> Once employed in a full-time role, fake workers are often very successful, since they sometimes have multiple people helping them to produce their work, with the hope of getting a promotion and gaining more privileged access to the IT systems.
I think the "fake" part is the long term play to get enough privilege to presumably perform a cybersecurity attack. But less "fake" and more "spy" from the description - the outlined scheme is literally what spies agencies do.
Came here to post this. I'm glad someone else thought of it. "Hear me out... we're going to rip of Western companies by... get this... writing code for them and taking home a paycheck week after week. They're just going to give us the money!!"
Well, it sounds like they are effectively slaves to the government, who is raking in their income on their behalf, and would presumably be able to "activate" them as an insider threat at some point.
I would say they are "fake" because they work using stolen identities and hide their location. In order to receive these high wages they need to pretend to be located in US and they need to provide the paperwork showing they have a right to work there.
Well, it is (highly) illegal for them to do this. So they presumably lie about everything, like name, location, ...
Perhaps fake is not the correct word, but the actual individuals are likely to have more than a few faked details. They do exist, of course.
It's also very dubious becuase, well, would you really hire a worker from an organization that also does things like hack hospitals and then hold systems hostage for bitcoin?
Obviously, when working you have to follow the law both in the country where you live and the country where you work. Even in the case of remote work. Sadly, even if you just consult. So you can be pretty sure: highly illegal.
Reminds me of the Key & Peele sketch: https://www.youtube.com/watch?v=jgYYOUC10aM
> Once employed in a full-time role, fake workers are often very successful, since they sometimes have multiple people helping them to produce their work, with the hope of getting a promotion and gaining more privileged access to the IT systems.
I think the "fake" part is the long term play to get enough privilege to presumably perform a cybersecurity attack. But less "fake" and more "spy" from the description - the outlined scheme is literally what spies agencies do.
Came here to post this. I'm glad someone else thought of it. "Hear me out... we're going to rip of Western companies by... get this... writing code for them and taking home a paycheck week after week. They're just going to give us the money!!"
Well, it sounds like they are effectively slaves to the government, who is raking in their income on their behalf, and would presumably be able to "activate" them as an insider threat at some point.
I would say they are "fake" because they work using stolen identities and hide their location. In order to receive these high wages they need to pretend to be located in US and they need to provide the paperwork showing they have a right to work there.
Well, it is (highly) illegal for them to do this. So they presumably lie about everything, like name, location, ...
Perhaps fake is not the correct word, but the actual individuals are likely to have more than a few faked details. They do exist, of course.
It's also very dubious becuase, well, would you really hire a worker from an organization that also does things like hack hospitals and then hold systems hostage for bitcoin?
To be fair, "illegal" here doesn't matter. North Korea doesn't follow American law.
Obviously, when working you have to follow the law both in the country where you live and the country where you work. Even in the case of remote work. Sadly, even if you just consult. So you can be pretty sure: highly illegal.
Weird take on legality. They're working American jobs, breaking American law. Yes it matters.
2 replies →