Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      June 4, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      June 4, 2025

      How To Prevent WordPress SQL Injection Attacks

      June 4, 2025

      Smashing Animations Part 4: Optimising SVGs

      June 4, 2025

      I test AI tools for a living. Here are 3 image generators I actually use and how

      June 4, 2025

      The world’s smallest 65W USB-C charger is my latest travel essential

      June 4, 2025

      This Spotlight alternative for Mac is my secret weapon for AI-powered search

      June 4, 2025

      Tech prophet Mary Meeker just dropped a massive report on AI trends – here’s your TL;DR

      June 4, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Beyond AEM: How Adobe Sensei Powers the Full Enterprise Experience

      June 4, 2025
      Recent

      Beyond AEM: How Adobe Sensei Powers the Full Enterprise Experience

      June 4, 2025

      Simplify Negative Relation Queries with Laravel’s whereDoesntHaveRelation Methods

      June 4, 2025

      Cast Model Properties to a Uri Instance in 12.17

      June 4, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      My Favorite Obsidian Plugins and Their Hidden Settings

      June 4, 2025
      Recent

      My Favorite Obsidian Plugins and Their Hidden Settings

      June 4, 2025

      Rilasciata /e/OS 3.0: Nuova Vita per Android Senza Google, Più Privacy e Controllo per l’Utente

      June 4, 2025

      Rilasciata Oracle Linux 9.6: Scopri le Novità e i Miglioramenti nella Sicurezza e nelle Prestazioni

      June 4, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»North Korean Cyber Fraud Scheme Targets U.S. Firms, DOJ Indicts Five Individuals

    North Korean Cyber Fraud Scheme Targets U.S. Firms, DOJ Indicts Five Individuals

    January 24, 2025

    North Korean Cyber Fraud Scheme

    The U.S. Department of Justice announced the indictment of two North Korean nationals and three facilitators for their involvement in a long-running cyber fraud scheme to deceive U.S. companies into hiring remote information technology (IT) workers. The cyber fraud scheme, spanning from 2018 to 2024, generated significant revenue for North Korea, with at least $866,255 funneled through illicit means.

    The indicted individuals include North Korean nationals Jin Sung-Il and Pak Jin-Song, Mexican national Pedro Ernesto Alonso De Los Reyes, and U.S. nationals Erick Ntekereze Prince and Emanuel Ashtor.

    The Justice Department describes their actions as part of a broader effort by North Korea to evade sanctions and fund the country’s weapons programs by exploiting remote work opportunities in the IT sector.

    Cyber Fraud Scheme: A Coordinated Effort to Deceive U.S. Companies

    The indictment outlines how the five individuals used a network of deception to secure remote IT jobs with at least 64 U.S. companies. The defendants used forged and stolen identity documents, including U.S. passports, to hide their true identities and circumvent sanctions. This allowed them to work as freelance IT professionals, despite being based in North Korea.

    In total, the scheme generated over $866,000 in revenue, which was largely laundered through a Chinese bank account. The illicit funds were transferred to support North Korea’s regime, including its weapons development programs. According to the indictment, the group used remote access software to manipulate victim companies into believing they were hiring legitimate U.S.-based workers.

    The Role of Laptop Farms

    One of the key components of this fraudulent operation was the use of “laptop farms.” These were physical locations, such as the one operated by Emanuel Ashtor in North Carolina, where laptops provided by U.S. companies were installed with remote access software to perpetuate the deception. The laptops were configured to make it appear as though workers were based in the U.S., when in reality, they were in countries like China or Russia, working on behalf of the North Korean regime.

    The FBI arrested Ntekereze and Ashtor in connection with the operation, and Alonso was apprehended in the Netherlands on January 10, 2025. Ashtor’s laptop farm played a crucial role in deceiving U.S. companies into providing laptops and trusting that they were hiring remote workers based in the U.S.

    North Korea’s IT Worker Scheme and Global Impact

    North Korea’s IT worker scheme has been an ongoing concern for the global community. Thousands of skilled North Korean IT workers have been sent abroad, primarily to China and Russia, with the goal of infiltrating U.S. companies. These workers are often highly skilled and can earn up to $300,000 annually, generating significant sums that support North Korea’s weapons programs and other sanctioned activities.

