{"id":253172,"date":"2024-08-10T15:23:49","date_gmt":"2024-08-10T15:23:49","guid":{"rendered":"https:\/\/michigandigitalnews.com\/index.php\/2024\/08\/10\/nashville-man-accused-of-helping-north-koreans-get-remote-work\/"},"modified":"2025-06-25T17:12:36","modified_gmt":"2025-06-25T17:12:36","slug":"nashville-man-accused-of-helping-north-koreans-get-remote-work","status":"publish","type":"post","link":"https:\/\/michigandigitalnews.com\/index.php\/2024\/08\/10\/nashville-man-accused-of-helping-north-koreans-get-remote-work\/","title":{"rendered":"Nashville man accused of helping North Koreans get remote work"},"content":{"rendered":"<p> [ad_1]<br \/>\n<br \/><img decoding=\"async\" src=\"https:\/\/fortune.com\/img-assets\/wp-content\/uploads\/2024\/08\/GettyImages-698034510-e1723302075166.jpg?w=2048\" \/><\/p>\n<p>The Department of Justice this week <a href=\"https:\/\/www.justice.gov\/opa\/pr\/justice-department-disrupts-north-korean-remote-it-worker-fraud-schemes-through-charges-and\" target=\"_blank\" aria-label=\"Go to https:\/\/www.justice.gov\/opa\/pr\/justice-department-disrupts-north-korean-remote-it-worker-fraud-schemes-through-charges-and\" rel=\"noopener\" class=\"sc-93594058-0 fowfrQ\">announced<\/a> that it charged a Nashville man for running what it called a \u201claptop farm\u201d out of his home and being part of <a href=\"https:\/\/www.justice.gov\/opa\/pr\/justice-department-announces-arrest-premises-search-and-seizures-multiple-website-domains?utm_medium=email&amp;utm_source=govdelivery\" target=\"_blank\" aria-label=\"Go to https:\/\/www.justice.gov\/opa\/pr\/justice-department-announces-arrest-premises-search-and-seizures-multiple-website-domains?utm_medium=email&amp;utm_source=govdelivery\" rel=\"noopener\" class=\"sc-93594058-0 fowfrQ\">a vast conspiracy <\/a>that connects North Korean tech workers with jobs at large American and British companies looking for remote employees.<\/p>\n<div>\n<p>According to the FBI, the salaries paid to the IT workers\u2014who were doing real work\u2014were illegally funneled to North Korea to fund its illicit weapons programs.<\/p>\n<p>Matthew Isaac Knoot, 38, <a href=\"https:\/\/cyberscoop.com\/wp-content\/uploads\/sites\/3\/2024\/08\/FILED-INDICTMENT-Knoot.pdf\" target=\"_blank\" aria-label=\"Go to https:\/\/cyberscoop.com\/wp-content\/uploads\/sites\/3\/2024\/08\/FILED-INDICTMENT-Knoot.pdf\" rel=\"noopener\" class=\"sc-93594058-0 fowfrQ\">allegedly helped<\/a> the IT workers, who were North Korean nationals living there, Russia or China, by using his residence to host numerous laptops. He is also accused of stealing the identity of a man in Georgia who authorities identified as \u201cAndrew M.\u201d Through Knoot the North Korean tech workers used Andrew M.\u2019s driver\u2019s license and identity to get well-paying contract jobs at American companies, authorities alleged.\u00a0<\/p>\n<p>After the tech workers got the remote-work jobs, Knoot had companies ship work laptops to his address in  of Nashville, Tenn., according to the DOJ. He would then log in, install remote desktop applications, and then access company networks. The remote desktop app disguised the location of the North Korean IT workers living abroad, so that it looked like they were working at Knoot\u2019s Nashville address under Andrew M. identity, authorities said. <\/p>\n<p>Knoot would also launder the tech workers\u2019 salaries\u2014some as high as $300,000 a year, authorities said\u2014and then transfer the money to accounts associated with North Korean and Chinese nationals, according to a DOJ statement. The indictment did not name the specific companies but described them as a media company in New York City, a UK financial institution, a tech company in Portland, and a media company in McLean, Va.\u00a0<\/p>\n<p>\u201cAs alleged, this defendant facilitated a scheme to deceive U.S. companies into hiring foreign remote IT workers who were paid hundreds of thousands of dollars in income funneled to the DPRK for its weapons program,\u201d said Assistant Attorney General Matthew Olsen of the national security division in a statement, referring to North Korea\u2019s formal name as the Democratic People\u2019s Republic of Korea. \u201cThis indictment should serve as a stark warning to U.S. businesses that employ remote IT workers of the growing threat from the DPRK and the need to be vigilant in their hiring processes.\u201d<\/p>\n<p>For his part in the scheme that ran from July 2022 to August 2023, Knoot got paid every month by a facilitator named Yang Di, according to the indictment. Di allegedly paid Knoot a flat rate of for each laptop he hosted at his home and a percentage of the salaries. Knoot faces a maximum penalty of 20 years in prison, plus a mandatory two years for one count of aggravated identity theft.