Amazon Blocked 1,800 North Korean It Infiltration Attempts

Amazon blocked 1800 North Korean IT infiltration attempts

Amazon’s security chief says the company stopped more than 1,800 suspected DPRK-linked hiring attempts, as governments and firms warn the “fake remote worker” threat is growing.​

Lead

Amazon says it has identified and blocked more than 1,800 attempts by North Korea-linked operatives to land IT roles at the company, according to comments from Amazon Chief Security Officer Steve Schmidt at an Amazon-hosted event this week. The disclosure adds detail to a broader, fast-evolving threat: North Korean “remote IT worker” schemes that use fake or stolen identities to obtain legitimate jobs, access company systems, and generate revenue for Pyongyang.​

What Amazon reported

Schmidt said Amazon’s teams have “identified and blocked more than 1,800” suspected North Korea attempts to secure IT positions at Amazon. He also described the activity as “prolific” and warned that many organizations underestimate organized efforts to get people hired specifically to reach valuable data.​

Amazon’s security chief linked the risk to roles that can provide access to sensitive systems and highly valuable information, pointing to the attractiveness of well-paid positions—particularly around AI/ML work—and the “troves of valuable data” those roles can touch. Amazon also said it has seen a 27% quarter-over-quarter increase in the number of suspected North Korean applications during 2025.​

Schmidt described how the playbook has shifted over time—from fully fabricated online personas to the use of identities purchased from Americans with legitimate backgrounds—making fraud harder to spot using traditional résumé screening alone.​

How the infiltration attempts work

Industry and government reporting describes a consistent pattern: operators apply for remote IT jobs using fraudulent identities, get hired, and then work from outside the target country while appearing to be local—sometimes with help from facilitators. In some cases, facilitators physically host corporate laptops (commonly described as “laptop farms”) so overseas workers can remotely access employer-issued devices while geolocating as if they are inside the U.S.​

The U.S. Department of Justice has publicly described these schemes as involving North Korean individuals fraudulently obtaining remote IT employment at U.S. companies using stolen and fake identities. The Record reported that the DOJ and FBI described laptop-farm activity enabling North Koreans to illegally work at more than 100 U.S. companies, with some incidents involving access to sensitive employer data and source code, including ITAR-related data at a defense contractor.​

The FBI has also warned that, once discovered on networks, some North Korean IT workers have escalated into data extortion—stealing proprietary information (including source code) and threatening to release it unless paid. The FBI warning specifically noted that workers have copied company code repositories (for example, GitHub repositories) to personal accounts and cloud storage, creating large-scale intellectual-property risk.​

Key timeline and signals

The Amazon disclosure arrives amid a steady cadence of public warnings, enforcement actions, and threat-intelligence reporting tied to North Korean remote-worker tactics.​

Date (published) What happened Why it matters
June 30, 2025 Microsoft Threat Intelligence reported tracking North Korean remote IT worker activity as “Jasper Sleet” and said it suspended 3,000 Microsoft consumer accounts created by North Korean IT workers. ​ Shows scale and the use of mainstream consumer platforms in the identity-and-application pipeline. ​
June 29, 2025 The Record reported DOJ action targeting “laptop farms,” saying FBI officials believed the farms enabled illegal work at more than 100 U.S. companies and describing cases involving sensitive data and source code exposure. ​ Highlights how physical infrastructure inside the U.S. can make remote infiltration look legitimate to employers. ​
July 2, 2025 DOJ announced coordinated nationwide actions to combat North Korean remote IT worker schemes using stolen/fake identities to gain employment with U.S. companies. ​ Signals a whole-of-government disruption approach, not just corporate defenses. ​
Dec. 16, 2025 Amazon CSO Steve Schmidt said Amazon blocked more than 1,800 suspected North Korean attempts to secure IT roles, and described the activity as prolific. ​ One of the clearest big-tech datapoints quantifying attempted hiring-based intrusion at a single firm. ​

How Amazon says it detects attempts

Amazon says its defenses combine automation and human review, and Schmidt said the company has refined parts of this process over the past two years. He described AI-enabled tools trained to look for suspicious patterns, alongside human-led prevention efforts that validate identity and detect anomalous signals.​

Schmidt gave concrete examples of indicators Amazon looks for, including how some operatives list contact details—such as using a plus symbol at the front of a phone number, which he said most Americans do not do. He also said Amazon has identified roughly 200 academic institutions that show up repeatedly on résumés used by suspected IT worker operatives.​

More broadly, Amazon described deploying AI to speed up security analysis work and to spot suspicious activity at scale, reflecting how large platforms are trying to meet automation with automation.​

Why this threat is rising across the tech sector

Threat reporting suggests the “North Korean IT worker” model is expanding in reach and efficiency, partly because remote work has normalized distributed engineering teams and cross-border contracting. Fortune reported that CrowdStrike observed a sharp rise in companies unknowingly hiring North Korean software developers, describing a 220% increase over 12 months and estimating infiltration into more than 320 companies in that period.​

The operational incentives are clear: these jobs can generate steady salary income and offer pathways to sensitive access, including source code, credentials, and internal documentation. As the DOJ has described, the schemes can involve identity theft and organized facilitation to bypass background checks and appear legitimate during onboarding.​

The risk is not limited to payroll fraud, because access to code repositories and internal systems can open doors to follow-on compromise, intellectual-property theft, or extortion—outcomes the FBI has explicitly warned about.​

