How nation-state actors exploit human trust

Explore top LinkedIn content from expert professionals.

  • View profile for Jeffery Wang
    Jeffery Wang Jeffery Wang is an Influencer

    Account Manager at CyberCX | Professional Development Forum (PDF) | Community Voices

    6,178 followers

    As cybersecurity professionals, we've long focused on building walls against external attackers. But what happens when the threat walks through our front door with legitimate credentials and a smile? The recent revelations about North Korean nation-state actors systematically infiltrating Fortune 500 companies as fake IT workers represent one of the most sophisticated insider threat campaigns we've ever witnessed. The numbers should terrify every CISO: "Literally every Fortune 500 company has at least dozens, if not hundreds, of applications for North Korean IT workers," according to Mandiant's CTO Charles Carmakal. Security leaders estimate that 7% of Fortune 2000 companies have already been infiltrated by North Korean operatives working as full-time employees with privileged access. This isn't a distant threat—it's already inside our networks. These aren't amateur hackers trying their luck. North Korean operatives are leveraging AI to craft convincing resumes, manipulate voice and video feeds during interviews, and even form shell companies posing as legitimate US contractors. One startup founder estimates that 95% of IT job applicants are North Korean operatives posing as American developers. The sophistication is breathtaking: they're not just stealing identities—they're manufacturing them wholesale. Australia isn't immune. The Australian Sanctions Office has identified "thousands of highly skilled IT workers" dispatched globally by North Korea, specifically targeting employers in wealthier countries including Australia. These operatives are active across multiple sectors—business, health, entertainment, and technology—making no industry safe from infiltration. While we focus on nation-state actors, the broader insider threat landscape reveals the true scope of this challenge. The average cost of insider threats has reached $17.4 million annually per organisation—up from $16.2 million in 2023. Even more alarming, 95% of all data breaches are caused by human error, and insider-driven events cost organisations an average of $13.9 million per incident. We're fighting yesterday's war with today's budgets. Companies spend $211,021 on containment for every insider incident but only $37,756 on monitoring. We're still building higher walls when the enemy is already inside, wearing our badge and accessing our most sensitive systems. The North Korean IT worker campaign represents the future of cyber warfare: patient, sophisticated, and leveraging our own hiring processes against us. It's time to acknowledge that insider risk isn't just about disgruntled employees—it's about nation-states weaponising our trust in remote work and global talent pools. What strategies is your organisation implementing to address the evolving insider threat landscape? #CyberSecurity #InsiderThreats #NorthKorea #RiskManagement #InfoSec #Australia

  • View profile for Travis Hawley

    National Security Analyst | Former Intelligence at US Air Force, NSA and CENTCOM

    31,439 followers

    Foreign Information Operations Are Targeting Local Communities – Not Just D.C. Foreign adversaries like Russia, China, and Iran are no longer just spreading disinformation to influence federal policymakers—they are now targeting state and local communities to deepen divisions and weaken the U.S. from within. These nations exploit trust in local sources, manipulate domestic actors to launder foreign propaganda, and even use AI to amplify their reach with more tailored content. Their goals vary: from influencing local policies to sowing distrust in U.S. elections and institutions, ultimately eroding faith in American democracy. Understanding these threats is crucial—if communities remain unaware, they remain vulnerable. This report highlights examples of foreign information operations in all 50 states and D.C., exposing the tools, tactics, and motivations behind these efforts.

  • View profile for Shannon Brandao

    China Boss on Substack 🇨🇳🗞🔥

    34,161 followers

    Euractiv [excerpt]: #China poses a fundamental threat to Euro-Atlantic civilisation and is using various channels, including #LinkedIn, to establish contacts and gain #influence and know-how, the Czech Security Information Service (BIS) has warned. In the latest BIS report, the Czech intelligence service found that China targets academics in the country. Through LinkedIn, Chinese intelligence services use “cover profiles of employees from fictitious consulting or headhunting companies, most commonly based in Singapore or Hong Kong,” to approach Czech #academics, the report warns. The academics are offered financial incentives in exchange for reports and research that align with China’s political interests. What starts as a seemingly legitimate professional opportunity often leads to deeper involvement and the sharing of sensitive, non-public information, the report adds. “These studies generally serve as a preliminary step towards further cooperation, involving the provision of specific information,” the BIS report also warned. Once initial contact has been established, Chinese operatives often invite academics on all-expenses-paid trips to China. These visits are used to cement relationships and create a sense of commitment to Chinese interests. In addition to warning about China’s efforts on LinkedIn, the BIS report also points to China’s broader long-term geopolitical goal of positioning “itself as the most important economic superpower and creating an effective counterbalance to the G7 countries.” By infiltrating academic and professional circles, China is not only seeking direct information but also working to undermine the principles of democracy and free markets that are central to Euro-Atlantic civilisation, the report adds. The intelligence agency also raised the alarm about the risks of foreign smart devices, such as smartphones, smartwatches and electric vehicles, being used to misuse personal data. These devices, the BIS warns, could be vulnerable to data collection that could then be exploited by state actors. The Czech agency does not explicitly mention Chinese smart devices but warns against products from countries “whose political regimes and legislation increase the possibility of data misuse by state power”. #news #Europe #CzechRepublic

Explore categories