US Soldier Enables North Korean IT Worker Scheme Hitting 136 Companies

US Army Soldier Helped North Korea Infiltrate 136 Firms
Listen 6:30
Takeaways
Hide
  • Active-duty US Army member Alexander Paul Travis earned $51,000 helping North Korean IT workers use his identity and pass drug tests for remote jobs at American companies
  • Ukrainian national Oleksandr Didenko operated Upworksell.com selling stolen US identities to North Korean workers, helping them infiltrate 40 companies before forfeiting $1.4 million
  • The scheme affected 136 US companies, generated $2.2 million for North Korea's regime, and compromised identities of more than 18 US citizens

The Department of Justice says active-duty US Army servicemember Alexander Paul Travis helped North Korean IT workers infiltrate 136 US companies by providing his identity, taking drug tests on their behalf, and operating laptop farms that make foreign workers appear to be based inside the United States.

North Korean IT Workers Used Laptop Farms To Enter U.S. Companies

Travis, age 34, pleaded guilty on November 14 to wire fraud conspiracy. Prosecutors said he provided his identity to North Korean IT workers between 2019 and 2022 and hosted company laptops in his home so the workers appeared to log in from US locations. DOJ filings stated he earned $51,000.

Three other US citizens pleaded guilty in related conduct. Audricus Phagnasay, age 24, Jason Salazar, age 30, and Erick Ntekereze Prince, age 38, admitted providing their identities and hosting laptops linked to company-issued equipment. DOJ filings said these laptops included unauthorized remote access tools that allowed overseas workers to control the devices.

Phagnasay received $3,450 and Salazar received $4,500. Prosecutors said Travis and Salazar appeared in person for employer drug testing so North Korean workers could pass vetting requirements. According to the filings, workers using these identities collected $1.28 million dollars in salaries, with the funds transferred overseas.

Prince operated through a business registered as Taggcar Inc. Prosecutors said he supplied fraudulent IT workers to US companies from June 2020 to August 2024 and earned more than $89,000. DOJ filings stated he hosted multiple company laptops at residences in Florida while knowing the workers were based overseas.

Stolen Identities Helped North Korean Workers Infiltrate U.S. Firms

Ukrainian national Oleksandr Didenko, age 28, pleaded guilty on November 10 to wire fraud conspiracy and aggravated identity theft. DOJ filings noted he ran Upworksell.com, a website that sold stolen or borrowed US identities to overseas IT workers.

Beginning in 2021, North Korean IT workers used these identities to secure employment on US freelance platforms such as Upwork and Freelancer. Prosecutors said Didenko helped them infiltrate 40 companies. He agreed to forfeit $1.4 million.

DOJ filings said Didenko managed as many as 871 proxy identities and organized at least three laptop farms inside the United States. One farm was operated by Christina Marie Chapman in Arizona, who received an 8.5-year prison sentence in July 2025.

Part of Broader North Korean Revenue Activity

The guilty pleas aligned with the Department of Justice’s DPRK RevGen: Domestic Enabler Initiative, a program targeting North Korean revenue generation networks and their US-based facilitators. A 2022 joint advisory from the FBI, Treasury, and State Department warned that North Korean IT workers could earn up to $300,000 per year and collectively channel hundreds of millions of dollars to the North Korean government.

The FBI issued public notices in May 2024 and January 2025 describing data theft, extortion, and unauthorized access linked to North Korean remote IT workers using stolen identities, alias accounts, and proxy computers.

Prosecutors also referenced a separate case from January 2025 in which Prince, U.S. national Emanuel Ashtor, and Mexican national Pedro Ernesto Alonso De Los Reyes were indicted for helping North Korean IT workers obtain employment at more than 64 companies. That case involved $943,000 in earnings. Ashtor awaited trial and De Los Reyes remained in custody in the Netherlands pending extradition.

DOJ records said federal agents searched 29 known laptop farms across 16 states in June 2025 and seized hundreds of laptops, accounts, and websites.

Chain Street’s Take

Federal filings showed the infiltration succeeded through routine onboarding steps such as drug testing and home-hosted laptops. The confirmed 136 affected companies and 29 seized laptop farms indicated persistent vulnerabilities in remote-work verification processes across US firms.

Frequently Asked Questions

How did North Korean IT workers infiltrate US companies?
Show

Facilitators provided stolen or borrowed US identities, hosted company-issued laptops in American homes, and helped North Korean workers pass vetting procedures including drug tests to make it appear they were US-based remote employees.

What is a laptop farm?
Show

A laptop farm is a residence where multiple company-issued computers are hosted with remote access software, allowing overseas workers to connect and appear as if they're working from that US location.

How much money did North Korea make from this scheme?
Show

The IT worker infiltration generated $2.2 million in revenue for North Korea across 136 companies. Separately, North Korean hackers stole over $2 billion in cryptocurrency during 2025.

What is Upworksell.com?
Show

Upworksell.com was a website operated by Ukrainian national Oleksandr Didenko that sold stolen or borrowed US identities to overseas IT workers so they could get jobs on freelance platforms. The site has been seized by authorities.

What penalties do the defendants face?
Show

Wire fraud conspiracy carries a maximum 20-year prison sentence. Aggravated identity theft carries a mandatory two-year consecutive sentence. Sentencing dates have not been announced.

How widespread are laptop farms?
Show

In June 2025, the DOJ searched 29 known laptop farms across 16 states and seized hundreds of laptops, suggesting the problem extends significantly beyond the five guilty pleas announced Friday.

The author, a seasoned journalist with no cryptocurrency holdings, presents this article for informational purposes only. It does not constitute investment advice or an endorsement of any cryptocurrency, security, or other financial instrument. Readers should conduct their own research and, if needed, consult a licensed financial professional before making any financial decisions.