How Did the Scheme Infiltrate US Companies?
US prosecutors said they have secured eight sentences in the last five months against individuals acting as domestic proxies for North Korea-based IT workers, exposing a coordinated effort to infiltrate US companies through remote employment. The scheme relied on US-based facilitators, often referred to as “laptop farmers,” who received company-issued laptops intended for newly hired employees. These individuals installed remote access software, allowing North Korean workers to operate the devices from overseas while appearing to be based in the United States. This setup enabled the workers to pass location checks and gain access to internal systems, including sensitive infrastructure at crypto firms and technology companies.Who Was Sentenced and What Penalties Were Imposed?
The Justice Department said separate courts sentenced Nashville resident Matthew Issac Knoot and New York resident Erick Ntekereze Prince for their roles in the operation. Both men received 18-month prison sentences. Prince was ordered to forfeit $89,000, representing payments received from North Korean workers, while Knoot was ordered to pay $15,100 in restitution and forfeit an additional $15,100 tied to his earnings from the scheme. Authorities said the pair helped generate $1.2 million in revenue for North Korea, with the operation affecting nearly 70 US companies. The latest sentences follow earlier convictions, including two New Jersey residents who received prison terms of nine years and seven years, eight months for running similar operations that generated more than $5 million using stolen identities.Investor Takeaway
Remote hiring processes have become a security vulnerability. Firms in crypto and tech face increased risk of insider access through identity fraud and distributed work environments.
Why Are Crypto Companies a Target?
Prosecutors said North Korea’s remote worker programs are designed to generate revenue for the state while gaining access to company systems. Crypto firms have been a frequent target due to their direct exposure to digital assets and financial infrastructure. Access to internal systems allows workers to map company architecture, identify vulnerabilities, and potentially support future exploitation efforts. In some cases, such access has been linked to theft or broader cyber operations. Previous charges filed by US authorities accused North Korean operatives of stealing more than $900,000 in cryptocurrency after gaining employment at blockchain and crypto companies using false identities.Investor Takeaway
Operational security is becoming as important as custody security in crypto. Insider access risks can bypass traditional defenses and expose firms to financial and reputational damage.




