<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Threat Vector | The Billion Dollar Hiring Scam Funding North Korea in Threat Vector</title>
    <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-the-billion-dollar-hiring-scam-funding-north-korea/ta-p/1248931</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector Template.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70785iFAF95867010046C1/image-size/large?v=v2&amp;amp;px=999" role="button" title="Threat Vector Template.jpg" alt="Threat Vector Template.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.linkedin.com/in/evangordenker/" target="_blank"&gt;&lt;SPAN&gt;Evan Gordenker&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;, Director of AI Security and DPRK Operations at Unit 42, has led more than 160 investigations into sophisticated threat actors, including the North Korean IT worker networks quietly embedded inside global companies. He joins&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/davidmoulton/" target="_blank"&gt; &lt;SPAN&gt;David Moulton&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; to unpack how this operation actually works, why common assumptions about remote work leave organizations exposed, and what security and HR teams can do to detect and disrupt it.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;You'll learn:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;How DPRK operatives use deepfakes, fabricated identities, and real accomplice networks to pass interviews and land jobs at global companies&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Why "we don't hire remote" is a dangerous assumption that no longer holds&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;What signals HR and SOC teams should look for, before and after someone is hired&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;How the threat has evolved from quiet wage theft to active extortion of former employers&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;What government collaboration and cross-border intelligence sharing can realistically accomplish&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;Evan contributed to the UN Sanctions Monitoring Team report on North Korean operations and brings a rare combination of technical depth and geopolitical fluency to this problem. Having lived and worked across the US, EU, and Japan, he brings cultural context that matters when investigating a threat with global reach. His investigations have produced some of the most detailed profiles of DPRK operators in the security community.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This episode is essential listening if you're: a security leader building out your insider threat program, an HR or talent acquisition leader who hasn't yet connected with your security team, or a threat intelligence analyst tracking how nation-state programs fund themselves.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Related Episodes:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://www.paloaltonetworks.com/podcasts/threat-vector" target="_blank"&gt;&lt;SPAN&gt;From Code to Compromise&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; — Covers North Korean threat actors using fake job interviews to target developers via malicious IDE extensions. A strong companion to this episode's look at the broader IT worker scheme.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A style="font-family: inherit; background-color: #ffffff;" href="https://www.paloaltonetworks.com/podcasts/threat-vector" target="_blank"&gt;&lt;SPAN&gt;Inside the Mind of State-Sponsored Cyberattackers&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; — A deeper look at how nation-state operations are structured and why they're so hard to disrupt.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;Join the conversation on our social media channels:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Website&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/unit42" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.paloaltonetworks.com/&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Threat Research:&lt;/STRONG&gt;&lt;A href="https://unit42.paloaltonetworks.com/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Facebook:&lt;/STRONG&gt;&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;LinkedIn:&lt;/STRONG&gt;&lt;A href="https://www.linkedin.com/company/unit42/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;YouTube:&lt;/STRONG&gt; &lt;SPAN&gt;@paloaltonetworks&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Twitter:&lt;/STRONG&gt;&lt;A href="https://twitter.com/PaloAltoNtwks" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&lt;A href="https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠" target="_blank"&gt;https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;IFRAME src="https://playlist.megaphone.fm?e=CYBW9467825529" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Thu, 26 Feb 2026 17:00:00 GMT</pubDate>
    <dc:creator>dmoulton</dc:creator>
    <dc:date>2026-02-26T17:00:00Z</dc:date>
    <item>
      <title>Threat Vector | The Billion Dollar Hiring Scam Funding North Korea</title>
      <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-the-billion-dollar-hiring-scam-funding-north-korea/ta-p/1248931</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector Template.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70785iFAF95867010046C1/image-size/large?v=v2&amp;amp;px=999" role="button" title="Threat Vector Template.jpg" alt="Threat Vector Template.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.linkedin.com/in/evangordenker/" target="_blank"&gt;&lt;SPAN&gt;Evan Gordenker&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;, Director of AI Security and DPRK Operations at Unit 42, has led more than 160 investigations into sophisticated threat actors, including the North Korean IT worker networks quietly embedded inside global companies. He joins&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/davidmoulton/" target="_blank"&gt; &lt;SPAN&gt;David Moulton&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; to unpack how this operation actually works, why common assumptions about remote work leave organizations exposed, and what security and HR teams can do to detect and disrupt it.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;You'll learn:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;How DPRK operatives use deepfakes, fabricated identities, and real accomplice networks to pass interviews and land jobs at global companies&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Why "we don't hire remote" is a dangerous assumption that no longer holds&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;What signals HR and SOC teams should look for, before and after someone is hired&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;How the threat has evolved from quiet wage theft to active extortion of former employers&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;What government collaboration and cross-border intelligence sharing can realistically accomplish&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;Evan contributed to the UN Sanctions Monitoring Team report on North Korean operations and brings a rare combination of technical depth and geopolitical fluency to this problem. Having lived and worked across the US, EU, and Japan, he brings cultural context that matters when investigating a threat with global reach. His investigations have produced some of the most detailed profiles of DPRK operators in the security community.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This episode is essential listening if you're: a security leader building out your insider threat program, an HR or talent acquisition leader who hasn't yet connected with your security team, or a threat intelligence analyst tracking how nation-state programs fund themselves.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Related Episodes:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://www.paloaltonetworks.com/podcasts/threat-vector" target="_blank"&gt;&lt;SPAN&gt;From Code to Compromise&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; — Covers North Korean threat actors using fake job interviews to target developers via malicious IDE extensions. A strong companion to this episode's look at the broader IT worker scheme.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A style="font-family: inherit; background-color: #ffffff;" href="https://www.paloaltonetworks.com/podcasts/threat-vector" target="_blank"&gt;&lt;SPAN&gt;Inside the Mind of State-Sponsored Cyberattackers&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; — A deeper look at how nation-state operations are structured and why they're so hard to disrupt.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;Join the conversation on our social media channels:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Website&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/unit42" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.paloaltonetworks.com/&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Threat Research:&lt;/STRONG&gt;&lt;A href="https://unit42.paloaltonetworks.com/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Facebook:&lt;/STRONG&gt;&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;LinkedIn:&lt;/STRONG&gt;&lt;A href="https://www.linkedin.com/company/unit42/" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;YouTube:&lt;/STRONG&gt; &lt;SPAN&gt;@paloaltonetworks&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Twitter:&lt;/STRONG&gt;&lt;A href="https://twitter.com/PaloAltoNtwks" target="_blank"&gt; &lt;SPAN&gt;⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&lt;A href="https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠" target="_blank"&gt;https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;IFRAME src="https://playlist.megaphone.fm?e=CYBW9467825529" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 26 Feb 2026 17:00:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-the-billion-dollar-hiring-scam-funding-north-korea/ta-p/1248931</guid>
      <dc:creator>dmoulton</dc:creator>
      <dc:date>2026-02-26T17:00:00Z</dc:date>
    </item>
  </channel>
</rss>

