Amazon Blocked 1,800 North Korean It Infiltration Attempts

Amazon blocked 1800 North Korean IT infiltration attempts

Amazon’s security chief says the company stopped more than 1,800 suspected DPRK-linked hiring attempts, as governments and firms warn the “fake remote worker” threat is growing.​

Lead

Amazon says it has identified and blocked more than 1,800 attempts by North Korea-linked operatives to land IT roles at the company, according to comments from Amazon Chief Security Officer Steve Schmidt at an Amazon-hosted event this week. The disclosure adds detail to a broader, fast-evolving threat: North Korean “remote IT worker” schemes that use fake or stolen identities to obtain legitimate jobs, access company systems, and generate revenue for Pyongyang.​

What Amazon reported

Schmidt said Amazon’s teams have “identified and blocked more than 1,800” suspected North Korea attempts to secure IT positions at Amazon. He also described the activity as “prolific” and warned that many organizations underestimate organized efforts to get people hired specifically to reach valuable data.​

Amazon’s security chief linked the risk to roles that can provide access to sensitive systems and highly valuable information, pointing to the attractiveness of well-paid positions—particularly around AI/ML work—and the “troves of valuable data” those roles can touch. Amazon also said it has seen a 27% quarter-over-quarter increase in the number of suspected North Korean applications during 2025.​

Schmidt described how the playbook has shifted over time—from fully fabricated online personas to the use of identities purchased from Americans with legitimate backgrounds—making fraud harder to spot using traditional résumé screening alone.​

How the infiltration attempts work

Industry and government reporting describes a consistent pattern: operators apply for remote IT jobs using fraudulent identities, get hired, and then work from outside the target country while appearing to be local—sometimes with help from facilitators. In some cases, facilitators physically host corporate laptops (commonly described as “laptop farms”) so overseas workers can remotely access employer-issued devices while geolocating as if they are inside the U.S.​

The U.S. Department of Justice has publicly described these schemes as involving North Korean individuals fraudulently obtaining remote IT employment at U.S. companies using stolen and fake identities. The Record reported that the DOJ and FBI described laptop-farm activity enabling North Koreans to illegally work at more than 100 U.S. companies, with some incidents involving access to sensitive employer data and source code, including ITAR-related data at a defense contractor.​

The FBI has also warned that, once discovered on networks, some North Korean IT workers have escalated into data extortion—stealing proprietary information (including source code) and threatening to release it unless paid. The FBI warning specifically noted that workers have copied company code repositories (for example, GitHub repositories) to personal accounts and cloud storage, creating large-scale intellectual-property risk.​

Key timeline and signals

The Amazon disclosure arrives amid a steady cadence of public warnings, enforcement actions, and threat-intelligence reporting tied to North Korean remote-worker tactics.​

Date (published) What happened Why it matters
June 30, 2025 Microsoft Threat Intelligence reported tracking North Korean remote IT worker activity as “Jasper Sleet” and said it suspended 3,000 Microsoft consumer accounts created by North Korean IT workers. ​ Shows scale and the use of mainstream consumer platforms in the identity-and-application pipeline. ​
June 29, 2025 The Record reported DOJ action targeting “laptop farms,” saying FBI officials believed the farms enabled illegal work at more than 100 U.S. companies and describing cases involving sensitive data and source code exposure. ​ Highlights how physical infrastructure inside the U.S. can make remote infiltration look legitimate to employers. ​
July 2, 2025 DOJ announced coordinated nationwide actions to combat North Korean remote IT worker schemes using stolen/fake identities to gain employment with U.S. companies. ​ Signals a whole-of-government disruption approach, not just corporate defenses. ​
Dec. 16, 2025 Amazon CSO Steve Schmidt said Amazon blocked more than 1,800 suspected North Korean attempts to secure IT roles, and described the activity as prolific. ​ One of the clearest big-tech datapoints quantifying attempted hiring-based intrusion at a single firm. ​

