Yotam Gutman
24-12-2025
Remote hiring has become a security boundary. North Korean IT workers exploit stolen identities, VPNs, and laptop farms to gain trusted access, steal data, and extort companies—turning VPN-based remote work into a scalable attack surface.
Remote work didn’t just change how companies hire - it changed what “perimeter” even means. Over the last few years, North Korean remote IT workers used stolen identities, domestic “laptop farms,” remote-access tooling, and VPNs/proxies to blend into Western workforces and quietly turn legitimate access into revenue, data theft, and sometimes extortion. A recent case makes the mechanism painfully clear.
On December 4, 2025, the U.S. Department of Justice announced that Minh Phuong Ngoc Vong (Maryland) was sentenced to 15 months for his role in a fraud scheme that helped foreign IT workers pose as U.S. citizens and get remote jobs at over a dozen U.S. companies. According to the DOJ, he conspired with a foreign national living in Shenyang, China (near North Korea) and allowed others to use his computer access credentials to do the work and receive payment - including for a role requiring U.S. citizenship.
That pattern - someone “in the West” fronts the identity, while the real operator works remotely- is a recurring theme across many investigations.
North Korea employs an army of domestic workers that are conspicuously hired by foreign (mostly US and European) companies for several uses:
This is why “remote hiring” has become a national security and enterprise security issue - not only an HR/compliance concern.
Operators rely on stolen/borrowed identities, fake resumes, and “legitimizing” online footprints. U.S.-based facilitators may receive employer-issued laptops, then enable remote access so the overseas operator can connect in.In one instance, the DOJ described “laptop farms” that hosted victim company laptops so overseas workers could remote access them.
Once inside, the risk expands quickly: DPRK IT workers may attempt to harvest credentials and session cookies to initiate sessions from non-company devices and pursue further compromise. Finally, these employees also aim at additional monetization, such as data theft, threats to leak stolen source code unless extortion demands were paid.
Official U.S. advisories explicitly call out VPNs as a tactic used to conceal location and reduce scrutiny:
In other words: VPNs aren’t the goal, they’re the camouflage that makes fraudulent hiring and remote access sustainable at scale.
The uncomfortable takeaway from these cases is that corporate access is being traded like a commodity and remote access workflows (including VPN) are often the bridge that makes it practical. If attackers gain credentials- through renting, stealing, or social engineering - the VPN becomes a trusted tunnel straight into core systems.
Zeroport’s non-IP, hardware-enforced remote access eliminates this risk by design, it provides granular control over user sessions, does not allow lateral movement, no remote code execution path and no data-exfiltration channel. Fantom removes the risk of stolen credentials VPN bypasses (such as US-based laptop farms).
Contact us today to learn more about Fantom Enterprise.
Empower global teams with secure, hardware-enforced remote access, no VPNs, no data exposure, no risk.