What if your remote team member isn’t who they say they are?

What if your remote team member isn’t who they say they are?

In today’s remote-first world, trust is a product risk, and one that’s becoming harder to manage.

But what if some of your team members aren’t who they claim to be? That’s exactly what the DTEX DPRK cyber report uncovers.

North Korean IT operatives are actively embedding themselves into global tech teams – using fake identities to fund weapons programs.
The DTEX report reveals how these actors operate.  Your team could be targeted without knowing it. These actors embed as IT professionals and slowly build trust within the teams they work with. Their psychological tactic and patience have allowed them to infiltrate the global tech workforce deeply.

🔑Here are some key takeaways Tech leaders and Project Managers shouldn’t afford to ignore

1. Remote Hiring Needs Rethinking

For the HR team, it’s time to go beyond resumes and ‘gut feeling’. Video interviews, identity verification, and behavioural monitoring need to be part of the onboarding process, especially for distributed teams.

• Verified identity checks.
• Multi-step video interviews.
• Device posture assessments.
• Continuous behavioural monitoring once they’re onboarded.

Security should start before someone is even hired.

2. AI is fuelling both sides

We’re excited about what AI can do – but so are they. Starting from generating fake resumes and headshots to automating phishing and identity spoofing, AI is making deception easier and more scalable by:

• Synthetic headshots
• Polished fake resumes
• Automated phishing flows
• Identity-spoofing at a scale we’ve never seen before

3. DTEX shares clear red flags

Watch for suspicious signals during interviews or early onboarding:

➡️ Disabled screen locks
➡️ Odd login times
➡️ Excessive screenshot tools
➡️ Hesitation during live coding or screen-sharing sessions

Remote work isn’t the risk; unverified trust is – and security isn’t just an IT concern; it’s an operational one.

Previous Start with the FabricTools PowerShell module
Next The importance of Story Points

About author

Paulina Nowinska
Paulina Nowinska 11 posts

Product Manager, Scrum Master, and AI practitioner passionate about turning ideas into impactful, user- centered solutions. I blend Agile leadership, product strategy, and hands-on experience with AI, automation, and emerging technologies to guide teams through digital transformation. I’m building AI-driven projects, including Vibe Coding apps, exploring creative workflows, automation, and multi-agent orchestration to bring innovative solutions to life.

View all posts by this author →

You might also like

Last Week Reading 0 Comments

Last week reading (2018-02-11)

Good day SQL folks! Thanks for visiting our blog again!  I have just come back after almost 2 weeks of vacations and here you are – fresh, good content for

Last Week Reading 0 Comments

Last Weeks Reading (2023-11-05)

📰 News Process Azure Event Hubs data using Azure Data Factory Mapping Data Flows Read how to process Azure Event Hubs data using ADF for certain use cases. Automate a

General 1Comments

Want to Build a Strong Team? Give Them Ownership – and Step Back

Micromanagement kills teams☠️. It’s nothing wrong with checking what the team is doing or ensure they’re moving in the right direction – but managers, who constantly monitor every team move

0 Comments

No Comments Yet!

You can be first to comment this post!

Leave a Reply