Categories: Cyber Security News

Amazon Identifies North Korean IT Worker by Tracking Keystroke Activity

Amazon has detected a North Korean imposter posing as a U.S.-based systems administrator, exposing a sophisticated infiltration scheme that relies on remote-controlled laptops and deceptive network routing.

The discovery highlights how advanced security monitoring can catch state-sponsored threats that traditional background checks often miss.

The breakthrough came through an unusual method: analyzing keystroke input lag. For genuine remote workers operating from the United States, data from keyboard typing typically reaches company networks within tens of milliseconds.

Sponsored

However, this employee’s connection latency exceeded 110 milliseconds, triggering an immediate security investigation by Amazon.

How the Deception Unraveled

Further investigation revealed the suspect’s laptop was physically located in Arizona but was being controlled remotely from overseas.

The perpetrator was operating the machine from thousands of miles away, creating the illusion of a legitimate U.S.-based employee. This case represents just one example of a much larger infiltration campaign.

Amazon Chief Security Officer Stephen Schmidt revealed the scale of the threat. Since April 2024, the tech giant has blocked over 1,800 infiltration attempts by North Korean IT workers.

The frequency is escalating, with Amazon recording a 27% quarter-over-quarter increase in attack attempts targeting its corporate infrastructure.

“If we hadn’t been looking for the DPRK workers, we would not have found them,” Schmidt emphasized, stressing that proactive threat hunting remains essential to identifying these sophisticated impostors.

These infiltration campaigns operate through “laptop farms” established within the United States.

Sponsored

In this case, an Arizona woman facilitated the fraud by hosting the hardware infrastructure that enabled North Korean actors to route their traffic through U.S. IP addresses, making their activity appear domestic. She faced sentencing for prison earlier this year.

The motivations behind these infiltration attempts are twofold. North Korea seeks both to generate direct revenue for its regime and to conduct potential espionage or sabotage against major technology companies.

By securing legitimate employment positions, these actors gain access to sensitive systems and proprietary information.

While keystroke latency analysis proved instrumental in this case, Schmidt highlighted additional red flags that security teams should monitor.

Subtle linguistic inconsistencies often provide clues, including awkward use of American idioms, grammatical errors with English articles, and unnatural phrasing in written communications.

As this case demonstrates, organizations require a multi-layered security approach that combines advanced telemetry systems with active monitoring and human vigilance to effectively defend against state-sponsored corporate infiltration.

Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

The post Amazon Identifies North Korean IT Worker by Tracking Keystroke Activity appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

AliExpress Has a 500W 375Wh Adult Electric Bike for Just $270 with Free Delivery (Ships From the US)

Now is the time to retire that pedal-powered bike of yours and upgrade to electric.…

13 minutes ago

How the new iPhone 17E stacks up against Apple’s pricier phones

Unlike its predecessor, the iPhone 17E supports MagSafe. | Image: Apple The iPhone 17 lineup…

48 minutes ago

The Alienware Area-51 9800X3D RTX 5090 Gaming PC Drops to $4,550 (Lowest Price for 5090 Prebuilt)

If you're seeking chart-topping gaming performance, then Alienware's biggest and most powerful prebuilt desktop computer…

1 hour ago

God of War Series Casts 4 More Characters, Including Thor’s Children Modi, Magni, and Thrud

Fresh off releasing the first look at Ryan Hurst's Kratos, Prime Video has revealed four…

1 hour ago

Death toll for US service members in Iran war at 4 as Trump projects weeks of conflict

U.S. Secretary of Defense Pete Hegseth listens to questions during a news conference at the…

1 hour ago

Apple might use Google servers to store data for its upgraded AI Siri

Apple has asked Google to look into "setting up servers" for a new version of…

2 hours ago

This website uses cookies.