The U.S. Justice Department arrested Matthew Isaac Knoot (38) from Nashville (Tennessee) for operating a “laptop farm” that facilitated North Korea-linked IT workers in obtaining remote jobs with American companies.
The man was arrested for his efforts to generate revenue for North Korea’s illicit weapons program, which includes weapons of mass destruction (WMD).<\/p>\n\n\n\n
In May, the FBI also\u00a0issued an advisory<\/a>\u00a0warning the public and private sector of the threat posed to the U.S. businesses by Information Technology (IT) workers from the Democratic People\u2019s Republic of Korea (North Korea).\u00a0<\/p>\n\n\n\n
“According to court documents, Knoot participated in a scheme to obtain remote employment with American and British companies for foreign information technology (IT) workers, who were actually North Korean actors.” reads the press release<\/strong><\/a> published by DoJ. “Knoot allegedly assisted them in using a stolen identity to pose as a U.S. citizen; hosted company laptops at his residences; downloaded and installed software without authorization on such laptops to facilitate access and perpetuate the deception; and conspired to launder payments for the remote IT work, including to accounts tied to North Korean and Chinese actors.”<\/em><\/p>\n\n\n\n
In May, the Justice Department unsealed charges against an Arizona woman<\/strong><\/a>, a Ukrainian man, and three unidentified foreign nationals accused of aiding overseas IT workers, pretending to be U.S. citizens, to infiltrate hundreds of firms in remote IT positions. North Korea used this scheme to dispatch thousands of skilled IT workers globally, using stolen U.S. identities to infiltrate companies and raise revenue. The schemes defrauded over 300 U.S. companies, utilizing U.S. payment platforms, online job sites, and proxy computers. According to the DoJ, this is the largest scheme of this kind ever charged by US authorities.<\/p>\n\n\n\n
\u201cChapman and her co-conspirators allegedly compromised more than 60 identities of U.S. persons, impacted more than 300 U.S. companies, caused false information to be conveyed to DHS on more than 100 occasions, created false tax liabilities for more than 35 U.S. persons, and resulted in at least $6.8 million of revenue to be generated for the overseas IT workers.\u00a0The department seized funds related to scheme from Chapman as well as wages and monies accrued by more than 19 overseas IT workers.\u201d reads the\u00a0press release<\/a>\u00a0published by DoJ.<\/em>
Concurrent with DoJ\u2019s announcement, the U.S. Department of State\u00a0announced\u00a0a reward<\/a>\u00a0of up to $5 million for information related to the above three individuals.
Follow me on Twitter:\u00a0@securityaffairs<\/strong><\/a>\u00a0and\u00a0Facebook<\/strong><\/a>\u00a0and\u00a0Mastodon<\/a><\/p>\n\n\n\n
Pierluigi Paganini<\/strong><\/a><\/p>\n\n\n\n
(<\/strong>SecurityAffairs<\/strong><\/a>\u00a0\u2013<\/strong>\u00a0hacking, North Korea)<\/strong><\/p>\n\n\n\n