Categories: Cyber Security News

Amazon Identifies North Korean IT Worker by Tracking Keystroke Activity

Amazon has detected a North Korean imposter posing as a U.S.-based systems administrator, exposing a sophisticated infiltration scheme that relies on remote-controlled laptops and deceptive network routing.

The discovery highlights how advanced security monitoring can catch state-sponsored threats that traditional background checks often miss.

The breakthrough came through an unusual method: analyzing keystroke input lag. For genuine remote workers operating from the United States, data from keyboard typing typically reaches company networks within tens of milliseconds.

However, this employee’s connection latency exceeded 110 milliseconds, triggering an immediate security investigation by Amazon.

How the Deception Unraveled

Further investigation revealed the suspect’s laptop was physically located in Arizona but was being controlled remotely from overseas.

The perpetrator was operating the machine from thousands of miles away, creating the illusion of a legitimate U.S.-based employee. This case represents just one example of a much larger infiltration campaign.

Amazon Chief Security Officer Stephen Schmidt revealed the scale of the threat. Since April 2024, the tech giant has blocked over 1,800 infiltration attempts by North Korean IT workers.

The frequency is escalating, with Amazon recording a 27% quarter-over-quarter increase in attack attempts targeting its corporate infrastructure.

“If we hadn’t been looking for the DPRK workers, we would not have found them,” Schmidt emphasized, stressing that proactive threat hunting remains essential to identifying these sophisticated impostors.

These infiltration campaigns operate through “laptop farms” established within the United States.

In this case, an Arizona woman facilitated the fraud by hosting the hardware infrastructure that enabled North Korean actors to route their traffic through U.S. IP addresses, making their activity appear domestic. She faced sentencing for prison earlier this year.

The motivations behind these infiltration attempts are twofold. North Korea seeks both to generate direct revenue for its regime and to conduct potential espionage or sabotage against major technology companies.

By securing legitimate employment positions, these actors gain access to sensitive systems and proprietary information.

While keystroke latency analysis proved instrumental in this case, Schmidt highlighted additional red flags that security teams should monitor.

Subtle linguistic inconsistencies often provide clues, including awkward use of American idioms, grammatical errors with English articles, and unnatural phrasing in written communications.

As this case demonstrates, organizations require a multi-layered security approach that combines advanced telemetry systems with active monitoring and human vigilance to effectively defend against state-sponsored corporate infiltration.

Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

The post Amazon Identifies North Korean IT Worker by Tracking Keystroke Activity appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

The Wolfbox X3 Pro 2.5K Front and Rear Dashcam Bundle Drops to $120 Ahead of the Amazon Spring Sale

Car dashcams have their uses. They can come in handy for recording accidents when nobody…

7 minutes ago

PAX Aus 2026 Early Bird Tickets on Sale Today

Tickets for PAX Aus 2026 are available today, with ‘Early Bird’ prices on offer for…

8 minutes ago

Daredevil: Born Again Returns for Season 2 – Here’s When You Can Watch New Episodes

After making his gaming debut in Clair Obscur: Expedition 33, Charlie Cox is once again…

8 minutes ago

AliExpress Has Kirby Air Riders for Nintendo Switch 2 for Less Than $40 With Free Delivery

Switch 2 owners, check out this super low price on a first party Switch 2…

1 hour ago

“I Don’t Love AI Slop Myself” – Nvidia CEO Jensen Huang Defends DLSS 5

Ever since Nvidia announced DLSS 5 last week, the reaction has been, well, controversial. And…

1 hour ago

This website uses cookies.