FindArticles FindArticles
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
FindArticlesFindArticles
Font ResizerAa
Search
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
Follow US
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.
FindArticles > News

Five Plead Guilty in North Korean Remote IT Scheme

Bill Thompson
Last updated: November 14, 2025 6:13 pm
By Bill Thompson
News
7 Min Read
SHARE

Five people have confessed to assisting North Korean agents in posing as U.S.-based remote IT workers whose services were tapped for the networks and payrolls of 136 American businesses, which funneled funds back to Pyongyang, according to the Department of Justice. Prosecutors said the operation hijacked stolen identities, domestic internet footprints and company-issued laptops to present foreign workers as hired locally with such convincing that at least $2.2 million went to the regime.

How the North Korean Remote IT Worker Network Operated

Investigators also detail a legion of U.S.-based “facilitators” who loaned real, fake or stolen identities to North Korean IT workers while hosting corporate laptops in their houses so access looked like it came from American IP addresses. The setup assisted foreign workers in passing onboarding checks and assuming day-to-day operations, including testing negative for drugs or bad background vetting — by fobbing those off on a stand-in.

Table of Contents
  • How the North Korean Remote IT Worker Network Operated
  • Scope of the Infiltration Across 136 U.S. Companies
  • Why Remote I.T. Jobs Became a Strategic Target for Pyongyang
  • Red Flags Companies Missed in Remote Hiring and Payroll Security
  • Legal and Security Risks for Employers and Their Contractors
Five plead guilty in North Korean remote IT worker scheme cybercrime case

Three U.S. citizens — Audricus Phagnasay, Jason Salazar and Alexander Paul Travis — pleaded guilty to wire fraud conspiracy for allowing employment in their names as well as providing remote access to the company’s devices.

Travis, at the time an active-duty member of the U.S. Army, earned more than $50,000; Phagnasay and Salazar each received no less than $3,500 and $4,500 respectively for their parts in the conspiracy, prosecutors said.

A third defendant, Erick Ntekereze Prince, operated out of Florida under the name Taggcar and provided “certified” IT workers to U.S. firms even though he knew they lived outside the United States and had used fraudulent documents, according to prosecutors. Prince stored the remote-access laptops at several homes and collected at least $89,000.

Oleksandr Didenko, a Ukrainian national, pleaded guilty to wire fraud conspiracy and aggravated identity theft after he sold the identities of American citizens to North Korean IT workers who subsequently obtained employment at more than 40 companies. As part of the plea bargain, he agreed to forfeit $1.4 million.

Scope of the Infiltration Across 136 U.S. Companies

American companies had what the Justice Department described on Thursday as a collective moment of doubt and ended up inadvertently contributing about $1.28 million to salaries for these so-called employees, with the majority of that money flowing to operatives outside their home countries. Officials said they had frozen and seized some $15 million in cryptocurrency linked to North Korean hacking crews — evidence that payroll fraud, identity crime and cybertheft have become overlapping revenue streams for a heavily sanctioned state.

U.S. agencies have warned for years that North Korean IT workers carry assumed personas, frequently with glossy resumes, credible GitHub portfolios and references cooked up through broker networks. Public advisories from the F.B.I., CISA and the Treasury Department outline tactics including beefed-up identity fraud, the use of residential proxies or “laptop mules” to spoof locations where applications are launched, and coordinated interview coaching to defeat vetting.

Why Remote I.T. Jobs Became a Strategic Target for Pyongyang

Distributed work also made it easier for bad actors to hide their true location of residence and work. Many companies depend on third-party staffing firms, remote onboarding and automated checks that prize velocity over due diligence. That leaves room for suave fakes who are able to procure stolen identity documents, disguise U.S. internet footprints and practice technical interviews. For North Korea, the benefit is strategic: steady hard-currency earnings with relatively low operational risk compared with high-profile hacks.

A person in a dark hoodie is seen from behind, typing on a laptop with green code displayed on the screen. In the background, the flag of North Korea is visible.

U.N. and independent security analysts have documented how salaries from IT work can be taxed, coerced or otherwise captured by the state. In addition to the headline-prominent thefts of entire networks by groups like Lazarus, this whispering wage stream is a dependable sanctions-evasion vehicle that mixes into normal corporate processes.

Red Flags Companies Missed in Remote Hiring and Payroll Security

Cases like these reveal repeated failings:

  • Identity proofing confined to document scans
  • Inconsistent IP geolocation checks
  • The unchecked use of remote-access tools
  • A willingness to accept candidates who refuse video or in-person verifications

Employers also report oddities like:

  • Strange work hours across time zones
  • Requests to have pay rerouted to third parties
  • The same resumes traveling under different names

Experts advise a layered approach:

  • High-assurance identity verification in line with NIST guidance
  • Device geofencing and telemetry that alerts on repeated VPN or proxy use
  • Continuous user-behavior analytics
  • More rigorous contractor onboarding with in-person or supervised verification, whenever possible

Here are a number of tips that payroll and vendor management teams can use to screen against OFAC’s list of sanctioned entities and monitor for rapid banking information, phone numbers or physical address changes.

Legal and Security Risks for Employers and Their Contractors

In addition to the fraud losses, companies are at risk of sanctions exposure if funds or services go to designated entities, even inadvertently. The DOJ indicated that coordination will continue between criminal, sanctions and civil recovery actions — which means indictments, asset forfeiture and cryptocurrency seizures will run in parallel. The warning message from prosecutors is stark: facilitating disguised North Korean labor, whether intentionally or through negligence, carries genuine legal risk.

For boards and security leaders, the conclusion is to consider workforce integrity as a cyber risk. Code signing, endpoint security and vendor access should be the same standard as governance, identity proofing and the controls around remote work. The infiltration of 136 companies was not a one-time proposition; it’s a playbook that can be repeated. The faster companies close these gaps, the less appealing they are to state-sponsored fraud networks.

Bill Thompson
ByBill Thompson
Bill Thompson is a veteran technology columnist and digital culture analyst with decades of experience reporting on the intersection of media, society, and the internet. His commentary has been featured across major publications and global broadcasters. Known for exploring the social impact of digital transformation, Bill writes with a focus on ethics, innovation, and the future of information.
Latest News
Verizon Restores Loyalty Discounts in Move to Stem Churn
Boeing Strikes a Carbon Removal Deal With Charm Industrial
Anker Announces Limited Deals on Solix C200 and C300
Audible kicks off 99-cent sale with a $20 credit offer
YouTube Search Filters Broken on Desktop
Red Dead Redemption hits PS5, Xbox, iOS and Android
Google Teaches Gemini Agents in Goat Simulator 3
Apple AirTag Hits an All-Time Record-Low Price Today
Lego Star Wars Grogu Set Drops to 50% Off
WhatsApp to Roll Out Third-Party Chats in Europe
Google Ordered To Pay €572M In Price Case By German Court
Vine Reboot Backed by Jack Dorsey Revealed
FindArticles
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
  • Corrections Policy
  • Diversity & Inclusion Statement
  • Diversity in Our Team
  • Editorial Guidelines
  • Feedback & Editorial Contact Policy
FindArticles © 2025. All Rights Reserved.