Amazon’s CSO Battles North Korean IT Infiltration

Amazon’s Security Chief Confronts Global Threats

Steve Schmidt, Amazon’s Chief Security Officer and Senior Vice President, is leading a robust defense against cyber-infiltration attempts orchestrated by North Korean operatives. According to Schmidt, Amazon has intercepted and blocked over 1,800 such attempts, many of which involve individuals posing as legitimate IT professionals seeking remote employment.

Speaking at a company-hosted event, Schmidt emphasized the increasing prevalence of these schemes across the tech sector, particularly as positions related to artificial intelligence and machine learning offer access to lucrative compensation and sensitive data.

North Korea’s Sophisticated Tactics

The frequency of these infiltration attempts has grown significantly. In 2025 alone, Amazon experienced a 27% quarter-over-quarter surge in job applications from North Korean operatives. Several high-profile incidents have underscored the threat, including:

  • Four North Korean nationals charged with participating in a scheme to obtain remote IT jobs and steal nearly $1 million in cryptocurrency.
  • The creation of a fraudulent job application platform aimed at targeting major AI companies.
  • A woman in Arizona sentenced to eight years in prison for aiding North Korean identity theft in a $17 million scam.

These tactics highlight the ongoing cyberwar between sovereign actors and Fortune 500 firms, with North Korea seeking both financial gain and access to proprietary data.

Amazon’s Multi-Layered Defense Strategy

Schmidt outlined Amazon’s evolving defense mechanisms, which combine AI-powered detection tools and human oversight. AI models are trained to flag unusual behavior, such as the use of international dialing formats (e.g., a ‘+’ in phone numbers) and the inclusion of fabricated educational institutions or companies in résumés.

Some fake companies even register business entities to pass verification checks, though they lack real operations. To counteract these tactics, Amazon has increased the number of in-person interviews and mandated more employees return to offices. This physical presence requirement makes it harder for imposters to maintain false identities.

Identity Verification and Post-Hire Monitoring

Amazon now requires multi-stage identity verification during the hiring process. After hiring, the company monitors for irregular computer usage and assesses the quality of work. Schmidt noted that code written by infiltrators often declines in quality when they’re working on-site, compared to remote conditions.

Collaboration between security and HR teams has also been enhanced. Amazon’s security personnel have access to job applicant data, including LinkedIn profiles and résumé details, allowing AI to scan for anomalies before hiring decisions are made.

Advanced Authentication and AI Integration

Amazon employs an internal authentication system called Midway, which uses Universal 2nd Factor (U2F) verification. This system requires a physical security key, a trusted device, and a PIN, moving away from traditional one-time passwords.

AI is also being used to accelerate security assessments, with reviews that once took hours now completed in minutes. Additionally, Amazon’s AI tools help detect fake product reviews and evaluate software code for vulnerabilities through a process called autonomous threat analysis. This involves AI agents competing to identify and resolve code issues before product deployment.

Managing AI Agent Access

As Amazon integrates agentic AI capabilities, the company has invested in identifying AI agents and controlling their access. Schmidt explained that AI agents, much like human employees, need boundaries. For example, a robotics AI agent should not access retail data, and a customer service bot should be restricted from AWS systems.

“The agent in the middle is not just software or a human—it’s a hybrid,” Schmidt said, underscoring the need for precise access controls.

Industry Implications and Call for Vigilance

Schmidt’s insights serve as a wake-up call for the broader tech industry. Nation-state cyberattacks are evolving, and corporations must continuously adapt. The use of AI by both defenders and attackers raises the stakes, making cybersecurity a critical priority for IT and HR departments alike.

“It’s actually a lot cheaper for HR if we catch the issue upfront,” Schmidt noted, reinforcing the need for proactive threat detection and employee vetting practices.


This article is inspired by content from Original Source. It has been rephrased for originality. Images are credited to the original source.

Subscribe to our Newsletter