How Amazon says it detects attempts

Amazon says its defenses combine automation and human review, and Schmidt said the company has refined parts of this process over the past two years. He described AI-enabled tools trained to look for suspicious patterns, alongside human-led prevention efforts that validate identity and detect anomalous signals.​

Schmidt gave concrete examples of indicators Amazon looks for, including how some operatives list contact details—such as using a plus symbol at the front of a phone number, which he said most Americans do not do. He also said Amazon has identified roughly 200 academic institutions that show up repeatedly on résumés used by suspected IT worker operatives.​

More broadly, Amazon described deploying AI to speed up security analysis work and to spot suspicious activity at scale, reflecting how large platforms are trying to meet automation with automation.​

Why this threat is rising across the tech sector

Threat reporting suggests the “North Korean IT worker” model is expanding in reach and efficiency, partly because remote work has normalized distributed engineering teams and cross-border contracting. Fortune reported that CrowdStrike observed a sharp rise in companies unknowingly hiring North Korean software developers, describing a 220% increase over 12 months and estimating infiltration into more than 320 companies in that period.​

The operational incentives are clear: these jobs can generate steady salary income and offer pathways to sensitive access, including source code, credentials, and internal documentation. As the DOJ has described, the schemes can involve identity theft and organized facilitation to bypass background checks and appear legitimate during onboarding.​

The risk is not limited to payroll fraud, because access to code repositories and internal systems can open doors to follow-on compromise, intellectual-property theft, or extortion—outcomes the FBI has explicitly warned about.​

What companies can do now

Security and law-enforcement reporting points to a practical takeaway: hiring is now part of the security perimeter, and defenses must cover identity proofing, device logistics, and continuous monitoring. Steps commonly emphasized across these reports include verifying identity and location at multiple points (not only at offer stage), scrutinizing patterns in contact information and résumé metadata, and monitoring for unusual code-repository behavior such as large-scale copying or unexpected uploads to personal accounts.​

Organizations can also reduce exposure by tightening controls around employer-issued laptops (shipping, custody, and verification), and by implementing monitoring that detects remote-access tooling patterns consistent with “laptop farm” enablement described in DOJ-linked reporting. Finally, firms should ensure incident-response and legal processes are prepared for extortion scenarios, because the FBI has warned that stolen proprietary data and code have been used as leverage for ransom demands and, in some cases, public release threats.​

What happens next

Amazon’s report that it blocked 1,800 suspected North Korean IT infiltration attempts underscores how aggressively the DPRK-linked remote-worker pipeline is targeting high-trust technical roles at major companies. With Microsoft describing thousands of consumer accounts tied to the ecosystem and DOJ actions targeting facilitators and laptop farms, the public record increasingly shows a full-stack operation spanning identity fraud, infrastructure, and post-hire data risk.​

For employers, the implication is straightforward: robust hiring verification, tighter device controls, and monitoring for data-exfiltration and code-theft behaviors are now essential to protecting systems—because the “intruder” may arrive through onboarding, not a phishing email.​


Subscribe to Our Newsletter

Related Articles

Top Trending

Resident Evil Requiem Switch 2
Resident Evil Requiem: First Look at "Open City" Gameplay on Switch 2
Somalia UN Security Council Presidency 2026
Geopolitics 2026: Somalia Takes UN Security Council Presidency Amid Shifts
Solid-State Battery
Solid-State Battery Breakthroughs: ProLogium & Toyota’s New Timeline
LG CLOiD Home Robot
CES 2026: LG CLOiD & The Rise of the "Zero-Labor" Home Robot
Google Gemini vs ChatGPT Market Shift
Google Gemini Surges As ChatGPT Traffic Drops: Inside the 19% Market Share Shift

