Amazon blocks 1,800 North Korean applicants amid cybersecurity concerns US tech giant Amazon has blocked more than 1,800 North Koreans from applying for jobs, as Pyongyang increasingly sends IT workers abroad to generate and launder funds. https://lnkd.in/enktpEE3
Amazon Blocks 1800 North Korean Job Applicants Over Cybersecurity Concerns
More Relevant Posts
-
Amazon said it blocked over 1,800 job applications linked to North Korean actors using fake identities to target remote tech roles. The case shows how remote hiring can be exploited as a cyber and fraud entry point, with implications for sanctions and systems security. What possible red flags can an underwriter identify? - Hirers rely only CVs, emails or self-declared information only. - No geo-fencing for remote hires. What supporting questions can an underwriter possibly ask? - How do you verify the true identity of candidates for remote roles? e.g. government-issued IDs, biometric checks, live video verification. - Are third-party screening vendors used and how are they vetted? - Are screening standards consistent across jurisdiction? - How do you verify the physical location of remote staff during onboarding and ongoing employment? https://lnkd.in/gnUWGtPH #FinancialLines #CyberInsurance #InsuranceUnderwriting #SingaporeInsurance #APACInsurance
To view or add a comment, sign in
-
Amazon Uses AI Security to Halt 1,800 North Korean Job Fraud Schemes #artificialintelligence #career Source: https://ift.tt/Y1cRAiE In a recent blog post, we explore Amazon's decisive actions to combat over 1,800 fraudulent job applications linked to North Korean operatives impersonating IT professionals. This significant achievement was highlighted by Stephen Schmidt, Amazon's Chief Information Security Officer, who shared insights on the advanced AI security measures implemented to detect and prevent these scams. The implications of this issue are far-reaching, as these operatives aim to secure employment and divert their earnings to fund illicit activities. With a marked increase in suspicious applications and the use of compromised credentials, it is more critical than ever for organizations to adopt robust security protocols. As we delve deeper into this topic, the article examines Amazon's AI-driven screening techniques, the heightened government response to this emerging threat, and the potential risks that companies face by not prioritizing advanced measures. To understand how the intersection of AI security and remote employment impacts our global landscape, read the full post here: [Amazon Uses AI Security to Halt 1800 North Korean Job Fraud Schemes](https://ift.tt/Y1cRAiE) #rswebsols #Amazon # AISecurity #NorthKorea #JobFraud #Cybersecurity
To view or add a comment, sign in
-
-
Amazon identified and blocked 1,800 North Korean IT workers using fraudulent credentials. If Amazon possessing enterprise-grade verification systems can detect this at scale, organizations with conventional HR processes cannot. The threat is adversary-sponsored employment where workers gain legitimate access to corporate systems, codebases, and sensitive data while generating revenue for sanctioned regimes. For CISOs and HR executives, this reveals detection asymmetry. Remote workforce expansion occurred without corresponding investment in identity validation infrastructure. North Korean schemes exploit this gap using stolen identities and intermediaries that defeat standard background verification. Amazon's detection suggests significant resources dedicated to adversarial hiring prevention. Most organizations lack equivalent capabilities. The governance question is whether your hiring security assumes conventional fraud detection suffices or accounts for state-sponsored operations specifically designed to bypass standard employment screening. #InsiderThreat #HiringRisk #EnterpriseRisk https://lnkd.in/gY3f3uJB
To view or add a comment, sign in
-
How do you take down a country-scale company without hacking anything? You just act like an employee. For five months (!), Coupang - South Korea’s Amazon - didn’t know an insider was siphoning off data at a national scale. Here’s what we know: While still employed, an insider exfiltrated a signing key. That key was never rotated. It allowed him to mint valid tokens long after his departure - skipping passwords, MFA, and the standard login process. The result was a complete catastrophe: • 33.7 million accounts exposed. • $1.1B+ in compensation. • The CEO stepping down. So where did the security model fail? Zero Trust can only go so far. Employees must have access to sensitive data to do their jobs. The real question isn't just authenticating the user, but understanding what they do after they're in. The initial theft of the signing key was a data exfiltration event. No doubt the company's DLP fired an alert, but it probably looked like every other file transfer - another needle in a haystack of false positives. The system had no context. It couldn't tell the difference between routine work and the single action that would bring the company to its knees. A tale as old as time. I hear it from customers all the time. This is the core failure of DLP tools. They force your team to operate on a foundation of hope that resembles trust. You hope someone will spot the one critical alert among the 10,000 others. You hope the context is obvious. But hope is not a strategy. Incidents like this don't just cause data loss. They cause organizational paralysis. Leadership stops thinking about growth and starts making decisions out of fear. Every employee with access becomes a potential liability. Coupang couldn't tell the difference between work and the warning signs of a catastrophe. Could you?
