The post Maryland man sentenced to 15 months for helping North Korean hackers infiltrate US tech firms appeared on BitcoinEthereumNews.com. A man in Maryland has been sentenced to a 15-month prison sentence and three years of supervised release after a revelation that he has been helping North Korea to place IT workers inside US companies covertly. For a cool 3 years, Minh Phuong Ngoc Vong used false credentials to secure jobs with at least 13 US companies. These employers collectively paid him more than $970,000 for software development work that was actually performed by an overseas co-conspirator. North Koreans get their hands on sensitive US government systems According to court documents, Vong conspired with others, including John Doe, aka William James, a foreign national living in Shenyang, China, to hire Vong as a remote software developer.  In fact, 2 years ago, Vong participated in an online job interview with the CEO of a Virginia-based company. He verified his identity and citizenship by showing his Maryland driver’s license and US passport.  Following the interview, the company hired Vong and assigned him to work on a contract for the Federal Aviation Administration (FAA) involving a particular software application used by various US government agencies to manage sensitive information regarding national defense matters. The company provided Vong with a laptop to use in connection with his employment, and the FAA authorized Vong to receive a Personal Identity Verification card to access government facilities and systems. Vong installed remote access software on the laptop to facilitate Doe’s access to it and conceal his location in China. The company paid Vong more than $28,000 in wages for work he performed, portions of which Vong then sent overseas to Doe and other conspirators. Additionally, Vong allowed Doe and others to use his computer access credentials to perform the remote software development work and receive payment for that work.  The resume falsely represented that Vong possessed a… The post Maryland man sentenced to 15 months for helping North Korean hackers infiltrate US tech firms appeared on BitcoinEthereumNews.com. A man in Maryland has been sentenced to a 15-month prison sentence and three years of supervised release after a revelation that he has been helping North Korea to place IT workers inside US companies covertly. For a cool 3 years, Minh Phuong Ngoc Vong used false credentials to secure jobs with at least 13 US companies. These employers collectively paid him more than $970,000 for software development work that was actually performed by an overseas co-conspirator. North Koreans get their hands on sensitive US government systems According to court documents, Vong conspired with others, including John Doe, aka William James, a foreign national living in Shenyang, China, to hire Vong as a remote software developer.  In fact, 2 years ago, Vong participated in an online job interview with the CEO of a Virginia-based company. He verified his identity and citizenship by showing his Maryland driver’s license and US passport.  Following the interview, the company hired Vong and assigned him to work on a contract for the Federal Aviation Administration (FAA) involving a particular software application used by various US government agencies to manage sensitive information regarding national defense matters. The company provided Vong with a laptop to use in connection with his employment, and the FAA authorized Vong to receive a Personal Identity Verification card to access government facilities and systems. Vong installed remote access software on the laptop to facilitate Doe’s access to it and conceal his location in China. The company paid Vong more than $28,000 in wages for work he performed, portions of which Vong then sent overseas to Doe and other conspirators. Additionally, Vong allowed Doe and others to use his computer access credentials to perform the remote software development work and receive payment for that work.  The resume falsely represented that Vong possessed a…

Maryland man sentenced to 15 months for helping North Korean hackers infiltrate US tech firms

2025/12/06 02:42

A man in Maryland has been sentenced to a 15-month prison sentence and three years of supervised release after a revelation that he has been helping North Korea to place IT workers inside US companies covertly.

For a cool 3 years, Minh Phuong Ngoc Vong used false credentials to secure jobs with at least 13 US companies. These employers collectively paid him more than $970,000 for software development work that was actually performed by an overseas co-conspirator.

North Koreans get their hands on sensitive US government systems

According to court documents, Vong conspired with others, including John Doe, aka William James, a foreign national living in Shenyang, China, to hire Vong as a remote software developer. 

In fact, 2 years ago, Vong participated in an online job interview with the CEO of a Virginia-based company. He verified his identity and citizenship by showing his Maryland driver’s license and US passport. 

Following the interview, the company hired Vong and assigned him to work on a contract for the Federal Aviation Administration (FAA) involving a particular software application used by various US government agencies to manage sensitive information regarding national defense matters.

The company provided Vong with a laptop to use in connection with his employment, and the FAA authorized Vong to receive a Personal Identity Verification card to access government facilities and systems. Vong installed remote access software on the laptop to facilitate Doe’s access to it and conceal his location in China.

The company paid Vong more than $28,000 in wages for work he performed, portions of which Vong then sent overseas to Doe and other conspirators. Additionally, Vong allowed Doe and others to use his computer access credentials to perform the remote software development work and receive payment for that work. 

The resume falsely represented that Vong possessed a Bachelor of Science degree and 16 years of experience as a software developer. However, Vong did not have a college degree or experience in software development.

The court documents reveal that Vong was aware that Doe was located near North Korea. Doe’s communications show that he is likely a North Korean national who was working to generate revenue for the North Korean government. To that end, the court has reasons to believe that the conspirators gained unauthorized access to sensitive government systems.

