← Back to Tech & Science

North Korea-Linked Hackers Exploit AI Personas to Infiltrate Remote Workforces

Tech & ScienceAI-Generated & Algorithmically Scored·

AI-generated from multiple sources. Verify before acting on this reporting.

SEOUL — A North Korea-aligned cyber threat actor known as Jasper Sleet is exploiting remote work hiring practices by using artificial intelligence to create fake digital personas and infiltrate organizations as legitimate IT workers through human resources software platforms.

The campaign, identified on Monday, targets global companies utilizing hybrid or fully remote work models. The threat actors are leveraging AI-generated identities to bypass standard hiring protocols on enterprise HR SaaS platforms, successfully embedding themselves within corporate networks under the guise of trusted employees.

Security researchers indicate the operation is designed to gain trusted access to internal systems. Once inside, the actors aim to generate revenue and enable data theft, extortion, or further compromise of organizational infrastructure. The use of sophisticated AI tools allows the creation of convincing digital footprints, including resumes, social media profiles, and communication histories that mimic genuine candidates.

The attack vector specifically targets the reliance of modern enterprises on digital hiring pipelines. By inserting themselves into these workflows, the threat actors avoid the scrutiny typically applied to external contractors or new hires who undergo physical onboarding. This method grants them immediate access to sensitive IT environments, often with elevated privileges required for system maintenance or support roles.

The Jasper Sleet group has been previously linked to state-sponsored cyber espionage and financial theft operations. This latest development marks a shift toward exploiting the structural vulnerabilities of the post-pandemic workforce. As organizations continue to prioritize remote talent acquisition, the attack surface for social engineering and identity fraud has expanded significantly.

Experts warn that traditional security measures may be insufficient against this type of threat. The AI-generated personas are designed to withstand background checks and automated verification processes. The infiltration occurs at the point of hire, meaning the threat actor is already inside the network perimeter before security teams can detect the anomaly.

The scope of the campaign remains unclear, with no specific organizations publicly confirmed as targets. However, the global nature of remote work suggests that any company utilizing digital hiring platforms could be vulnerable. Security firms are advising organizations to enhance verification procedures for remote hires and implement stricter identity management protocols.

Questions remain regarding the full extent of the compromised identities and whether any data has already been exfiltrated. The sophistication of the AI tools used suggests a well-resourced operation with significant technical capabilities. As the investigation continues, the potential for widespread disruption to corporate networks remains a critical concern for cybersecurity professionals worldwide.