    The U.S. government has warned that North Korea’s IT workers use a variety of tools to conceal their identities, including fake online job sites, pseudonymous accounts, and proxy computers. These workers have generated hundreds of millions of dollars for the North Korean regime, and the fraudulent scheme uncovered by the Justice Department is just one example of the broader effort to circumvent sanctions.

    Legal Consequences for the Defendants

    The defendants face serious charges, including conspiracy to cause damage to a protected computer, conspiracy to commit wire fraud and mail fraud, conspiracy to commit money laundering, and conspiracy to transfer false identification documents. Jin and Pak, as North Korean nationals, are also charged with conspiracy to violate the International Emergency Economic Powers Act.

    If convicted, the defendants could face up to 20 years in prison. The court will determine the final sentences after considering various statutory factors and U.S. Sentencing Guidelines.

    Ongoing Efforts to Combat North Korean Cyber Threats

    This indictment is part of the Department of Justice’s broader efforts to disrupt North Korea’s cyber-enabled sanctions-evading schemes. The FBI’s Cyber Division, in partnership with the U.S. Department of State and the Department of the Treasury, has been investigating and targeting these activities for several years. In March 2024, the National Security Division and the FBI launched the “DPRK RevGen: Domestic Enabler Initiative” to identify and shut down U.S.-based “laptop farms” that host remote IT workers affiliated with North Korea.

    The Justice Department’s efforts have already led to successful actions in October 2023, May 2024, August 2024, and December 2024, which targeted similar schemes. The FBI has issued several advisories, including a May 2022 alert, warning the international community about the growing risk posed by North Korean IT workers. The most recent update, issued in May 2024, provides guidance on identifying potential threats and mitigating risks associated with the scheme.

    Continued Assistance for U.S. Companies

    The FBI has emphasized its commitment to assisting U.S. companies that may have fallen victim to this type of fraud. The agency urges any organizations that believe they may have been targeted by North Korean IT workers to reach out to their local FBI field office for support. The FBI is also offering guidance on how businesses can better detect and prevent such schemes in the future.

    “The FBI remains committed to assisting victims of these frauds and providing the necessary tools to prevent similar incidents,” said Bryan Vorndran, Assistant Director of the FBI’s Cyber Division. “Our work is ongoing, and we will continue to pursue those responsible for exploiting U.S. companies for the benefit of North Korea’s regime.”

    Source: Read More

    Hostinger
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleBe careful what you say about data leaks in Turkey, new law could mean prison for reporting hacks
    Next Article FalconFeedsio X Account Hacked, Promoting Fraudulent Crypto Scams

    Related Posts

    Security

    HPE StoreOnce Faces Critical CVE-2025-37093 Vulnerability — Urges Immediate Patch Upgrade

    June 4, 2025
    Security

    CISA Adds Qualcomm Vulnerabilities to KEV Catalog

    June 4, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Uno Calculator – port of Windows calculator

    Linux

    Elden Ring Nightreign Night Aspect: How to beat Heolstor the Nightlord, the final boss

    News & Updates

    HPE partners with Nvidia to offer ‘turnkey’ GenAI development and deployment

    Development

    Superposition Prompting: Improving and Accelerating Retrieval-Augmented Generation

    Development

    Highlights

    How To Write Test Cases For Checkbox

    August 3, 2024

    Creating effective test cases for checkboxes is essential in ensuring that applications function as intended and meet user needs. In this article, we will provide a detailed understanding of checkboxes, explore their use cases, and outline various test cases to validate their functionality. This guide is tailored for software testers, developers, and quality assurance professionals…
    The post How To Write Test Cases For Checkbox appeared first on Software Testing Material.

    Windows 11 update fixes printer bug auto printing random texts, confirms Microsoft

    March 26, 2025

    Key Metrics for Evaluating Large Language Models (LLMs)

    June 20, 2024

    Meet Intuned: An AI-Powered Browser Automation Platform for Developers and Product Teams

    July 1, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.