Feds Crack Down on North Korean Spies Working Re…

The DOJ has busted 29 North Korean laptop farms across 16 states, alleging that illicit IT workers located in the communist dictatorship obtained employment with over 100 American companies to help fund the regime’s weapons programs.

The DOJ announced this week that it has conducted a series of actions targeting North Korean IT workers who have successfully infiltrated American companies. The operation included two indictments, an arrest, searches of 29 known or suspected “laptop farms” across 16 states, and the seizure of 29 financial accounts used for money laundering and 21 fraudulent websites.

The Justice Department revealed that certain U.S.-based individuals allegedly enabled one of the schemes by creating front companies and fraudulent websites to promote the credentials of the remote IT workers and hosted laptop farms where the North Korean operatives could remotely access computers provided by their victims. These laptop farms circumvent the suspicion that would arise from shipping a laptop outside the country for a supposedly U.S.-based worker.

International sanctions have made it nearly impossible for North Korea to fund its nuclear ambitions through legitimate means. As a result, the country has turned to alternative sources of income, such as stealing billions of dollars worth of cryptocurrency, conducting ransomware operations, and now, placing operatives in high-paying jobs at U.S. tech companies.

The State Department, Treasury Department, and FBI had previously warned in 2022 that North Korea had dispatched thousands of highly skilled IT workers worldwide, often misrepresenting themselves as foreign or U.S.-based teleworkers. These operatives use virtual private networks (VPNs), virtual private servers (VPSs), purchased third-country IP addresses, proxy accounts, and falsified or stolen identification documents to evade detection.

Despite the revelation of these funding operations, North Korea has not been discouraged. In fact, Google Cloud reported in March that the threat has evolved, with North Korean IT workers expanding their reach beyond the U.S., particularly focusing on Europe. They have also intensified extortion campaigns against employers and moved to conduct operations in corporate virtual desktops, networks, and servers.

Shutting down these operations can help protect companies from North Korean operatives who plan to use their access to private resources to steal intellectual property, provide information for more overt cybercrime, and steal cryptocurrency. In one case, an undercover worker stole virtual currency worth over $900,000 from an Atlanta-based company.

Lucas Nolan is a reporter for Breitbart News covering issues of free speech and online censorship.

Views: 0
About Steve Allen 6292 Articles
My name is Steve Allen and I’m the publisher of ThinkAboutIt.online. Any controversial opinions in these articles are either mine alone or a guest author and do not necessarily reflect the views of the websites where my work is republished. These articles may contain opinions on political matters, but are not intended to promote the candidacy of any particular political candidate. The material contained herein is for general information purposes only. Commenters are solely responsible for their own viewpoints, and those viewpoints do not necessarily represent the viewpoints of the operators of the websites where my work is republished. Follow me on social media on Facebook and X, and sharing these articles with others is a great help. Thank you, Steve

Be the first to comment

Leave a Reply

Your email address will not be published.


*


This site uses Akismet to reduce spam. Learn how your comment data is processed.