Fast execution, robust charts, clean risk controls.
👉 Open account →
COINOTAG recommends • Exchange signup
🚀 Smooth orders, clear control
Advanced order types and market depth in one view.
👉 Create account →
COINOTAG recommends • Exchange signup
📈 Clarity in volatile markets
Plan entries & exits, manage positions with discipline.
👉 Sign up →
COINOTAG recommends • Exchange signup
⚡ Speed, depth, reliability
Execute confidently when timing matters.
👉 Open account →
COINOTAG recommends • Exchange signup
🧭 A focused workflow for traders
Alerts, watchlists, and a repeatable process.
👉 Get started →
COINOTAG recommends • Exchange signup
✅ Data‑driven decisions
Focus on process—not noise.
👉 Sign up →
North Korean IT workers are using freelancing platforms like Upwork, Freelancer, and GitHub to bypass sanctions by recruiting unsuspecting users as identity proxies for remote tech jobs, allowing them to secure payments through crypto and other methods while concealing their origins.
Operatives post job offers or approach candidates on these platforms to initiate contact.
Conversations shift to encrypted channels like Telegram or Discord for detailed instructions on remote access and verification.
Identity holders receive about 20% of earnings, with 80% funneled to DPRK actors via crypto wallets or bank accounts, according to cybersecurity researchers.
Discover how North Korean hackers exploit freelancing platforms for sanctions evasion. Learn about recruitment tactics, AI image manipulation, and crypto payment flows in this in-depth analysis.
How Do North Korean Hackers Use Freelancing Platforms to Evade Sanctions?
North Korean hackers are leveraging freelancing platforms such as Upwork, Freelancer, and code-hosting sites like GitHub to impersonate legitimate workers and circumvent international sanctions. By recruiting real individuals as identity proxies, these operatives gain access to verified accounts, bypassing geographic restrictions and identity verification systems. This allows them to secure remote IT jobs and funnel earnings primarily back to the Democratic People’s Republic of Korea (DPRK) through cryptocurrency and other channels.
COINOTAG recommends • Professional traders group
💎 Join a professional trading community
Work with senior traders, research‑backed setups, and risk‑first frameworks.
👉 Join the group →
COINOTAG recommends • Professional traders group
📊 Transparent performance, real process
Spot strategies with documented months of triple‑digit runs during strong trends; futures plans use defined R:R and sizing.
👉 Get access →
COINOTAG recommends • Professional traders group
🧭 Research → Plan → Execute
Daily levels, watchlists, and post‑trade reviews to build consistency.
👉 Join now →
COINOTAG recommends • Professional traders group
🛡️ Risk comes first
Sizing methods, invalidation rules, and R‑multiples baked into every plan.
👉 Start today →
COINOTAG recommends • Professional traders group
🧠 Learn the “why” behind each trade
Live breakdowns, playbooks, and framework‑first education.
👉 Join the group →
COINOTAG recommends • Professional traders group
🚀 Insider • APEX • INNER CIRCLE
Choose the depth you need—tools, coaching, and member rooms.
👉 Explore tiers →
What Tactics Do DPRK Operatives Employ on Platforms Like Upwork and GitHub?
Cybersecurity researcher Heiner García Pérez from SEAL Intel has detailed how these operations unfold with high organization and coordination. Operatives begin by posting attractive freelance job offers or directly contacting potential candidates on public platforms. Once engaged, they quickly move discussions to secure, encrypted messaging apps like Telegram or Discord, where they provide step-by-step instructions for setting up remote access tools and completing verification checks.
This method enables DPRK actors to dodge filters that block users from sanctioned countries, including VPN detection and location-based restrictions. By operating under borrowed or stolen identities, they can apply for and execute remote IT roles without raising suspicion. Clients remain unaware, paying for services that ultimately benefit state-backed efforts. García Pérez notes, “These actors are organized, coordinated, and share operational playbooks. The consistency of their methods shows this is part of a repeatable, state-backed system.”
COINOTAG recommends • Exchange signup
📈 Clear interface, precise orders
Sharp entries & exits with actionable alerts.
👉 Create free account →
COINOTAG recommends • Exchange signup
🧠 Smarter tools. Better decisions.
Depth analytics and risk features in one view.
👉 Sign up →
COINOTAG recommends • Exchange signup
🎯 Take control of entries & exits
Set alerts, define stops, execute consistently.
