A 60 Minutes Australia sting just caught a suspected North Korean operative sitting in a fake job interview, calmly introducing himself as “Aaron Pierson” — a real Black IT professional from Minnesota who had no idea his identity was being used.
The setup was simple. Journalist Nick McKenzie and cybersecurity firm DTEX created a fake Australian AI startup, posted a legitimate-looking job listing for a full stack software engineer, and waited. The applications rolled in fast. One of them came from someone using Aaron Pierson’s name, his resume, and a professional headshot of a smiling Black American man.
Then the Zoom call started.
The person on screen was an Asian man who introduced himself as Aaron Pierson without flinching. He talked about his technical skills. He kept the illusion going — right up until the moment investigators started asking him basic questions about his supposed life in Minnesota. His answers were vague, rehearsed, and completely disconnected from the man in the photo. When they pointed out that he looked nothing like his profile picture, the interview was over.
This is what’s called a “laptop farm” operation, and it’s been quietly expanding for years alongside the rise of remote work. The scheme works like this: stolen identity gets someone hired at a legitimate company. The company ships a work laptop to a U.S. address — which belongs to a middleman. The middleman keeps the device online. The actual worker logs in from overseas, does the job, collects the paycheck, and funnels the money back to Kim Jong-un’s regime. And while they’re at it, they have full access to your company’s internal systems.
It’s not hacking from the outside. It’s being hired from the inside.
Security experts believe this isn’t a handful of isolated cases. We’re potentially talking about thousands of individuals operating under stolen identities across the U.S., Australia, and beyond. The shift to remote work handed them the opportunity. Weak verification systems handed them the keys. AI tools that generate convincing profiles and rehearsed interview answers did the rest.
Most companies still screen candidates with a resume, a short video call, and an email exchange. That’s it. That’s the entire security layer standing between Kim Jong-un’s IT army and your company’s network.
The viral reaction online ranged from dark humor to genuine alarm. One recruiter admitted, “I see interviews like this more often than people realize.” That’s the part that should keep you up at night — not the clip that went viral, but everything that didn’t.
North Korea isn’t just building missiles anymore. They’re applying for your open positions on LinkedIn. And thanks to remote work, they might already be on your payroll.