North Korea increased its illicit cyber operations 

Employment infiltration is one among several revenue streams for North Korea’s cyber operations. The US has put on efforts to counter the infiltration campaign, including nationwide efforts to dismantle “laptop farms” launched in June. These setups, located in US homes, allow overseas North Korean IT workers to disguise their true locations by remotely controlling laptops issued by American companies to supposedly US-based employees.

“North Korea remains intent on funding its weapons programs by defrauding U.S. companies and exploiting American victims of identity theft, but the FBI is equally intent on disrupting this massive campaign and bringing its perpetrators to justice,” assistant director Roman Rozhavsky of the FBI Counterintelligence Division stated.

Last year, a federal court in St. Louis indicted 14 North Koreans for a long-running scheme to extort US companies and funnel money to Pyongyang’s weapons programs.

Besides infiltration, North Koreans scheme fraud by gaining access to companies holding crypto through employment and then hacking their wallets.  

According to blockchain analytics firm Elliptic, the country’s crypto-hacking groups have stolen approximately $2 billion in 2025 alone. This brought the total stolen digital assets in recent years by the regime to more than $6 billion. The funds, from hacks including those of crypto exchanges Bybit and Upbit, finance North Korea’s nuclear and missile programs.

However, as reported by Cryptopolitan, North Korea is allegedly using banned Nvidia GPUs to enhance its crypto theft schemes. According to recent analysis, researchers have revealed that the country has accumulated research on artificial intelligence since the late 90s, focusing on pattern recognition, speech processing, and data optimization.

The smartest crypto minds already read our newsletter. Want in? Join them.

Source: https://www.cryptopolitan.com/maryland-man-sentenced-to-15-months-for-helping-north-korean-hackers-infiltrate-us-tech-firms/

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Suspected $243M Crypto Hacker Arrested After Major Breakthrough in Global Heist

Suspected $243M Crypto Hacker Arrested After Major Breakthrough in Global Heist

Major breakthrough in $243M crypto heist as suspect arrested! $18.58M in crypto seized, linked to suspected hacker’s wallet. Dubai villa raid leads to possible arrest of crypto thief. A major breakthrough in the investigation into the $243 million crypto theft has emerged, as blockchain investigator ZachXBT claims that a British hacker, suspected of orchestrating one of the largest individual thefts in crypto history, may have been arrested. On December 5, ZachXBT revealed in a Telegram post that Danny (also known as Meech or Danish Zulfiqar Khan), the primary suspect behind the attack, was likely apprehended by law enforcement. ZachXBT pointed to a significant find: approximately $18.58 million worth of crypto currently sitting in an Ethereum wallet linked to the suspect. The investigator claimed that several addresses connected to Zulfiqar had consolidated funds to this address, mirroring patterns previously seen in law enforcement seizures. This discovery has raised suspicions that authorities may have closed in on the hacker. Moreover, ZachXBT mentioned that Zulfiqar was last known to be in Dubai, where it is alleged that a villa was raided, and multiple individuals associated with the hacker were arrested. He also noted that several contacts of Zulfiqar had gone silent in recent days, adding to the growing belief that law enforcement had made a major move against the hacker. However, no official statements from Dubai Police or UAE regulators have confirmed the arrest, and local media reports remain silent on the matter. Also Read: Song Chi-hyung: The Visionary Behind Upbit and the Future of Blockchain Innovation The $243 Million Genesis Creditor Heist: How the Attack Unfolded The arrest of Zulfiqar may be linked to one of the largest known individual crypto heists. In September 2024, ZachXBT uncovered that three attackers were involved in stealing 4,064 BTC (valued at $243 million at the time) from a Genesis creditor. The attack was carried out using sophisticated social engineering tactics. The hackers impersonated Google support to trick the victim into resetting two-factor authentication on their Gemini account, giving them access to the victim’s private keys. From there, they drained the wallet, moving the stolen BTC through a complex network of exchanges and swap services. ZachXBT previously identified the suspects by their online handles, “Greavys,” “Wiz,” and “Box,” later tying them to individuals Malone Lam, Veer Chetal, and Jeandiel Serrano. The U.S. Department of Justice later charged two of the suspects with orchestrating a $230 million crypto scam involving the theft. Further court documents revealed that the criminals had used a mix of SIM swaps, social engineering, and even physical burglaries to carry out the theft, spending millions on luxury items like cars and travel. ZachXBT’s tracking work has played a key role in uncovering several related thefts, including a $2 million scam in which Chetal was involved while out on bond. The news of Zulfiqar’s potential arrest could mark a significant turning point in the investigation, although full details are yet to emerge. Also Read: Kevin O’Leary Warns: Only Bitcoin and Ethereum Will Survive Crypto’s Reality Check! The post Suspected $243M Crypto Hacker Arrested After Major Breakthrough in Global Heist appeared first on 36Crypto.
Share
Coinstats2025/12/06 18:27