概要: 北朝鮮のIT労働者は、AIツールを使ってID偽装を行い、チャットボットを使ってリアルタイムの面接支援を行い、米国や欧米企業のリモートワークの職を得ていると報じられている。これらの職は機密システムへのアクセスを許可し、意図せずして北朝鮮政権に流入すると思われる収入を生み出しているとの報告がある。
Editor Notes: This incident ID functions as a cluster-level anchor for ongoing reports since 2021 involving suspected North Korean IT workers reportedly using AI tools (such as facial alteration for identity spoofing and chatbot-based interview assistance) to gain employment in Western companies or to impersonate employers in order to deliver malware, exfiltrate credentials, or extract revenue, often as part of reportedly wide-ranging, state-directed efforts to evade sanctions and fund DPRK strategic programs under the auspices of the Reconnaissance General Bureau. The incidents span multiple operations and may involve thousands of actors operating across freelance platforms, third-party facilitators, and front companies. Discrete incident IDs may be developed from this entry as more bounded and independently verifiable cases emerge. While some sources trace this phenomenon to 2014 (with an acceleration during 2020 owing to COVID-19), this incident ID sets 01/01/2021 as its start date to reflect the period in which AI tools were reportedly integrated into infiltration methods. For additional historical context, see: https://en.wikipedia.org/wiki/North_Korean_remote_worker_infiltration_scheme. While there is no confirmed link between Research Center 227 and these specific operations, available reporting indicates that the center functions within a related operational ecosystem. See also Incidents 644 and 1117. U.S. government advisories and indictment press releases are tagged as responses for this incident ID. KnowBe4's reports are also marked with the response tag, but from the standpoint of a company describing itself as a victim of the implicated technology, not its developer.
Alleged: Unknown large language model developers , Unknown deepfake technology developers と OpenAI developed an AI system deployed by Yang Di , WaterPlum , Wagemole , Void Dokkaebi , UNC5267 , Son Un Chol , Sok Kwang Hyok , Sim Hyon-Sop , Rim Un Chol , Ri Kyong Sik , Reconnaissance General Bureau , PurpleBravo , North Korean threat actors , Minh Phuong Ngoc Vong , Matthew Isaac Knoot , Lazarus Group , Ko Chung Sok , Kim Ye Won , Kim Sang Man , Kim Ryu Song , Kim Mu Rim , Jong Song Hwa , Jong Kyong Chol , Jang Chol Myong , Hyon Chol Song , Gwisin Gang , Government of North Korea , Famous Chollima , Department 53 , Contagious Interview , Christina Chapman , Choe Jong Yong と Cho Chung Pom, which harmed Western companies , Web3 , SSA , Social Security Administration , Recruitment teams , Oleksandr Didenko , macOS users , Jiho Han , IRS , Interviewees , Internal Revenue Service , Human resources staff , Hiring managers , Haoran Xu , Employers , Developers , Cryptocurrency platforms , Companies in the United States , Chunji Jin , Blockchain projects , Andrew M. , Epistemic integrity , Truth と National security and intelligence stakeholders.
関与が疑われるAIシステム: Zoom , WebSocket-based C2 , Video interview platforms , Upwork , Unknown large language models , Unknown deepfake technology , remote3 , Remote admin tools , Raspberry Pi Zero , OtterCookie v4 , OtterCookie v3 , OtterCookie , Laptop farms , Job boards , InvisibleFerret , GitHub , FTP exfiltration , Freelance platforms , Flashpoint-detected info-stealing malware , Document verification systems , Digital identity verification services , ChatGPT , BYOD (Bring Your Own Device) , BeaverTail , Astrill VPN , ARP packet signaling と AgencyHill99
インシデントのステータス
Risk Subdomain
A further 23 subdomains create an accessible and understandable classification of hazards and harms associated with AI
4.3. Fraud, scams, and targeted manipulation
Risk Domain
The Domain Taxonomy of AI Risks classifies risks into seven AI risk domains: (1) Discrimination & toxicity, (2) Privacy & security, (3) Misinformation, (4) Malicious actors & misuse, (5) Human-computer interaction, (6) Socioeconomic & environmental harms, and (7) AI system safety, failures & limitations.
- Malicious Actors & Misuse
Entity
Which, if any, entity is presented as the main cause of the risk
Human
Timing
The stage in the AI lifecycle at which the risk is presented as occurring
Post-deployment
Intent
Whether the risk is presented as occurring as an expected or unexpected outcome from pursuing a goal
Intentional
インシデントレポート
レポートタイムライン
Loading...

