Amazon Blocks North Korean Applicants Amid Rising Concerns
Amazon, the leading US technology company, has taken decisive action by blocking over 1,800 North Koreans from applying for jobs. This move comes as North Korea has been increasingly sending IT professionals abroad to generate and launder funds, a strategy that has raised alarms in the international community.
Growing Applications from North Korean Workers
In a recent LinkedIn post, Amazon’s Chief Security Officer Stephen Schmidt revealed that there has been a nearly one-third increase in job applications from North Korea over the past year. These workers are often attempting to secure remote IT positions with companies worldwide, particularly those based in the United States.
The Use of “Laptop Farms”
Schmidt explained that many North Korean applicants utilize what are known as “laptop farms.” This involves operating computers in the US remotely from North Korea, which allows them to bypass restrictions and seek employment in the US tech landscape. This troubling trend highlights the lengths to which North Korean workers will go to secure employment and financial resources.
Identifying Red Flags in Applications
During his post, Schmidt noted that there are identifiable signs indicating North Korean applicants, including mismatched phone number formats and unreliable academic qualifications. Such inconsistencies are crucial for companies to recognize in order to protect themselves from potential infiltration.
Legal Actions Against North Korean Operatives
In July, a woman in Arizona received an eight-year prison sentence for running a laptop farm that aided North Korean IT workers in obtaining jobs at over 300 US companies. This operation reportedly generated more than $17 million in revenue, contributing to the North Korean regime’s financial mechanisms.
International Cybersecurity Threats
The potential for threats posed by North Korea is not limited to job applications. In recent warnings, Seoul’s intelligence agency revealed that North Korean operatives have used platforms like LinkedIn to impersonate recruiters and extract sensitive information from South Koreans employed in defense sectors. Analysts, such as Hong Min from the Korea Institute for National Unification, emphasize that North Korea is actively training cyber personnel, supporting their infiltration into significant global locations.
The Evolution of North Korea’s Cyber Warfare Program
North Korea’s cyber warfare capabilities have been developing since at least the mid-1990s. The country’s cyber unit, known as Bureau 121, has expanded significantly, now comprising around 6,000 personnel operating from various nations. Such growth has led to increasing concerns about their ability to conduct cyber-attacks and steal critical financial resources.
US Sanctions on Cybercriminals
In a recent move, the Biden administration imposed sanctions on eight individuals linked to state-sponsored hacking, specifically focusing on their illicit operations that allegedly fund North Korea’s nuclear weapons program. The US Department of the Treasury claims that North Korean-affiliated cybercriminals have stolen over $3 billion in recent years, predominantly through cryptocurrency theft.
Amazon Blocks North Korean Applicants Amid Cybersecurity Concerns
In a significant move reflecting ongoing concerns over cybersecurity, tech giant Amazon has restricted over 1,800 applicants from North Korea from applying for remote positions. This decision comes as the regime in Pyongyang seeks to send a considerable number of IT professionals abroad to generate revenue and launder funds.
Surge in Applications from North Korean Workers
Amazon’s Chief Security Officer, Stephen Schmidt, revealed that the company has observed a striking increase in North Korean job applications—nearly one-third over the past year. Schmidt emphasized that these applicants are attempting to secure remote IT roles with businesses across the globe, particularly in the United States.
Remote Operations: The “Laptop Farms”
According to Schmidt, North Korean workers typically operate through what are known as “laptop farms.” These setups enable a computer stationed in the United States to be controlled remotely from outside the country, facilitating the illicit operations that have raised alarm bells in the tech industry.
Industry-Wide Concerns
Schmidt warns that the issue is not confined to Amazon alone but is likely being replicated across the tech sector. Indications of North Korean involvement include irregular phone number formats and questionable academic credentials among applicants, making it crucial for companies to be vigilant during the hiring process.
Legal Actions and Recent Incidents
A notable case from July illustrated the severity of this issue when a woman in Arizona was sentenced to over eight years in prison for enabling North Korean IT workers to land remote jobs with more than 300 U.S. firms. This operation reportedly generated over $17 million in revenue for both her and the North Korean regime.
Global Cyber Operations
The threats posed by North Korean cyber operations extend beyond job applications; intelligence agencies have previously reported that operatives from the regime have been masquerading as recruiters on platforms like LinkedIn to extract sensitive information from defense industry employees in South Korea.
Continued Developments in Cyber Warfare
The cyber capabilities of North Korea have expanded significantly since the mid-1990s, evolving into a formidable entity known as Bureau 121, which comprises around 6,000 personnel operating out of various countries. Recent sanctions announced by the U.S. targeted eight individuals linked to state-sponsored hacking activities, emphasizing the ongoing nature of these illicit cyber operations aimed at funding North Korea’s weapons programs.
Conclusion: A Call for Vigilance
With the U.S. Department of the Treasury estimating that North Korean-affiliated cybercriminals have pilfered over $3 billion in the past three years—largely through cryptocurrency theft—it is clear that vigilance is essential. As businesses navigate an increasingly complex landscape of cybersecurity threats, understanding the implications of these foreign cyber tactics has become imperative.

