When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

Workers are believed to use this money to finance Kim Jong Uns weapons, steal company secrets and plantmalware.

Stolen or counterfeited identity documents were used for passing online identity checks with ease.

Hacker silhouette working on a laptop with North Korean flag on the background

Hackers are thought to have even paid US individuals to attend online interviews and video-conferences in their place.

On a more techy level, they usevirtual private networksto spoof their IP address location and boost their anonymity.

Hiring or supporting these workers poses many risks, from theft to legal consequences.

As part of the new recommendations, authorities suggest to watch out for any suspicious behaviors.