Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Justice Department Dismantles North Korean IT Labor Schemes in US
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Justice Department Dismantles North Korean IT Labor Schemes in US

Highlights

  • Five individuals pleaded guilty to helping North Korean IT schemes in the U.S.

  • Authorities seized $15 million in cryptocurrency linked to North Korean hackers.

  • Over 136 U.S. companies were impacted by these coordinated fraud schemes.

Kaan Demirel
Last updated: 14 November, 2025 - 11:50 pm 11:50 pm
Kaan Demirel 3 hours ago
Share
SHARE

Contents
How Did the Justice Department Uncover the Remote IT Worker Network?Who Were the Key Individuals Involved and What Roles Did They Play?What Broader Impact Have These Schemes Had on U.S. Businesses and National Security?

A series of coordinated actions led by the Justice Department has intensified efforts to counter North Korean schemes that utilize stolen U.S. identities and exploit cryptocurrency channels. Recent prosecutions have targeted both U.S.-based facilitators and international operatives who assist North Korean IT workers in securing remote employment at U.S. companies. This complex network not only affects the financial stability of American firms but also provides substantial illicit funding to the North Korean regime. The latest developments highlight the broad impact of such schemes, as U.S. authorities continue to tighten measures and monitor suspicious activities involving digital identity theft and unauthorized access to virtual workplaces.

Earlier news focused primarily on high-profile North Korean cyberattacks and cryptocurrency thefts orchestrated by state-backed hacking groups like Lazarus and APT38. Recent updates, however, have uncovered a more diverse strategy that combines direct hacking with the use of intermediary facilitators inside the U.S., broadening the government’s scope of prosecution from foreign hacking to domestic involvement through remote work schemes. This marks a shift in approach, as investigations now extend to individuals who provide resources and logistical support from within U.S. borders, revealing new vulnerabilities in workforce management and identity verification processes.

How Did the Justice Department Uncover the Remote IT Worker Network?

The Justice Department’s investigation uncovered elaborate operations where U.S. citizens and foreign nationals collaborated to help North Korean IT workers pose as legitimate remote employees. Schemes orchestrated by Oleksandr Didenko, a Ukrainian national, involved selling stolen identities through websites like upworksell.com and managing extensive “laptop farms” in multiple U.S. states. By facilitating false employment at over 40 different companies, Didenko’s activities generated significant revenue funneled back to North Korea. Collaborators within the United States also participated by receiving shipped computers and overseeing remote-access setups at their residences, allowing seamless impersonation by foreign workers.

Who Were the Key Individuals Involved and What Roles Did They Play?

Multiple U.S. nationals have been identified as facilitators, assisting remote North Korean operatives to bypass company security and compliance checks. Audricus Phagnasay, Jason Salazar, and Alexander Paul Travis admitted to hosting company devices, installing remote-access software, and even taking drug tests on behalf of the North Korean workers. Meanwhile, another participant, Erick Ntekereze Prince, used his firm Taggcar to channel IT contractor roles to North Korean operatives at 64 companies, collecting nearly a million dollars in total salaries. According to officials, these efforts helped North Korea obtain both funds and sensitive information from targeted businesses.

What Broader Impact Have These Schemes Had on U.S. Businesses and National Security?

Authorities report that more than 136 U.S. companies fell victim to the web of deception, leading to both financial losses and the compromise of at least 18 U.S. citizens’ identities. Investigations revealed that these schemes generated upwards of $2.2 million for North Korea’s government, which is believed to redirect such earnings toward its weapons program. The scope and sophistication of these efforts have prompted renewed scrutiny on identity verification and cybersecurity policies among American employers. Seizing over $15 million in cryptocurrency from APT38 further disrupted the regime’s access to laundered digital assets, signaling a coordinated response on both legal and technical fronts.

“These actions demonstrate the department’s comprehensive approach to disrupting North Korean efforts to finance their weapons program on the backs of Americans,” John A. Eisenberg, assistant attorney general for national security, stated.

“The department will use every available tool to protect our nation from this regime’s depredations,” Eisenberg added, underlining commitment to ongoing enforcement.

Effective responses to illicit remote employment and cryptocurrency laundering hinge on both vigilant corporate policies and robust law enforcement collaboration. The recent prosecutions demonstrate not just the extent of North Korea’s efforts but also the willingness of some individuals within the U.S. to facilitate these global schemes for profit. Comparing the multi-layered nature of the current schemes to earlier, more direct cyberattacks, companies should now consider enhanced background checks and tighter digital identity controls, especially with increased reliance on remote and contract workers. Firms are advised to monitor internal access points and remote IT staffing practices, as these are now proven vectors for supply chain compromise and financial exploitation. Consistently updated training programs and advanced monitoring of inbound networking connections remain vital for reducing exposure to similar risks.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Canada Strengthens Cyber Defenses and Talent to Counter Rising Digital Threats

Chinese Hackers Use Claude AI in Espionage, Rely on Human Oversight

NRF Leads Retail Push to Build Cybersecurity Talent Pipeline

FBI Identifies Akira Ransomware as Leading Cyber Threat to US Businesses

Hackers Steal Washington Post Data in Oracle Software Attack

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Anthropic Deploys Claude-Powered Resolve in Industrial Operations
Next Article California Agencies Utilize BurnBot RX2 Robot for Wildfire Mitigation

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Developer Keeps Blue Prince Mysteries Alive For Players
Gaming
California Agencies Utilize BurnBot RX2 Robot for Wildfire Mitigation
Robotics
Anthropic Deploys Claude-Powered Resolve in Industrial Operations
AI Technology
Garmin Forerunner 265 Hits $299.99 in Amazon Price Move
Wearables
Gabe Newell Receives Leviathan Superyacht Built by Oceanco
Gaming
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?