👉 Open account →
COINOTAG recommends • Exchange signup
🛠️ From idea to execution
Turn setups into plans with practical order types.
👉 Join now →
COINOTAG recommends • Exchange signup
📋 Trade your plan
Watchlists and routing that support focus.
👉 Get started →
COINOTAG recommends • Exchange signup
📊 Precision without the noise
Data‑first workflows for active traders.
👉 Sign up →
Supporting data from SEAL Intel’s investigations reveals patterns consistent across multiple cases. For instance, in documented instances, North Korean IT workers have infiltrated international companies by assuming false identities, often linked to shell entities that mask their true affiliations. This has allowed them to deploy professionals abroad for freelance or contract work, with payments structured to minimize traceability.
The profit split is a key incentive for recruits: identity holders typically receive only 20% of the total earnings, while the remaining 80% is retained by the operatives. Funds are laundered through cryptocurrency wallets, PayPal, or even traditional bank transfers, exploiting the global nature of digital payments. According to reports from cybersecurity firms like SEAL Intel, this scheme has targeted users in regions with lower economic barriers, making recruitment more effective.
COINOTAG recommends • Traders club
⚡ Futures with discipline
Defined R:R, pre‑set invalidation, execution checklists.
👉 Join the club →
COINOTAG recommends • Traders club
🎯 Spot strategies that compound
Momentum & accumulation frameworks managed with clear risk.
👉 Get access →
COINOTAG recommends • Traders club
🏛️ APEX tier for serious traders
Deep dives, analyst Q&A, and accountability sprints.
👉 Explore APEX →
COINOTAG recommends • Traders club
📈 Real‑time market structure
Key levels, liquidity zones, and actionable context.
👉 Join now →
COINOTAG recommends • Traders club
🔔 Smart alerts, not noise
Context‑rich notifications tied to plans and risk—never hype.
👉 Get access →
COINOTAG recommends • Traders club
🤝 Peer review & coaching
Hands‑on feedback that sharpens execution and risk control.
👉 Join the club →
DPRK Interpals recruitment email. Source: SEAL Intel
Frequently Asked Questions
How Are North Korean IT Workers Recruiting Identity Proxies for Freelance Scams?
North Korean IT workers target vulnerable individuals through freelancing sites, job portals, and even online communities for disabled people or friendship networks like InterPals. They offer quick-earning opportunities, then instruct recruits on using their verified accounts for remote jobs. This 40-50 word overview highlights the bait-and-switch tactic, where proxies handle initial verifications while operatives control the work and majority of payments via crypto.
What Role Does AI Play in North Korean Freelancing Platform Operations?
AI tools are used by these actors to manipulate images and create convincing fake personas, such as editing portraits to match borrowed identities. Investigators like Heiner García Pérez have found AI-generated photos stored alongside documents outlining recruitment and profit-sharing, making deceptions harder to detect during platform verifications or client interactions.
Key Takeaways
Diversified Recruitment Channels: DPRK operatives exploit freelancing platforms, social sites, and encrypted apps to build proxy networks, ensuring access to global job markets despite sanctions.
Technical Sophistication: Use of AI for image editing and shared operational guides demonstrates state-level coordination, as evidenced by recovered files with Korean-language instructions for IT matching.
Financial Exploitation: Proxies get minimal cuts, with most funds routed through crypto or banks; users should verify identities and avoid unsolicited job offers from unknown sources.
Conclusion
North Korean hackers’ use of freelancing platforms like Upwork and GitHub represents a sophisticated evolution in sanctions evasion tactics, blending cyber operations with identity theft and cryptocurrency laundering. As cybersecurity experts from SEAL Intel emphasize, these state-backed schemes underscore the need for heightened vigilance in remote hiring. Platforms and users alike must prioritize robust verification to counter such threats, ensuring a safer digital economy moving forward. Stay informed on emerging risks to protect against these growing cyber-financial challenges.
Democratic People’s Republic of Korea (DPRK) IT workers are increasingly turning to Upwork, Freelancer, and GitHub to impersonate legitimate workers and evade international sanctions by leveraging verified accounts from real individuals. This approach allows them to secure remote tech positions while hiding their origins and channeling payments back home.
COINOTAG recommends • Exchange signup
📈 Clear control for futures
Sizing, stops, and scenario planning tools.
👉 Open futures account →
COINOTAG recommends • Exchange signup
🧩 Structure your futures trades
Define entries & exits with advanced orders.
