We identified a North Korean hacker who tried to get a job
Generative AI and the changing threat model
- Commenters note that generative AI makes it much easier to fake résumés, written assessments, and even live interviews, especially for technical OAs (LeetCode/HackerRank).
- Some argue this will push hiring back toward real-time, unscripted tests and in-person evaluation; others say interviews were already broken and AI just exposes that.
“How fat is Kim Jong Un?” and cultural shibboleths
- A widely discussed tactic is asking a candidate to say something insulting about Kim Jong Un to “out” North Korean operatives.
- Supporters claim NK’s cult-like environment makes many operators unwilling to say anything critical, even when it would help their mission.
- Skeptics find this implausible, pointing out professional spies can lie strategically and that legitimate candidates would also hang up or complain about such a question.
- Many see these culture/geo “gotcha” questions (local restaurants, slang, etc.) as unreliable, with high false positives and false negatives.
Remote hiring, fake identities, and overemployment
- Multiple anecdotes describe fake candidates with polished LinkedIn/GitHub, VOIP numbers, VPNs, and mismatched identities, sometimes backed by whole teams.
- Recruiters report huge volumes of suspect applicants, especially for remote US roles; some companies now require full-time recruiters just to sift fakes.
- There’s concern that stricter screening will disproportionately hurt privacy-conscious or foreign candidates and drive hiring back toward elite schools and networking.
Verification practices and legal/ethical concerns
- Suggested mitigations: video ID checks, asking for local knowledge, on-site final rounds, even flying candidates in and treating remote work like contractor vetting.
- Others warn about discrimination (by accent, nationality, or location), privacy issues, and the risk of looking like a scam when asking for ID or odd questions.
Subcontracting and “farming out” the job
- Several stories describe employees secretly outsourcing their work to cheaper labor or multiple-job “overemployment.”
- Some see this as pure fraud and a security nightmare (credentials and data leaving the org); others argue if the work is good, the real problem is misaligned employment models.
Critique of Kraken’s post and the security industry
- Many view the “OSINT investigation” as mostly basic Googling plus an externally supplied list of suspect email addresses, overhyped for marketing.
- Some think advancing a known hostile candidate through the process to “study” them was reckless and may have taught attackers more than it revealed.
- Broader criticism targets the security and crypto sectors as hype-driven, process-poor, and more focused on optics, tools, and blame-shifting than robust hiring and access controls.