Ukrainian man jailed for identity theft that helped North Koreans get jobs at US companies
#North Korea#Identity theft#Cybersecurity#FBI#North Korean IT workers#Sanctions#Laptop farms#Upworksell
📌 Key Takeaways
Ukrainian man sentenced to 5 years for identity theft scheme benefiting North Korea
Operation involved website Upworksell that sold stolen US identities
North Korean workers used 'laptop farms' to remotely work in US companies
Scheme aimed to fund North Korea's nuclear weapons program
North Korean IT workers pose triple threat: sanctions violations, data theft, and extortion
📖 Full Retelling
Ukrainian national Oleksandr Didenko, 29, was sentenced to five years in prison by a U.S. federal court in 2024 for running an identity theft operation that helped North Korean workers gain fraudulent employment at dozens of U.S. companies, with the earnings being funneled back to Pyongyang to fund the regime's internationally sanctioned nuclear weapons program. The operation, which Didenko managed through a website called Upworksell, involved facilitating the purchase or rental of stolen American identities to overseas workers, including North Koreans seeking employment with U.S. firms. According to the U.S. Department of Justice, Didenko handled more than 870 stolen identities as part of this sophisticated scheme.
The investigation revealed that Didenko also arranged for individuals in California, Tennessee, and Virginia to host "laptop farms" – rooms containing racks of open laptops that allowed North Koreans to remotely perform their work as if they were physically present in the United States. These setups enabled the North Korean workers to bypass geographical restrictions while maintaining their fraudulent employment. The FBI seized Upworksell in 2024 and redirected its traffic to its own servers, eventually leading to Didenko's arrest in Poland and subsequent extradition to the United States, where he pleaded guilty to the charges.
Security researchers have described North Korean workers as a "triple threat" to U.S. and Western businesses, as they violate U.S. sanctions, enable the theft of sensitive company data, and later extort victim companies into not publicly revealing the breaches. This case represents the latest in a series of convictions targeting individuals involved in facilitating North Korean "IT worker" schemes. Security firm CrowdStrike has reported a significant increase in North Korean infiltrations, often as remote developers or technical software engineers. The operation is part of broader efforts by the North Korean regime to generate revenue amid international financial sanctions, with additional methods including impersonating recruiters and venture capitalists to trick high-profile targets into granting access to their computers and cryptocurrency holdings.
🏷️ Themes
Cybersecurity, International sanctions, Identity theft
The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. An agency of the United States Department of Justice, the FBI is a member of the U.S. Intelligence Community and reports to both the atto...
Identity theft, identity piracy or identity infringement occurs when someone uses another's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term identity theft was coined in 1964. Since that ...
Protection of computer systems from information disclosure, theft or damage
Computer security (also cyber security, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It focuses on protecting computer software, systems, and networks from threats that can lead to unauthorized information disclosure, theft o...
North Korea, officially the Democratic People's Republic of Korea (DPRK), is a country in East Asia. It constitutes the northern half of the Korean Peninsula and borders China and Russia to the north at the Yalu (Amnok) and Tumen rivers, and South Korea to the south at the Korean Demilitarized Zone ...
A U.S. federal court has sentenced a Ukrainian man to five years in prison for his part in a long-running identity theft operation that helped overseas North Korean workers gain fraudulent employment at dozens of U.S. companies. U.S. prosecutors brought charges in 2024 against Oleksandr Didenko, 29, a resident of Kyiv, for setting up North Koreans with stolen identities of U.S. citizens to get hired and earn a wage. Under this scheme, the workers’ earnings were funneled back to Pyongyang, which the regime used to fund its internationally sanctioned nuclear weapons program. This is the latest in a string of recent convictions of individuals involved in facilitating ongoing North Korean so-called “IT worker” schemes . Security researchers have described North Korean workers as a “triple threat” to U.S. and Western businesses, as they violate U.S. sanctions, all the while enabling North Koreans to steal sensitive company data, and then later extort those victim companies into not publicly releasing corporate secrets. Prosecutors said Didenko ran a website called Upworksell, which allowed people working overseas, including North Koreans, to buy or rent stolen identities for gaining employment with U.S. firms. Didenko handled more than 870 stolen identities, per the Justice Department. The FBI seized Upworksell in 2024 and diverted its traffic to its own servers. Polish authorities arrested Didenko, who was then extradited to the U.S. and later pleaded guilty. In a statement this week , the U.S. Department of Justice said Didenko also paid people to receive and host computers at their homes in California, Tennessee, and Virginia. These “laptop farms” are rooms containing racks of open laptops, allowing North Koreans to remotely perform their work as if they were physically in the United States. Security giant CrowdStrike said last year that it has seen a sharp rise in the number of North Korean workers infiltrating companies, often as remote developers or other technical...