👉 Sign up →
COINOTAG recommends • Exchange signup
🛡️ Control volatility
Automate alerts and manage positions with discipline.
👉 Get started →
COINOTAG recommends • Exchange signup
⚙️ Execution you can rely on
Fast routing and meaningful depth insights.
👉 Create account →
COINOTAG recommends • Exchange signup
📒 Plan. Execute. Review.
Frameworks for consistent decision‑making.
👉 Join now →
COINOTAG recommends • Exchange signup
🧩 Choose clarity over complexity
Actionable, pro‑grade tools—no fluff.
👉 Open account →
García Pérez’s research highlights the structured nature of these operations. Hackers post job offers or contact candidates directly, then transition to secure channels for instructions on remote access and verification. This evades typical blocks like geographic filters and VPN detectors.
By using these proxies, DPRK actors can perform IT tasks under false identities, with clients none the wiser. Earnings are split unevenly, with proxies taking 20% and operatives claiming 80%, often via crypto.
COINOTAG recommends • Members‑only research
📌 Curated setups, clearly explained
Entry, invalidation, targets, and R:R defined before execution.
👉 Get access →
COINOTAG recommends • Members‑only research
🧠 Data‑led decision making
Technical + flow + context synthesized into actionable plans.
👉 Join now →
COINOTAG recommends • Members‑only research
🧱 Consistency over hype
Repeatable rules, realistic expectations, and a calmer mindset.
👉 Get access →
COINOTAG recommends • Members‑only research
🕒 Patience is an edge
Wait for confirmation and manage risk with checklists.
👉 Join now →
COINOTAG recommends • Members‑only research
💼 Professional mentorship
Guidance from seasoned traders and structured feedback loops.
👉 Get access →
COINOTAG recommends • Members‑only research
🧮 Track • Review • Improve
Documented PnL tracking and post‑mortems to accelerate learning.
👉 Join now →
Further insights from SEAL Intel reveal AI’s role in crafting deceptive profiles. Recovered Google Drive folders contained edited photos and documents detailing collaborations, including Korean-named files for domestic use.
Recruitment extends to niche sites, targeting lower-income regions like Ukraine and the Philippines for willing participants. One example involved instructions for a user named “Ana” on earning via Freelancer projects.
COINOTAG recommends • Exchange signup
🎯 Focus on process over noise
Plan trades, size positions, execute consistently.
👉 Sign up →
COINOTAG recommends • Exchange signup
🛠️ Simplify execution
Keep decisions clear with practical controls.
👉 Get started →
COINOTAG recommends • Exchange signup
📊 Make data your edge
Use depth and alerts to avoid guesswork.
👉 Open account →
COINOTAG recommends • Exchange signup
🧭 Be prepared, not reactive
Turn setups into rules before you trade.
👉 Create account →
COINOTAG recommends • Exchange signup
✍️ Plan first, then act
Entries, exits, and reviews that fit your routine.
👉 Join now →
COINOTAG recommends • Exchange signup
🧩 Consistency beats intensity
Small, repeatable steps win the long run.
👉 Sign up →
Payments flow through crypto, PayPal, and banks, with a verified case showing a fraudulent Upwork account under an Illinois architect’s identity. This operation’s reach into the US, Europe, and Asia amplifies its global impact.
Overall, these tactics showcase a coordinated, repeatable system backed by the DPRK, as per expert analysis. Freelancers and platforms must enhance detection to mitigate risks in the evolving landscape of cyber-enabled financial crimes.
COINOTAG recommends • Premium trading community
🏛️ WAGMI CAPITAL — Premium Trading Community
Strategic insights, exclusive opportunities, professional support.
👉 Join WAGMI CAPITAL →
COINOTAG recommends • Premium trading community
💬 Inner Circle access
See members share real‑time PnL and execution notes in chat.
👉 Apply for Inner Circle →
COINOTAG recommends • Premium trading community
🧩 Turn theses into trades
Reusable templates for entries, risk, and review—end to end.
👉 Join the club →
COINOTAG recommends • Premium trading community
💡 Long‑term mindset
Patience and discipline over noise; a process that compounds.
👉 Get started →
COINOTAG recommends • Premium trading community
📚 Education + execution
Courses, playbooks, and live market walkthroughs—learn by doing.
👉 Get access →
COINOTAG recommends • Premium trading community
🔒 Members‑only research drops
Curated analyses and private briefings—quality over quantity.