https://cloud.google.com/blog/topics/threat-intelligence/mitigating-dprk-it-worker-threat
https://edition.cnn.com/2024/08/08/politics/north-korea-fraud-tennessee-man-arrested/index.html
https://theravenfile.com/2025/08/28/dprk-it-workers-unveiled/
United States v. Sim Hyon-Sop, Qin Haiying, and Yan Shuang - Indictment - https://www.justice.gov/usao-dc/press-release/file/1581281/dl United States v. Christina Chapman, Jiho Han, Haoran Xu, Chunji Jin - Indictment - https://www.justice.gov/archives/usao-dc/media/1352191/dl United States v. Jong Song Hwa, Ri Kyong Sik, Kim Ryu Song, Rim Un Chol, Kim Mu Rim, Cho Chung Pom, Hyon Chol Song, Son Un Chol, Sok Kwang Hyok, Choe Jong Yong, Ko Chung Sok, Kim Ye Won, Jong Kyong Chol, and Jang Chol Myong - Indictment - https://www.justice.gov/opa/media/1380081/dl United States v. Jin Sung-Il, Pedro Ernesto Alonso de los Reyes, Erick Ntekereze Prince, Pak Jin-Song, and Emanuel Ashtor - Indictment - https://www.justice.gov/opa/media/1386281/dl Verified Complaint for Forfeiture In Rem - https://www.justice.gov/usao-dc/media/1402691/dl Inside the Scam: North Korea's IT Worker Threat - https://go.recordedfuture.com/hubfs/reports/cta-nk-2025-0213.pdf Exposing DPRK's Cyber Syndicate and Hidden IT Workforce - https://reports.dtexsystems.com/DTEX-Exposing%2BDPRK%2BCyber%2BSyndicate%2Band%2BHidden%2BIT%2BWorkforce.pdf Inside the Shadow Network - https://content.striderintel.com/wp-content/uploads/2025/05/Strider-Inside-Shadow-Network-Report.pdf Guidance on the Democratic People's Republic of Korea Information Technology Workers - https://ofac.treasury.gov/media/923126/download?inline Advisory on North Korean IT Workers - https://assets.publishing.service.gov.uk/media/66e2ec410d913026165c3d91/OFSI_Advisory_on_North_Korean_IT_Workers.pdf Global Companies Are Unknowingly Paying North Koreans - https://unit42.paloaltonetworks.com/north-korean-it-workers/ Fake North Korean IT Worker Linked to BeaverTail Video Conference Malware - https://unit42.paloaltonetworks.com/fake-north-korean-it-worker-activity-cluster/ Unmasking North Korea's Digital Deception - https://www.gov.il/BlobFolder/reports/alert_1813/en/ALERT-CERT-IL-W-1814.pdf North Korea's Pursuit of Coercive Leverage in the Information Age - https://www.kjis.org/journal/download_pdf.php?doi=10.14731/kjis.2025.08.23.2.331 Dispatched: Mapping Overseas Forced Labor in North Korea’s Proliferation Finance System - https://c4ads.org/wp-content/uploads/2022/05/Dispatched-Report.pdf The Shadow Sector: North Korea's Information Technology Networks - https://www.nonproliferation.org/wp-content/uploads/2018/05/op36-the-shadow-sector.pdf North Korea's Cybercrimes Pay for Weapons Programs and Luxury Goods for Its Ruling Elite - https://www.heritage.org/sites/default/files/2023-09/BG3790.pdf Despite Sanctions, North Koreans Continue to Use Foreign Software - https://go.recordedfuture.com/hubfs/reports/CTA-NK-2024-0718.pdf Report of the Panel of Experts established pursuant to resolution 1874 (2009) - https://www.securitycouncilreport.org/atf/cf/%257B65BFCF9B-6D27-4E9C-8CD3-CF6E4FF96FF9%257D/N2323869.pdf Alleged Sanctions Violations of UNSC Resolutions on North Korea: An Analysis of the UN Panel of Experts Reports - https://isis-online.org/uploads/isis-reports/documents/North_Korea_PoE_sanctions_analysis_report_July_1_Final.pdf