To view or add a comment, sign in
-
-
Amazon says AI-led screening helped block North Korean operatives seeking remote jobs to channel wages to the regime. Read more: https://buff.ly/t07d5V5 (Source: Business Insider) #Amazon #CyberSecurity #RemoteWork #HiringRisk #AIinHR #GlobalWorkforce
To view or add a comment, sign in
-
-
This is a sobering read. While remote work and global hiring have brought efficiency and flexibility, they have also significantly increased the complexity of identity verification and security governance. The “laptop farm” and identity fraud tactics mentioned here go beyond hiring issues at a single company and point to broader risks around compliance, data security, and trust across the industry. Amazon’s approach of combining AI-based screening with human verification highlights an important reality: even the most advanced automation still requires human judgment to catch subtle anomalies and edge cases. This feels less like a recruiting challenge and more like a core part of enterprise security and risk management going forward.
To view or add a comment, sign in
-
I recently wrote a paper related to this topic and the rise of fraudulent job applicants, especially in tech and finance roles. While AI increases efficiencies within organizations, it also creates more opportunities for candidates to misrepresent themselves in the hiring process. Enhanced security measures are crucial to help recruiters identify and disengage with fraudulent applicants, and to protect companies from enterprise-wide risk. https://lnkd.in/gdpr_4mp
To view or add a comment, sign in
-
North Korean fraudsters follow predictable scripts. They fabricate histories tied to obscure overseas consultancies tough to verify from afar, often listing the same feeder schools and firms. Red flags include mangled English idioms or article usage (“a,” “an,” “the”). “If we hadn’t been looking for the DPRK workers, we would not have found them,” Schmidt warned. Amazon expelled the impersonator within days. Schmidt urged for more thorough vetting than just LinkedIn scans: comprehensive background checks, along with strong endpoint security that detects anomalies like keystroke latency, reports Bloomberg. For cybersecurity pros, the lesson cuts deep. Latency analysis, behavioral monitoring, and traffic forensics aren’t just for threat hunters—they’re frontline defenses against nation-state grifters. In a remote-work era, every lag counts.
A slight delay in keystrokes from a supposed U.S.-based IT worker alerted Amazon to a North Korean infiltrator accessing a corporate laptop. The commands that should have zipped from the worker’s machine to Amazon’s Seattle headquarters in under 100 milliseconds instead trickled in after more than 110 milliseconds, a subtle clue indicating a connection “half a world away,” as revealed by Amazon Chief Security Officer Stephen Schmidt in a recent interview. This North Korean operative, hired through a contractor, exemplifies the DPRK’s brazen surge into remote IT jobs. Sanctioned by the U.S. and allies, Pyongyang utilizes these scams to funnel cash into weapons programs and evade isolation. DPRK workers infiltrate roles at small firms and tech giants alike, creating legal headaches and insider threats. Since April 2024, Amazon’s team has thwarted over 1,800 such hiring attempts, with attempts spiking 27% quarter-over-quarter this year. Schmidt emphasized that “Amazon didn’t hire any North Koreans directly,” but the act of shipping a company laptop to a contractor proxy for DPRK operatives serves as a stark warning for all. Security monitoring flagged odd behavior on the systems admin’s laptop, revealing a remote control traced to China. For more details, visit the full article here: https://lnkd.in/eY_6FKuZ
To view or add a comment, sign in
-
Scale shouldn't mean "More People." In the Indian tech landscape, we’ve been taught that to grow, we must hire. But in Security and Ops, hiring your way out of a data deluge is a losing game. If your "Modern SOC" requires a linear increase in headcount to handle a linear increase in alerts, you aren't scaling—you’re just inflating. True scale is found in Resolution Intelligence. Build systems that think, so your people can lead. #cybersecurity #Efficiency #ScaleUp #security
To view or add a comment, sign in