What companies can do now

Security and law-enforcement reporting points to a practical takeaway: hiring is now part of the security perimeter, and defenses must cover identity proofing, device logistics, and continuous monitoring. Steps commonly emphasized across these reports include verifying identity and location at multiple points (not only at offer stage), scrutinizing patterns in contact information and résumé metadata, and monitoring for unusual code-repository behavior such as large-scale copying or unexpected uploads to personal accounts.​

Organizations can also reduce exposure by tightening controls around employer-issued laptops (shipping, custody, and verification), and by implementing monitoring that detects remote-access tooling patterns consistent with “laptop farm” enablement described in DOJ-linked reporting. Finally, firms should ensure incident-response and legal processes are prepared for extortion scenarios, because the FBI has warned that stolen proprietary data and code have been used as leverage for ransom demands and, in some cases, public release threats.​

What happens next

Amazon’s report that it blocked 1,800 suspected North Korean IT infiltration attempts underscores how aggressively the DPRK-linked remote-worker pipeline is targeting high-trust technical roles at major companies. With Microsoft describing thousands of consumer accounts tied to the ecosystem and DOJ actions targeting facilitators and laptop farms, the public record increasingly shows a full-stack operation spanning identity fraud, infrastructure, and post-hire data risk.​

For employers, the implication is straightforward: robust hiring verification, tighter device controls, and monitoring for data-exfiltration and code-theft behaviors are now essential to protecting systems—because the “intruder” may arrive through onboarding, not a phishing email.​


Subscribe to Our Newsletter

Related Articles

Top Trending

2026,The Year of Analogue
2026: The Year of Analogue and Why People Are Ditching Screens for Paper
Share Of Model: New SEO metric
Measuring "Share of Model": The New SEO Metric! [Discover the Game-Changer]
Programmatic SEO
Programmatic SEO in 2026: Quality Control at Scale! [Transform Your Strategy]
about naolozut253
About Naolozut253: A Professional Guide to Understanding, Context, and Best Practices
Model XUCVIHKDS Number
Understanding Model XUCVIHKDS Number: A Professional Framework for Identification and Compliance

Fintech & Finance

Best automated investing apps
Top 6 Apps for Automated Investing and Micro-Savings
7 Best Neobanks for Cashback Rewards in 2026
7 Neobanks Offering the Best Cashback Rewards in 2026
10 Influential Crypto Voices to Follow in 2026
10 Most Influential Crypto Voices to Follow in 2026: The Ultimate Watchlist
10 Best No-Foreign-Transaction-Fee Cards for Travelers
10 Best No-Foreign Transaction-Fee Credit Cards for Travelers
Best Business Credit Cards for Ecommerce
Top 5 Business Credit Cards for E-commerce Owners

Sustainability & Living

top renewable energy cities 2026
10 Cities Leading the Renewable Energy Transition
Editorialge Eco Valentine T-shirts
Wear Your Heart Green: Editorialge Eco Valentine T-Shirts & Hoodies Review
Top 5 Portable Solar Generators for Camping in 2026
Top 5 Portable Solar Generators for Camping in 2026: Field-Tested Reviews
Water-Saving Habits
Water-Saving Habits That Actually Make a Difference: Transform Your Life!
clean tech breakthroughs
The Top 6 Clean Tech Breakthroughs from Late 2025 You Probably Missed!

GAMING

best gaming chairs for posture
The 6 Best Gaming Chairs for Posture Support in 2026
15 Cozy Games to Start Your New Year Relaxed
15 Cozy Games to Start the New Year Relaxed and Happy
console quality mobile games
5 Mobile Games That Actually Feel Like Console Experiences of 2026
best monitors for RTX 5000 series
Top 10 Gaming Monitors for the New Graphics Cards of 2026
Narrative Design hero's journey
Narrative Design in 2026: Moving Beyond the "Hero's Journey"! A Revolution Awaits!

Business & Marketing

Best Business Credit Cards for Ecommerce
Top 5 Business Credit Cards for E-commerce Owners
Top 6 Marketing Automation Tools With Best AI Integration
Top 6 Marketing Automation Tools With Best AI Integration
Corporate Social Responsibility
Corporate Social Responsibility: Why Employees Demand Action, Not Words
8 SaaS Trends Watching Out for in Q1 2026
8 Defining SaaS Trends to Watch in Q1 2026
How To Win Chargebacks
Mastering Dispute Resolution: How to Win Chargebacks in 2026 [Insider Tips]

Technology & AI

Best water filtration systems
The 4 Best Water Filtration Systems for You and Your Family
Best dedicated server providers for high-traffic sites
The 5 Best Dedicated Server Providers for High-Traffic Sites in 2026
Best crypto tax software
The 5 Best Crypto Tax Software Tools for the 2025 Tax Year. No More Mistakes
How to Install Mozillod5.2f5
Step-by-Step Guide: How to Install Mozillod5.2f5 and Firefox Successfully
best monitors for RTX 5000 series
Top 10 Gaming Monitors for the New Graphics Cards of 2026

Fitness & Wellness

2026,The Year of Analogue
2026: The Year of Analogue and Why People Are Ditching Screens for Paper
Anti-Fragile Mindset
How to Build an "Anti-Fragile" Mindset for Uncertain Times? Thrive in Chaos!
Benefits of Slow Living in 2026
Why "Slow Living" Is The Antidote To 2026 Burnout: Revive Yourself!
JOMO outperforming FOMO
The Joy of Missing Out: Why JOMO is Outperforming FOMO in 2026
Dopamine Detox
Dopamine Detox 2.0: Reclaiming Attention in an Algorithm-Heavy World