A Tennessee woman and a Ukrainian national were sentenced in federal court after admitting they helped North Korean operatives land remote IT jobs at more than 100 American companies, using the stolen identities of at least 80 U.S. citizens and funneling over $5 million back to the regime in Pyongyang. Their convictions, announced by the Department of Justice, are the most significant results so far in a sprawling federal crackdown that has reached 16 states and exposed a pipeline few employers knew existed.
The scheme worked like this: facilitators inside the United States received company-issued laptops at so-called “laptop farms,” installed remote-access software, and let overseas workers log in as if they were sitting in an American home office. Some facilitators also created fake profiles on hiring platforms, opened U.S. bank accounts, and even sat in on video interviews on behalf of the North Korean workers, according to an FBI public service announcement. The paychecks went to domestic accounts controlled by the facilitators, then moved overseas through a series of transfers designed to obscure their final destination.
A nationwide enforcement push
In early 2025, the Justice Department announced coordinated actions across 16 states, including searches of suspected laptop farms and seizures of financial accounts, fraudulent job-platform websites, and computer equipment. An earlier unsealed indictment described how a U.S.-based laptop farm operator and co-conspirators enabled overseas IT workers, including DPRK nationals, to pose as American citizens and pass employer background checks.
The Treasury Department’s Office of Foreign Assets Control reinforced the criminal cases with sanctions. OFAC designated specific individuals and entities as enablers of the IT worker scheme, linking their conduct directly to sanctions evasion and funding of North Korea’s weapons of mass destruction and ballistic missile programs. Those designations, while administrative rather than criminal, undergo interagency vetting and often draw on classified intelligence, signaling that Washington views these cases as national security threats, not routine employment fraud.
The threat has grown more aggressive
What began as paycheck fraud has escalated. In a January 2025 alert, the FBI reported that North Korean IT workers had begun exfiltrating proprietary source code from their employers and then extorting those companies, threatening to leak repositories or publish sensitive data if they were not paid. Some workers copied code to personal accounts outside company control within weeks of being hired.
The operatives have also adopted more sophisticated disguises. FBI warnings describe the use of AI-generated profile photos and real-time face-swapping technology during video interviews to defeat identity verification. Separately, the bureau noted that U.S.-based facilitators have helped North Korean workers purchase and fund AI models and evasion tools, a sign that the technical sophistication of these operations continues to climb.
An interagency advisory issued jointly by the State Department, Treasury, and the FBI detailed how DPRK IT workers conceal their true locations using VPNs, virtual private servers, third-country IP addresses, proxy connections, and subcontracting arrangements with freelancers in other nations. That joint guidance document described the scale of the overseas workforce and the revenue it generates for Pyongyang, and it was part of a coordinated effort with South Korea and Japan to alert private-sector employers. Public warnings from the FBI’s Internet Crime Complaint Center dating to October 2023 show that U.S. agencies have been tracking the problem for years before the recent wave of prosecutions.
What investigators still have not said
For all the enforcement activity, significant gaps remain in the public record. No federal agency has named the specific U.S. companies that unknowingly employed North Korean workers. The unsealed indictment references infiltration of roughly 30 entities, while the sentencing announcement describes placement at more than 100 companies. Whether those figures overlap or represent distinct victim pools has not been publicly reconciled.
The total revenue flowing to the North Korean regime through IT worker fraud also lacks a unified accounting. The $5 million figure comes from a single prosecuted case. OFAC has cited broader estimated regime revenue, but no consolidated audit trail connects all known schemes into one total. The true financial scale is almost certainly larger than any single case suggests, though no primary source has published a comprehensive tally.
It is also unclear how many of the U.S.-based helpers understood they were aiding sanctioned North Korean nationals rather than ordinary overseas contractors. Charging documents distinguish between co-conspirators and unwitting intermediaries, but they do not resolve how often facilitators were deceived by forged documents and deepfaked identities. That ambiguity complicates efforts to draw a clean line between criminal liability and victimization for people who handled mail, opened bank accounts, or forwarded job applications without knowing who was on the other end.
What companies are being told to do
Federal agencies have urged employers to treat the DPRK IT worker threat as a hiring-process problem, not just a cybersecurity one. The FBI’s alerts recommend verifying that remote workers’ physical locations match their claimed addresses, watching for reluctance to appear on camera or inconsistencies between a candidate’s voice and video feed, and flagging requests to reroute paychecks or ship equipment to addresses that differ from those on file.
The interagency advisory goes further, recommending that companies cross-check freelancer profiles against known indicators of DPRK-linked accounts, require in-person identity verification where feasible, and monitor for remote-access tools like AnyDesk or TeamViewer running on company-issued hardware without authorization.
As of spring 2026, more cases are expected to move from investigation to prosecution. Prosecutors have signaled that additional facilitators and victim companies may be named as sealed indictments are opened. For now, the confirmed numbers represent a floor: at least 100 companies infiltrated, at least 80 identities stolen, and at least $5 million sent to a regime under some of the heaviest sanctions on earth. The ceiling remains unknown, and every remote job listing is, in the government’s view, a potential point of entry.
More from Morning Overview
*This article was researched with the help of AI, with human editors creating the final content.