← Back to Crime & Security

Two U.S. Nationals Sentenced for Enabling North Korean IT Fraud

Crime & SecurityAI-Generated & Algorithmically Scored·

AI-generated from multiple sources. Verify before acting on this reporting.

WASHINGTON — Two American nationals were sentenced to 18 months in prison each on Wednesday for operating laptop farms that facilitated North Korean IT workers in fraudulently securing remote employment at nearly 70 U.S. companies.

Matthew Isaac Knoot and Erick Ntekereze Prince were convicted of conspiring to commit wire fraud and money laundering. The operation allowed North Korean state-sponsored hackers to infiltrate American corporate networks, generating illicit revenue for the heavily sanctioned regime in Pyongyang.

The scheme involved the defendants setting up infrastructure to mask the true location of the workers. By using laptops and virtual private networks, the North Korean operatives could pose as legitimate employees working from within the United States. This deception enabled them to bypass sanctions and access corporate systems that would otherwise be restricted.

Federal prosecutors stated that the defendants knowingly partnered with North Korean entities to exploit the growing trend of remote work. The fraud allowed the regime to siphon funds directly from American businesses, undermining U.S. economic sanctions designed to pressure the North Korean government.

Knoot and Prince pleaded guilty to the charges earlier this year. During sentencing, the judge emphasized the severity of the offense, noting that the defendants had directly aided a foreign adversary in violating U.S. law. The 18-month sentences were accompanied by orders for restitution to the affected companies.

The case highlights the evolving nature of cyber-enabled financial crimes involving sanctioned nations. As remote work policies expanded, the opportunity for foreign actors to infiltrate corporate networks increased. The defendants' operation exploited this shift to create a pipeline for illicit revenue generation.

Investigators noted that the laptop farms were sophisticated, utilizing multiple layers of encryption to hide the workers' identities. The North Korean IT workers were paid in cryptocurrency, further complicating the tracking of funds. The operation spanned several years before authorities dismantled the network.

The Department of Justice has warned that similar schemes may still be active. Officials are urging companies to implement stricter verification processes for remote employees, particularly those hired through third-party intermediaries. The sentencing serves as a deterrent to others who might consider facilitating such operations.

Questions remain regarding the full extent of the financial losses suffered by the affected companies. While the defendants have been sentenced, the recovery of stolen funds is ongoing. Authorities are continuing to investigate potential accomplices and the broader network of North Korean IT operations targeting U.S. businesses.

The case underscores the intersection of cybercrime, economic sanctions, and national security. As global remote work continues to evolve, the risk of exploitation by foreign adversaries remains a significant concern for U.S. corporations and law enforcement agencies.