<\/p>\n<p>The <a href=\"https:\/\/www.ic3.gov\/Media\/Y2024\/PSA240516?utm_medium=email&amp;utm_source=govdelivery\" target=\"_blank\" aria-label=\"Go to https:\/\/www.ic3.gov\/Media\/Y2024\/PSA240516?utm_medium=email&amp;utm_source=govdelivery\" rel=\"noopener\" class=\"sc-93594058-0 fowfrQ\">DOJ and the FBI<\/a> have been investigating laptop farms funded by North Korea for the past three years. The scheme to generate money to fund its weapons of mass destruction program generates hundreds of millions each year, authorities said. It involves the use of pseudonyms, fake emails, social media profiles, and websites to scour online job listings. A <a href=\"https:\/\/documents.un.org\/doc\/undoc\/gen\/n24\/032\/68\/pdf\/n2403268.pdf?token=Koacvt9374nnSJ4R7e&amp;fe=true\" target=\"_blank\" aria-label=\"Go to https:\/\/documents.un.org\/doc\/undoc\/gen\/n24\/032\/68\/pdf\/n2403268.pdf?token=Koacvt9374nnSJ4R7e&amp;fe=true\" rel=\"noopener\" class=\"sc-93594058-0 fowfrQ\">UN report<\/a> found that lower-paid workers involved in the scheme are allowed to keep 10% of their salaries, while higher-paid employees keep 30%. The UN estimated the workers generate about $250 million to $600 million per year.\u00a0<\/p>\n<p>\u201cNorth Korea has dispatched thousands of highly skilled information technology workers around the world to dupe unwitting businesses and evade international sanctions so that it can continue to fund its dangerous weapons program,\u201d said U.S. Attorney Henry Leventis for the Middle District of Tennessee in a statement.\u00a0<\/p>\n<p>Knoot appears to be the second U.S. citizen arrested in a laptop farming operation involving the thousands of North Korean IT workers sent around the world to raise funds for its weapons programs in recent years. In May 2024, the DOJ <a href=\"https:\/\/www.justice.gov\/usao-dc\/pr\/charges-and-seizures-brought-fraud-scheme-aimed-denying-revenue-workers-associated-north\" target=\"_blank\" aria-label=\"Go to https:\/\/www.justice.gov\/usao-dc\/pr\/charges-and-seizures-brought-fraud-scheme-aimed-denying-revenue-workers-associated-north\" rel=\"noopener\" class=\"sc-93594058-0 fowfrQ\">unsealed charges<\/a> against four people living abroad and one Arizona woman, Christina Marie Chapman, 49. <\/p>\n<p>Chapman, who lived on the outskirts of Phoenix, allegedly ran a laptop farm that assisted North Korean IT workers who had remote jobs at more than 300 companies, authorities said. The companies included \u201cwell-known <a href=\"https:\/\/fortune.com\/ranking\/fortune500\/\" target=\"_self\" aria-label=\"Go to https:\/\/fortune.com\/ranking\/fortune500\/\" class=\"sc-93594058-0 fowfrQ\" rel=\"noopener\">Fortune 500 companies<\/a>, U.S. banks, and other financial service providers,\u201d according to the U.S. attorney\u2019s office. Chapman\u2019s farm allegedly exploited the identities of 60 people in the U.S. used by the tech workers to disguise themselves as Americans. <\/p>\n<p>The companies where the IT workers had jobs included a top-five TV network, a Silicon Valley tech company, aerospace manufacturer, car company, and a luxury retail store\u2014all of which are in the Fortune 500, according to court records. Those who had their identities stolen had false tax bills in their names totaling at least $6.8 million in the scheme facilitated by Chapman, said the DOJ.\u00a0\u00a0<\/p>\n<p>Tech firm KnowBe4 <a href=\"https:\/\/blog.knowbe4.com\/how-a-north-korean-fake-it-worker-tried-to-infiltrate-us\" target=\"_blank\" aria-label=\"Go to https:\/\/blog.knowbe4.com\/how-a-north-korean-fake-it-worker-tried-to-infiltrate-us\" rel=\"noopener\" class=\"sc-93594058-0 fowfrQ\">disclosed last month<\/a> that it unknowingly hired a software engineer for its internal AI team who was actually a North Korean IT worker. In a blog post, the company said its recruiter held four video interviews and confirmed the person matched the photo on the job application. A background check also came back clean, the company said. In reality, the person was using a stolen identity and had used AI to enhance a stock photo.<\/p>\n<p>KnowBe4 discovered the truth about its new hire, which it did not identify, after the attacker started manipulating and transferring files and using unauthorized software. He also downloaded malware.\u00a0<\/p>\n<p>\u201cThe scam is that they are actually doing the work, getting paid well, and give a large amount to North Korea to fund their illegal programs,\u201d wrote KnowBe4 CEO Stu Sjouwerman in the post. \u201cI don\u2019t have to tell you about the severe risk of this.\u201d<\/p>\n<p>The company reported the employee to cybersecurity experts and the FBI to confirm its findings, and an FBI investigation is ongoing, the company said.\u00a0<\/p>\n<p>Attempts to reach Knoot, Di, and Chapman were unsuccessful.\u00a0<\/p>\n<\/div>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/fortune.com\/2024\/08\/10\/nashville-man-north-korean-remote-work-jobs-weapons-program-laptop-farm\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] The Department of Justice this week announced that it charged a Nashville man for running what it called a \u201claptop farm\u201d out of his<\/p>\n","protected":false},"author":1,"featured_media":253173,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[149],"tags":[],"_links":{"self":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/253172"}],"collection":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/comments?post=253172"}],"version-history":[{"count":0,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/253172\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/media\/253173"}],"wp:attachment":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/media?parent=253172"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/categories?post=253172"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/tags?post=253172"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}