WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships (TLP:CLEAR) Cross-Sector ISAC Report: Threat Overview and Mitigations for the North Korea IT Worker Problem
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

(TLP:CLEAR) Cross-Sector ISAC Report: Threat Overview and Mitigations for the North Korea IT Worker Problem

TLP:CLEAR

Author: Chase Snow

Created: Thursday, July 10, 2025 - 14:50

Categories: Cybersecurity, Security Preparedness

Summary: WaterISAC is sharing a cross-sector report co-authored by several leading Information Sharing and Analysis Centers (ISACs), including WaterISAC, that focuses on the continuing threat of North Korea IT workers on U.S. organizations. The report brings further awareness to what appears to be an enduring threat that many communities and sectors may not fully understand or appreciate the extent of. Leaders are encouraged to pause, take the time to understand this threat, consider mitigation guidance, and have the appropriate conversations with staff across their organization.

Analyst Note: Insider threats continue to pose a persistent threat to the water and wastewater sector. Furthermore, this campaign underscores the growing security threat that hostile nation states – Russia, China, Iran, and North Korea – pose to critical infrastructure organizations.

The campaign’s goals are to gain employment at an organization for two distinct purposes:

  1. To get paid as a freelance / contract worker, which will generate revenue for North Korean programs.
  2. While some workers may complete activities to earn a paycheck, they may also use their access to the organization’s network to collect sensitive or proprietary information, which they can later use to extort the company.

Organizations are encouraged to conduct an end-to-end review of their employee population and their applicants (pending or previously applied) to assess the risk within the organization. Using the indicators mentioned in the report, organizations can quickly understand the impact, if any, and ultimately strengthen their processes against this threat or others.

Original Source: Access the full report below.

Additional Reading:

  • Justice Department Announces Coordinated, Nationwide Actions to Combat North Korean Remote Information Technology Workers’ Illicit Revenue Generation Schemes
  • FBI Public Service Announcement: North Korean IT Workers Conducting Data Extortion

Related WaterISAC PIRs: 6, 7, 10, 12

Attached Files:

North-Korea-IT-Worker-Threat-Report-Threat-Overview-and-Mitigation-10-Jul-2025.pdf

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 7, 2026)

May 7, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness
Members Only

(TLP:GREEN) Gate 15 TARGET Report – Identity Centric Attacks: The Shift from Network to Identity as the Primary Attack Surface

May 7, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) CISA and Partners Release Guidance for Careful Adoption of Agentic AI Services

May 7, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar