NorthScan Logo
Threat ResearchAbout UsContact
Smile, You're on Camera: A Live Stream from Inside Lazarus Group's IT Workers Scheme
DPRK Analysis

Smile, You're on Camera: A Live Stream from Inside Lazarus Group's IT Workers Scheme

Unprecedented investigation capturing North Korean IT workers live on camera through sandboxed laptop farms, documenting their recruitment tactics, toolchain, and infiltration operations in real-time.

Lazarus GroupANY.RUNLive Investigation
NS
Heiner García Pérez & Mauro Eldritch
•December 4, 2025•20 min read
Smile, You're on Camera: A Live Stream from Inside Lazarus Group's IT Workers SchemeDPRK Analysis

Smile, You're on Camera: A Live Stream from Inside Lazarus Group's IT Workers Scheme

by Heiner García Pérez & Mauro Eldritch•December 4, 2025•20 min read

Unprecedented investigation capturing North Korean IT workers live on camera through sandboxed laptop farms, documenting their recruitment tactics, toolchain, and infiltration operations in real-time.

From North Korean IT Workers to IT Recruiters: The Expansion of Threat LandscapesDPRK Intelligence

From North Korean IT Workers to IT Recruiters: The Expansion of Threat Landscapes

by SEAL Intel (Heiner)•November 7, 2024•18 min read

DPRK IT workers evolve from job seekers to recruiters, orchestrating systematic identity harvesting campaigns on Upwork and Freelancer platforms through scripted collaboration requests and remote access tools.

PyLangGhost RAT: Rising Stealer from Lazarus Group Striking Finance and TechnologyMalware Analysis

PyLangGhost RAT: Rising Stealer from Lazarus Group Striking Finance and Technology

by Mauro Eldritch•August 6, 2025•14 min read

Analysis of PyLangGhost RAT, a Python-based malware from Lazarus subgroup Famous Chollima targeting finance and tech sectors through fake job interviews, stealing credentials and cryptocurrency wallets.

Unmasking Suspicious GitHub Activity: The WageMole Campaign and DPRK Threat ActorsDPRK Analysis

Unmasking Suspicious GitHub Activity: The WageMole Campaign and DPRK Threat Actors

by NorthScan Team•April 21, 2025•36 min read

Comprehensive analysis of North Korean IT worker operations on GitHub, revealing coordinated campaigns, suspicious account patterns, and infiltration tactics targeting Web3 projects and developer communities.

Fraud Alert: Fake recruiters on GitHub and LinkedInFraud Alert

Fraud Alert: Fake recruiters on GitHub and LinkedIn

by NorthScan Team•January 10, 2025•10 min read

Investigation into fraudulent recruiter accounts on GitHub and LinkedIn used by threat actors to target developers and infiltrate organizations through fake job opportunities.

Summary of Findings on Suspicious GitHub Activity Linked to DPRK IT WorkersDPRK Analysis

Summary of Findings on Suspicious GitHub Activity Linked to DPRK IT Workers

by NorthScan Team•January 8, 2025•15 min read

Comprehensive recap of findings regarding suspicious Lazarus Group activity on GitHub, analyzing patterns in fake developer profiles, achievement badges, and coordinated campaigns targeting the developer community.

Reviewing the activity of GitHub accounts linked to DPRK IT workersDPRK Analysis

Reviewing the activity of GitHub accounts linked to DPRK IT workers

by NorthScan Team•December 4, 2024•12 min read

In-depth analysis of GitHub account activity associated with Lazarus Group, examining commit history manipulation, identity obfuscation techniques, and patterns used by DPRK IT workers to maintain cover identities.

Suspicious activity in GitHub associated with DPRK IT WorkersDPRK Analysis

Suspicious activity in GitHub associated with DPRK IT Workers

by NorthScan Team•November 29, 2024•14 min read

Detailed investigation into suspicious GitHub activity patterns associated with Lazarus Group and DPRK IT workers, revealing coordinated efforts to establish fake developer identities and infiltrate software development communities.

Understanding DPRK IT Worker Activity - Conversations and InsightsDPRK Intelligence

Understanding DPRK IT Worker Activity - Conversations and Insights

by Heiner (Ketman)•June 24, 2025•45 min read

Comprehensive analysis of DPRK IT workers' tactics, behaviors, and operational patterns through direct engagement. Revealing social engineering, remote desktop evasion, and platform manipulation techniques.

In the Media

Coverage of NorthScan research and DPRK threat intelligence in major publications

North Korean Spy Reveals Ties in Fake Job InterviewMedia Mention

North Korean Spy Reveals Ties in Fake Job Interview

by Cointelegraph•August 3, 2025•6 min read

Cointelegraph took part in an investigation centered around a suspected North Korean operative that uncovered a cluster of threat actors attempting to score freelancing gigs in the cryptocurrency industry. The investigation was led by Heiner Garcia, a cyber threat intelligence expert at Telefónica and a blockchain security researcher

Freelancer? North Korean Spies May Be Using YouMedia Mention

Freelancer? North Korean Spies May Be Using You

by Cointelegraph•July 30, 2025•5 min read

In this feature on freelance platform abuse, Heiner García Perez is cited for his research on how North Korean IT workers exploit Upwork and LinkedIn to blend into legitimate ecosystems. His intelligence findings helped illustrate the scope of DPRK remote work infiltration.

North Korea Lures Engineers to Rent Identities in Fake IT Worker SchemeMedia Mention

North Korea Lures Engineers to Rent Identities in Fake IT Worker Scheme

by BleepingComputer•December 2, 2025•7 min read

BleepingComputer reports on an unprecedented intelligence operation where security researchers Mauro Eldritch and Heiner García exposed how North Korean IT recruiters from Famous Chollima are luring American engineers into identity rental schemes, enabling DPRK operatives to infiltrate Western companies.

Researchers Capture Lazarus APT's Remote-Worker Scheme Live on CameraMedia Mention

Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera

by The Hacker News•December 2, 2025•8 min read

The Hacker News reports on a groundbreaking joint investigation led by Mauro Eldritch (BCA LTD), NorthScan, and ANY.RUN that captured Lazarus Group's Famous Chollima division operating live in controlled sandbox environments, exposing their remote IT worker infiltration tactics and identity takeover schemes in real-time.

NorthScan Logo

Threat Research & Intelligence

Navigation

  • Home
  • Threat Research
  • About
  • Contact Us

Contact

  • Info@northscan.co

© 2025 NorthScan. All rights reserved.