TrollEye Security

Five Indicted in North Korean IT Worker Scam Targeting U.S. Companies

Details of the Story

As reported by Dark Reading, we finally have some good news to report on in the ongoing North Korean worker scheme, the U.S. Department of Justice (DoJ) has indicted five individuals for their roles in the IT worker scam that has defrauded at least 64 American companies. The operation, which ran from April 2018 to August 2024, funneled earnings to North Korea’s government, partially funding its nuclear and missile programs.

The accused include North Koreans Pak Jin-Song and Jin Sung-Il, Mexican national Pedro Ernesto Alonso De Los Reyes, and U.S. citizens Emanuel Ashtor and Erick Ntekereze Prince. According to the DoJ, the scheme’s impact was significant, with just 10 of the 64 targeted companies losing $866,255 in wages alone.

A Scam to Sidestep International Sanctions

This scam has been conducted by North Korea in an ongoing effort to evade international sanctions by exploiting the global IT sector. Workers employed by North Korean government ministries disguised their identities and secured lucrative remote jobs in the United States. While these workers performed their roles competently, their salaries were diverted to the regime, which is heavily reliant on such schemes to sustain its economy and military ambitions.

To facilitate the fraud, the North Korean operatives used a mix of identity theft, forgery, and sophisticated technical infrastructure. Alonso, the Mexican citizen, allegedly provided his identity to help applicants pass job screenings. In other cases, stolen U.S. identification documents were altered with North Korean operatives’ photographs.

Once hired, the operatives arranged for corporate laptops to be shipped to Ashtor and Prince in North Carolina. These Americans managed “laptop farms,” installing remote access software to enable North Korean workers in China to operate the devices. Payments were funneled through registered U.S. companies and laundered through Chinese bank accounts to conceal their true destination.

Arrests and Charges

The scheme unraveled following arrests in multiple locations, including North Carolina and the Netherlands. All five defendants face an array of charges, including conspiracy to commit wire fraud, mail fraud, and money laundering, as well as conspiracy to cause damage to protected computers. The two North Korean defendants face additional charges under the International Emergency Economic Powers Act. Convictions could result in prison sentences of up to 20 years.

Broader Implications and Response

This indictment is another step in the U.S. government’s crackdown on North Korea’s illicit IT worker schemes. In March, the DoJ launched the DPRK RevGen: Domestic Enabler Initiative, which targets the infrastructure supporting these operations. Since then, authorities have made arrests and conducted asset seizures in four separate cases.

Despite these efforts, the schemes remain pervasive. Employers face many challenges detecting these operatives, with the U.S. government just now starting to perform routine arrests and sanctions.

The North Korean IT worker scam is part of a larger strategy by the regime to exploit global technology sectors, with similar operations uncovered in South Korea and Japan. For now, the U.S. government is urging companies to strengthen hiring practices and monitor for suspicious activity to prevent further infiltration. With billions of dollars and national security at stake, the fight against this scheme is far from over.

Share:

This Content Is Gated