LIFESTYLE

Benefits of Living in an Eco-Friendly Community featured image
Go Green Together: 12 Benefits of Living in an Eco-Friendly Community!
Happy new year 2026 global celebration
Happy New Year 2026: Celebrate Around the World With Global Traditions
dubai beach day itinerary
From Sunrise Yoga to Sunset Cocktails: The Perfect Beach Day Itinerary – Your Step-by-Step Guide to a Day by the Water
Ford F-150 Vs Ram 1500 Vs Chevy Silverado
The "Big 3" Battle: 10 Key Differences Between the Ford F-150, Ram 1500, and Chevy Silverado
Zytescintizivad Spread Taking Over Modern Kitchens
Zytescintizivad Spread: A New Superfood Taking Over Modern Kitchens

Entertainment

MrBeast Copyright Gambit
Beyond The Paywall: The MrBeast Copyright Gambit And The New Rules Of Co-Streaming Ownership
Stranger Things Finale Crashes Netflix
Stranger Things Finale Draws 137M Views, Crashes Netflix
Demon Slayer Infinity Castle Part 2 release date
Demon Slayer Infinity Castle Part 2 Release Date: Crunchyroll Denies Sequel Timing Rumors
BTS New Album 20 March 2026
BTS to Release New Album March 20, 2026
Dhurandhar box office collection
Dhurandhar Crosses Rs 728 Crore, Becomes Highest-Grossing Bollywood Film

GAMING

Resident Evil Requiem Switch 2
Resident Evil Requiem: First Look at "Open City" Gameplay on Switch 2
High-performance gaming setup with clear monitor display and low-latency peripherals. n Improve Your Gaming Performance Instantly
Improve Your Gaming Performance Instantly: 10 Fast Fixes That Actually Work
Learning Games for Toddlers
Learning Games For Toddlers: Top 10 Ad-Free Educational Games For 2026
Gamification In Education
Screen Time That Counts: Why Gamification Is the Future of Learning
10 Ways 5G Will Transform Mobile Gaming and Streaming
10 Ways 5G Will Transform Mobile Gaming and Streaming

BUSINESS

India Rice Exports
India’s Rice Dominance: How Strategic Export Shifts are Reshaping South Asian Trade in 2026
Mistakes to Avoid When Seeking Small Business Funding featured image
15 Mistakes to Avoid As New Entrepreneurs When Seeking Small Business Funding
Global stock markets break record highs featured image
Global Stock Markets Surge to Record Highs Across Continents: What’s Powering the Rally—and What Could Break It
Embodied Intelligence
Beyond Screen-Bound AI: How Embodied Intelligence is Reshaping Industrial Logistics in 2026
Canada Gulf Digital Services Corridor
Beyond The Headlines: Canada Gulf Digital Services Corridor In 2026

TECHNOLOGY

LG CLOiD Home Robot
CES 2026: LG CLOiD & The Rise of the "Zero-Labor" Home Robot
Google Gemini vs ChatGPT Market Shift
Google Gemini Surges As ChatGPT Traffic Drops: Inside the 19% Market Share Shift
Libra Legal AI Workspace
Agentic AI in Legal Workflows: The Strategic Launch of the Libra Legal AI Workspace
Digital illustration displaying 12 key space science innovations, including reusable rockets and lunar bases, orbiting a glowing Earth.
12 Game Changing Space Science Innovations Shaping Tomorrow
Embodied Intelligence
Beyond Screen-Bound AI: How Embodied Intelligence is Reshaping Industrial Logistics in 2026

HEALTH

A health worker registers an elderly patient using a laptop at a rural health clinic in Africa
Digital Health Sovereignty: The 2026 Push for National Digital Health Records in Rural Economies
Digital Detox for Kids
Digital Detox for Kids: Balancing Online Play With Outdoor Fun [2026 Guide]
Worlds Heaviest Man Dies
Former World's Heaviest Man Dies at 41: 1,322-Pound Weight Led to Fatal Kidney Infection
Biomimetic Brain Model Reveals Error-Predicting Neurons
Biomimetic Brain Model Reveals Error-Predicting Neurons
Long COVID Neurological Symptoms May Affect Millions
Long COVID Neurological Symptoms May Affect Millions