karl Chong claims to be from Singapore and appears to be employed as a remote MERN Stack Developer at US-based Mongrov Inc since May 2023. Karl Chong has several freelancer accounts, which claim that he is located in the United States and Turkey. A review of the Karl Chong accounts and website revealed several tactics, techniques, and procedures (TTPs) previously associated with the DPRK employment scheme, including fake profile pictures, a lack of consistency of information across all accounts, the persona claiming to have experience developing web and mobile applications, knowledge of multiple programming languages, and reused resume content from other personas.

Fake Profile Photo

Karl Chong’s website and freelancer accounts use the photo featured in Graphics 2-4, which is available for purchase on a number of stock photo websites. Nisos assesses that likely DPRK IT workers used this method to hide their true identities before using possible AI-enabled tooling to merge their faces onto pictures of other individuals.

graphic 2: Photo from Karl Chong’s website
Graphic 2: Photo from Karl Chong’s website. [3]
graphic 3: Stock Photo used in Graphic 2
Graphic 3: Stock Photo used in Graphic 2. [4]
Graphic 4: Mongrov Inc’s website.
Graphic 4: Mongrov Inc’s website.[5]

Misaligned locations

Karl Chong claims to be located in Singapore, the United States, and Turkey on his various online resumes. Nisos assesses that the same persona is used to seek employment in different countries, which is why the persona’s stated locations vary.

graphic 5: Claimed location in the United States
Graphic 5: Claimed location in the United States. [6]
graphic 6: Claimed location in Singapore
Graphic 6: Claimed location in Singapore. [7]
Graphic 7: Claimed location in Turkey.
Graphic 7: Claimed location in Turkey. [8]

Reused Resume Content

Nisos found that Karl Chong’s resume referenced the same employment history as another likely DPRK-affiliated persona, Naoyuki Tanaka, who appears to have been employed at Enver Studio. [9] Nisos assesses that likely DPRK IT workers reuse GitHub accounts and work portfolios to backstop their newly created personas. Additionally, another fake persona, Roman Kryveha, reused Karl Chong’s about me intro paragraph from his resume and his stock photo.

graphic 8: Karl Chong’s about me section
Graphic 8: Karl Chong’s about me section. [10]
Graphic 9: Roman Kryveha’s about me section.
Graphic 10: Karl Chong’s resume lists work at Enver Studio.
Graphic 10: Karl Chong’s resume lists work at Enver Studio. [11]

Significant Development Experience

Karl Chong lists a number of programming languages and certificates on his website. He also claims to have seven years of experience in front and back-end web development.

Graphic 11: Karl Chong’s claimed skills.
Graphic 10: Karl Chong’s resume lists work at Enver Studio. [11]

Freelancer Employment Websites Linked To Karl Chong

Nisos identified four freelance employment websites, which listed the persona name, location, GitHub, and work history of the persona. Many of the resumes indicated that Karl Chong worked at Overflow and studied at Singapore University of Technology and Design. The persona’s profiles on freelancer websites include:

  • https://remoteok[.]com/@karlchong
  • https://laborx[.]com/freelancers/users/id100369
  • https://www.remotehub[.]com/karl.chong
  • https://www.xing[.]com/profile/Karl_Chong
To obtain the complete research report, including endnotes, please click the button below.

About Nisos®

Nisos is the Managed Intelligence Company. We are a trusted digital investigations partner, specializing in unmasking threats to protect people, organizations, and their digital ecosystems in the commercial and public sectors. Our open source intelligence services help security, intelligence, legal, and trust and safety teams make critical decisions, impose real world consequences, and increase adversary costs. For more information, visit: https://nisos.com.