A sophisticated sanctions-evasion scheme has migrated from American targets to European enterprises, exposing critical vulnerabilities in remote hiring practices
From Pyongyang to Prague: The European Expansion
When North Korea’s state-sponsored IT operatives first infiltrated Western companies, their sights were set firmly on American soil. Between 2020 and 2024, an estimated 300+ U.S. companies—including several Fortune 500 firms—unknowingly employed these skilled fraudsters, generating millions in revenue for Kim Jong Un’s sanctioned regime. But as U.S. authorities intensified scrutiny and public awareness grew, the operatives pivoted.
Today, Europe has become the new frontier.
According to the Google Threat Intelligence Group (GTIG), North Korean IT workers have established active operations across the continent, with confirmed presence in the United Kingdom, Poland, Romania, and beyond. These aren’t opportunistic freelancers—they represent a structured, state-backed operation estimated to involve thousands of unique personas globally. One individual alone was discovered operating 12 distinct fake identities across European job markets, targeting organisations ranging from defence contractors to government agencies.
The Anatomy of Deception: AI-Enhanced Infiltration
The sophistication of these operations has evolved dramatically. What began as crude identity theft has matured into an industrial-scale deception machine leveraging cutting-edge artificial intelligence.
Microsoft Threat Intelligence has documented North Korean operatives using AI-powered face-swapping tools to graft their photographs onto stolen identity documents, creating convincingly “professional” headshots for LinkedIn profiles and résumés. Voice-changing software is now being tested to bypass live interview verification—a development that could eliminate the need for human facilitators to stand in during video calls.
The operational playbook is meticulous: operatives procure stolen or “rented” identities matching their target companies’ geographies, construct detailed professional histories on platforms like GitHub and LinkedIn, and deploy VPNs and remote monitoring tools to mask their true locations—often North Korea, China, or Russia. When company-issued laptops require physical presence, a network of “facilitators”—including operations discovered in London—maintains “laptop farms” where machines are powered on daily for remote access from overseas.

Beyond Payroll Fraud: The Extortion Evolution
The threat vector has expanded beyond mere salary diversion. While early operations focused on steady income generation—one scheme netted $88 million over six years from just 14 operatives —the model has shifted toward aggressive monetisation through data theft and extortion.
In January 2025, the FBI confirmed that North Korean IT workers are now exfiltrating proprietary source code and sensitive data from former employers, holding it hostage for ransom payments. When victims refuse to pay, operatives have demonstrated willingness to publicly release stolen intellectual property. Jamie Collier of Google Threat Intelligence Group notes that some exposed workers have become so embedded that employers initially resist termination: “We may get the answer: ‘Are you absolutely sure? He is one of our best employees'”.
The financial scale is staggering. U.S. prosecutors estimate that thousands of trained operatives are active globally, with one recent indictment revealing $866,000 generated from just ten companies out of 64 infiltrated firms. When combined with cryptocurrency theft operations—including the February 2025 Bybit heist of $1.5 billion—these schemes represent a critical funding pipeline for North Korea’s weapons programs.
The European Espionage Context: Russia’s Shadow
The North Korean IT threat operates within a broader landscape of intensifying foreign intelligence activity across Europe. A landmark study by Sweden’s Defence Research Agency (FOI), published in February 2026, analysed 70 convicted espionage cases across 20 European countries between 2008 and 2024—and the findings are sobering.
Russia dominated the dataset, responsible for 47 of the 70 cases (67%), with China’s intelligence services accounting for six. The GRU (Russian military intelligence) alone was linked to 17 cases, targeting NATO infrastructure, defence planning, and critical systems. But perhaps most relevant for Nordic business leaders: the FOI report highlights that modern espionage increasingly recruits civilians—sometimes individuals unaware they’re conducting intelligence work at all.
Researcher Elina Elveborg Lindskog, who led the FOI study, warns that this visible caseload represents merely “the tip of the iceberg”. Her team documented spies targeting not only military secrets but infrastructure vulnerabilities—electricity grids, healthcare systems, and financial networks. The recruitment vectors are diverse: some civilians are ideologically motivated, others financially desperate, and a concerning subset seek “revenge on an employer”.
Strategic Analysis: Why Nordic Companies Are Particularly Vulnerable
The convergence of these threats creates unique risks for Nordic and European enterprises:
1. Sanctions Exposure: Unknowingly employing North Korean nationals violates international sanctions regimes, exposing companies to severe legal and financial penalties—even when the hiring was inadvertent.
2. Supply Chain Compromise: North Korean front companies mimicking legitimate IT firms have been identified across Asia, creating layered deniability and embedding malicious actors deep within software supply chains.
3. Hybrid Warfare Convergence: The FOI report’s finding that Russia targets critical infrastructure aligns with North Korean IT workers’ demonstrated interest in blockchain, AI, and financial technology sectors—areas central to Nordic economic competitiveness.
4. Remote Work Normalisation: The post-pandemic shift to distributed teams has eroded traditional security perimeters. As one FBI special agent noted, operatives now join video scrums, participate in Slack channels, and submit code reviews—functioning as “insiders” in plain sight.
Defensive Imperatives: A Nordic Business Framework
Organisations must adapt hiring and security protocols to this evolved threat landscape:
– Identity Verification: Implement multi-stage verification including live video interviews with camera requirements, documentation consistency checks, and background verification that resists AI-enhanced forgery.
– Technical Controls: Monitor for unauthorised remote access tools (TeamViewer, AnyDesk, Rust Desk), impossible travel alerts (logins from inconsistent geographies), and mouse-movement spoofing software designed to simulate activity.
– Ongoing Monitoring: Treat remote workers as potential insider threats throughout employment, not just during onboarding. Restrict access to sensitive systems and implement data loss prevention measures.
– HR Intelligence: As the FOI report suggests, vet candidates for vulnerabilities that hostile actors might exploit—financial distress, workplace grievances, or unusual access to sensitive projects.
Looking Ahead
The North Korean IT worker phenomenon represents a fundamental challenge to the trust-based systems underpinning global remote work. As U.S. law enforcement disrupts domestic operations—evidenced by the January 2025 indictments and the sentencing of laptop farm operator Christina Chapman to eight years in prison —European markets will likely face increased pressure from displaced operatives seeking new revenue streams.
Next in Our Series: In our upcoming issue, we will examine the specific targeting patterns of North Korean operatives across Nordic fintech and cryptocurrency sectors, including exclusive analysis of the “PurpleBravo” malware campaign that has already compromised organisations in the UAE, Costa Rica, and India. We will also explore how EU sanctions enforcement is adapting to this borderless threat.
Connect With Us: Have your organisation encountered suspicious remote IT worker activity? Our investigative team welcomes confidential tips and case studies.
- Submit a tip: editorial@nordicbusinessjournal.com
- Join the conversation: LinkedIn @NordicBusinessJournal
- Subscribe: For weekly insights on Nordic market trends and cyber security analytics.
This analysis was compiled from open-source intelligence, cybersecurity research, and Swedish Defence Research Agency findings current as of March 2026.
