Microsoft says Jasper Sleet uses fake IT worker identities to infiltrate cloud environments


Microsoft has warned that Jasper Sleet, a North Korea-aligned threat actor, is using fake IT worker identities to get hired into real companies and gain trusted access to cloud environments. According to Microsoft Threat Intelligence, the group abuses remote hiring, digital onboarding, and cloud-connected business tools to move inside organizations without relying on a traditional network intrusion.

The campaign turns the hiring process into a security problem. Microsoft says these operatives use stolen or fabricated identities, AI-assisted deception, and external infrastructure to pass screening, complete onboarding, and then access services such as Microsoft Teams, SharePoint, OneDrive, Exchange Online, and HR systems.

This matters because the threat can look like ordinary employment activity at first. Instead of breaking into a company from the outside, Jasper Sleet can enter through legitimate job offers, then operate with the permissions, devices, and collaboration tools a normal employee would receive.

How the fake worker scheme works

Microsoft says Jasper Sleet starts in the pre-recruitment phase by reviewing public job listings and external career portals, including organizations that use platforms such as Workday. The company says the actor has made programmatic calls to Workday Recruiting Web Services endpoints exposed through external career sites to gather information on job postings, applications, and questionnaires.

Microsoft also says the group uses generative AI to study role requirements and build more convincing fake personas. In earlier and related reporting, Microsoft described AI use for creating culturally plausible identities, generating polished resumes and profile photos, reducing language barriers, and helping operatives stay employed after they are hired.

During recruitment, the actor communicates through common business tools such as email, Microsoft Teams, Zoom, and Cisco Webex. Microsoft says the pattern becomes suspicious when multiple external accounts repeatedly access the same recruiting API endpoints or when newly created employee identities begin showing impossible-travel alerts and logins from known malicious infrastructure soon after onboarding.

What happens after the actor gets hired

Once inside, the threat shifts from deception to access abuse. Microsoft says Jasper Sleet signs into newly created enterprise accounts, updates payroll details, and begins working through internal cloud tools like a normal employee. That gives the actor a direct path to sensitive files, collaboration data, internal communication, and business workflows.

Timeline of events through the recruitment phases (Source – Microsoft)

Microsoft has specifically highlighted sign-ins tied to new hires that originate from anonymous proxies or geographically inconsistent locations. It says spikes in impossible-travel alerts during the first months after onboarding can serve as an early warning that the identity behind the account is not genuine.

The risk does not stop at data access. Microsoft says these operations can support revenue generation for the North Korean regime and, in some cases, enable data theft, extortion, or follow-on compromise inside the victim organization.

Why cloud and HR platforms sit at the center

Microsoft’s report shows that this threat sits between HR, IT, and security. The actor abuses hiring software and external career portals before the organization even creates an internal account, then pivots into cloud productivity suites and enterprise workflows after onboarding.

Sample view of API call events indicating access to hrrecruiting API endpoints on an organization’s Workday instance from an external account (Source – Microsoft)

That makes the problem broader than a standard phishing campaign. A fake applicant may pass through recruiters, interviewers, payroll staff, hiring managers, and IT onboarding teams before security teams see any alert. By then, the actor may already have a valid account, approved access, and enough business context to blend in.

Microsoft’s earlier Jasper Sleet reporting also shows that the group adapts over time. The company previously documented tactics such as fraudulent identities, facilitators, laptop farms, and AI-assisted communication, which suggests the fake-worker model has become more systematic and harder to spot with basic screening alone.

Jasper Sleet activity at a glance

AreaMicrosoft findings
Threat actorJasper Sleet, a North Korea-aligned actor
Main tacticPosing as remote IT workers using fake or stolen identities
Entry pointExternal career portals and digital hiring workflows
Platform highlightedWorkday Recruiting Web Services endpoints
Post-hire accessTeams, SharePoint, OneDrive, Exchange Online, payroll systems
Key warning signsRepeated API calls, suspicious external accounts, impossible-travel alerts, proxy use

The details in the table come from Microsoft’s April 21, 2026 blog on detection strategies against infiltrating IT workers.

What organizations should do now

  • Treat recruiting and onboarding as part of the security perimeter, not only an HR workflow.
  • Review Workday and other external recruiting platform telemetry for repeated API access from unusual external accounts.
  • Enable Microsoft Defender for Cloud Apps connectors for services such as Workday, DocuSign, Zoom, and Cisco Webex to improve visibility across the hiring chain.
  • Investigate impossible-travel alerts, proxy-based access, and geographic anomalies tied to new hires.
  • Train hiring teams to look for interview red flags such as inconsistent background details, reluctance to appear clearly on camera, or unusual urgency around payroll setup.

FAQ

What is Jasper Sleet?

Jasper Sleet is a North Korea-aligned threat actor that Microsoft has linked to fake remote IT worker operations and related cloud infiltration tactics.

How does the group get into companies?

Microsoft says the actor studies job postings, abuses external recruiting workflows, uses fake or stolen identities, completes hiring and onboarding steps, and then signs into internal cloud services as a legitimate employee.

Why is Workday mentioned in Microsoft’s warning?

Microsoft observed suspicious programmatic access to Workday Recruiting Web Services endpoints through external career sites, which helped the actor gather hiring-related information and refine applications.

What are the first signs of compromise?

Microsoft points to repeated API calls from external accounts, sign-ins from suspicious infrastructure, anonymous proxy usage, and impossible-travel alerts tied to newly hired employees.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages