ChainStreet
WHERE CODE MEETS CAPITAL
Loading prices…
Powered by CoinGecko
Blockchain Tech

US Soldier Enables North Korean IT Worker Scheme Hitting 136 Companies

Active-duty U.S. soldier among 5 who pleaded guilty helping North Korean IT workers infiltrate 136 US companies using laptop farms and stolen identities.

US Soldier Enables North Korean IT Worker Scheme Hitting 136 Companies

The Department of Justice says active-duty US Army servicemember Alexander Paul Travis helped North Korean IT workers infiltrate 136 US companies by providing his identity, taking drug tests on their behalf, and operating laptop farms that make foreign workers appear to be based inside the United States.

Key Takeaways
  • Active-duty U.S. Army soldier Alexander Paul Travis pleads guilty to operating laptop farms for North Korean IT workers.
  • The sophisticated domestic infiltration scheme compromises 136 American businesses and generates $2.2 million in illicit revenue for Pyongyang.
  • This state-sponsored facilitation exposes critical vulnerabilities in corporate remote-work verification processes and standard identity management protocols across the United States.
Listen to this article

North Korean IT Workers Used Laptop Farms To Enter U.S. Companies

Travis, age 34, pleaded guilty on November 14 to wire fraud conspiracy. Prosecutors said he provided his identity to North Korean IT workers between 2019 and 2022 and hosted company laptops in his home so the workers appeared to log in from US locations. DOJ filings stated he earned $51,000.

Three other US citizens pleaded guilty in related conduct. Audricus Phagnasay, age 24, Jason Salazar, age 30, and Erick Ntekereze Prince, age 38, admitted providing their identities and hosting laptops linked to company-issued equipment. DOJ filings said these laptops included unauthorized remote access tools that allowed overseas workers to control the devices.

Phagnasay received $3,450 and Salazar received $4,500. Prosecutors said Travis and Salazar appeared in person for employer drug testing so North Korean workers could pass vetting requirements. According to the filings, workers using these identities collected $1.28 million dollars in salaries, with the funds transferred overseas.

Prince operated through a business registered as Taggcar Inc. Prosecutors said he supplied fraudulent IT workers to US companies from June 2020 to August 2024 and earned more than $89,000. DOJ filings stated he hosted multiple company laptops at residences in Florida while knowing the workers were based overseas.

Advertisement · Press Release

Genuine News Deserves Honest Attention.

High-conviction projects require an intelligent audience. Connect with readers who value sharp reporting.

👉 Submit Your PR

Stolen Identities Helped North Korean Workers Infiltrate U.S. Firms

Ukrainian national Oleksandr Didenko, age 28, pleaded guilty on November 10 to wire fraud conspiracy and aggravated identity theft. DOJ filings noted he ran Upworksell.com, a website that sold stolen or borrowed US identities to overseas IT workers.

Beginning in 2021, North Korean IT workers used these identities to secure employment on US freelance platforms such as Upwork and Freelancer. Prosecutors said Didenko helped them infiltrate 40 companies. He agreed to forfeit $1.4 million.

DOJ filings said Didenko managed as many as 871 proxy identities and organized at least three laptop farms inside the United States. One farm was operated by Christina Marie Chapman in Arizona, who received an 8.5-year prison sentence in July 2025.

Part of Broader North Korean Revenue Activity

The guilty pleas aligned with the Department of Justice’s DPRK RevGen: Domestic Enabler Initiative, a program targeting North Korean revenue generation networks and their US-based facilitators. A 2022 joint advisory from the FBI, Treasury, and State Department warned that North Korean IT workers could earn up to $300,000 per year and collectively channel hundreds of millions of dollars to the North Korean government.

The FBI issued public notices in May 2024 and January 2025 describing data theft, extortion, and unauthorized access linked to North Korean remote IT workers using stolen identities, alias accounts, and proxy computers.

Prosecutors also referenced a separate case from January 2025 in which Prince, U.S. national Emanuel Ashtor, and Mexican national Pedro Ernesto Alonso De Los Reyes were indicted for helping North Korean IT workers obtain employment at more than 64 companies. That case involved $943,000 in earnings. Ashtor awaited trial and De Los Reyes remained in custody in the Netherlands pending extradition.

DOJ records said federal agents searched 29 known laptop farms across 16 states in June 2025 and seized hundreds of laptops, accounts, and websites.

Chain Street’s Take

Federal filings showed the infiltration succeeded through routine onboarding steps such as drug testing and home-hosted laptops. The confirmed 136 affected companies and 29 seized laptop farms indicated persistent vulnerabilities in remote-work verification processes across US firms.

CHAIN STREET INTELLIGENCE

Activate Intelligence Layer

Institutional-grade structural analysis for this article.

FAQ

Frequently Asked Questions

01

What is a laptop farm?

A laptop farm is a physical residence where facilitators host multiple company-issued computers connected to remote access software. The setup allows overseas workers to log into corporate networks while appearing to operate from a domestic United States location. It actively subverts corporate geolocation security protocols.
02

Why does this matter for corporate cybersecurity?

The scheme allowed sanctioned North Korean operatives to bypass standard human resources vetting and access sensitive corporate networks. It proves that remote-work policies harbor massive physical security flaws when identities are compromised. The generated salaries directly fund the illicit weapons programs of the North Korean government.
03

How did the facilitators execute this scheme?

Alexander Paul Travis provided his identity to foreign workers between 2019 and 2022 in exchange for $51,000. He appeared in person for employer drug testing to ensure the North Korean operatives passed mandatory corporate vetting. Ukrainian national Oleksandr Didenko supplied additional stolen identities through a platform called Upworksell.
04

What are the risks or critiques?

Critics argue that American companies rely too heavily on superficial background checks for remote contractors. A severe national security risk emerges when active-duty military personnel actively facilitate state-sponsored espionage networks. The Department of Justice warns that hundreds of undetected laptop farms likely remain operational across the country.
05

What happens next?

Alexander Paul Travis faces a maximum 20-year prison sentence for wire fraud conspiracy at his upcoming sentencing hearing. Federal agents will aggressively expand the DPRK RevGen initiative to raid suspected laptop farms across additional states. U.S. corporations will implement strict biometric verification requirements for all remote IT contractors.

You Might Also Like

CHAINSTREET
🛡
Alex Reeve

Alex Reeve is a contributing writer for ChainStreet.io. Her articles provide timely insights and analysis across these interconnected industries, including regulatory updates, market trends, token economics, institutional developments, platform innovations, stablecoins, meme coins, policy shifts, and the latest advancements in AI, applications, tools, models, and their broader implications for technology and markets.

The views and opinions expressed by Alex in this article are her own and do not necessarily reflect the official position of ChainStreet.io, its management, editors, or affiliates. This content is provided for informational and educational purposes only and does not constitute financial, investment, legal, or tax advice. Readers should conduct their own research and consult qualified professionals before making any decisions related to digital assets, cryptocurrencies, or financial matters. ChainStreet.io and its contributors are not responsible for any losses incurred from reliance on this information.