The post Maryland man sentenced to 15 months for helping North Korean hackers infiltrate US tech firms appeared on BitcoinEthereumNews.com. A man in Maryland has been sentenced to a 15-month prison sentence and three years of supervised release after a revelation that he has been helping North Korea to place IT workers inside US companies covertly. For a cool 3 years, Minh Phuong Ngoc Vong used false credentials to secure jobs with at least 13 US companies. These employers collectively paid him more than $970,000 for software development work that was actually performed by an overseas co-conspirator. North Koreans get their hands on sensitive US government systems According to court documents, Vong conspired with others, including John Doe, aka William James, a foreign national living in Shenyang, China, to hire Vong as a remote software developer.  In fact, 2 years ago, Vong participated in an online job interview with the CEO of a Virginia-based company. He verified his identity and citizenship by showing his Maryland driver’s license and US passport.  Following the interview, the company hired Vong and assigned him to work on a contract for the Federal Aviation Administration (FAA) involving a particular software application used by various US government agencies to manage sensitive information regarding national defense matters. The company provided Vong with a laptop to use in connection with his employment, and the FAA authorized Vong to receive a Personal Identity Verification card to access government facilities and systems. Vong installed remote access software on the laptop to facilitate Doe’s access to it and conceal his location in China. The company paid Vong more than $28,000 in wages for work he performed, portions of which Vong then sent overseas to Doe and other conspirators. Additionally, Vong allowed Doe and others to use his computer access credentials to perform the remote software development work and receive payment for that work.  The resume falsely represented that Vong possessed a… The post Maryland man sentenced to 15 months for helping North Korean hackers infiltrate US tech firms appeared on BitcoinEthereumNews.com. A man in Maryland has been sentenced to a 15-month prison sentence and three years of supervised release after a revelation that he has been helping North Korea to place IT workers inside US companies covertly. For a cool 3 years, Minh Phuong Ngoc Vong used false credentials to secure jobs with at least 13 US companies. These employers collectively paid him more than $970,000 for software development work that was actually performed by an overseas co-conspirator. North Koreans get their hands on sensitive US government systems According to court documents, Vong conspired with others, including John Doe, aka William James, a foreign national living in Shenyang, China, to hire Vong as a remote software developer.  In fact, 2 years ago, Vong participated in an online job interview with the CEO of a Virginia-based company. He verified his identity and citizenship by showing his Maryland driver’s license and US passport.  Following the interview, the company hired Vong and assigned him to work on a contract for the Federal Aviation Administration (FAA) involving a particular software application used by various US government agencies to manage sensitive information regarding national defense matters. The company provided Vong with a laptop to use in connection with his employment, and the FAA authorized Vong to receive a Personal Identity Verification card to access government facilities and systems. Vong installed remote access software on the laptop to facilitate Doe’s access to it and conceal his location in China. The company paid Vong more than $28,000 in wages for work he performed, portions of which Vong then sent overseas to Doe and other conspirators. Additionally, Vong allowed Doe and others to use his computer access credentials to perform the remote software development work and receive payment for that work.  The resume falsely represented that Vong possessed a…

Maryland man sentenced to 15 months for helping North Korean hackers infiltrate US tech firms

2025/12/06 02:42

A man in Maryland has been sentenced to a 15-month prison sentence and three years of supervised release after a revelation that he has been helping North Korea to place IT workers inside US companies covertly.

For a cool 3 years, Minh Phuong Ngoc Vong used false credentials to secure jobs with at least 13 US companies. These employers collectively paid him more than $970,000 for software development work that was actually performed by an overseas co-conspirator.

North Koreans get their hands on sensitive US government systems

According to court documents, Vong conspired with others, including John Doe, aka William James, a foreign national living in Shenyang, China, to hire Vong as a remote software developer. 

In fact, 2 years ago, Vong participated in an online job interview with the CEO of a Virginia-based company. He verified his identity and citizenship by showing his Maryland driver’s license and US passport. 

Following the interview, the company hired Vong and assigned him to work on a contract for the Federal Aviation Administration (FAA) involving a particular software application used by various US government agencies to manage sensitive information regarding national defense matters.

The company provided Vong with a laptop to use in connection with his employment, and the FAA authorized Vong to receive a Personal Identity Verification card to access government facilities and systems. Vong installed remote access software on the laptop to facilitate Doe’s access to it and conceal his location in China.

The company paid Vong more than $28,000 in wages for work he performed, portions of which Vong then sent overseas to Doe and other conspirators. Additionally, Vong allowed Doe and others to use his computer access credentials to perform the remote software development work and receive payment for that work. 

The resume falsely represented that Vong possessed a Bachelor of Science degree and 16 years of experience as a software developer. However, Vong did not have a college degree or experience in software development.

The court documents reveal that Vong was aware that Doe was located near North Korea. Doe’s communications show that he is likely a North Korean national who was working to generate revenue for the North Korean government. To that end, the court has reasons to believe that the conspirators gained unauthorized access to sensitive government systems.

North Korea increased its illicit cyber operations 

Employment infiltration is one among several revenue streams for North Korea’s cyber operations. The US has put on efforts to counter the infiltration campaign, including nationwide efforts to dismantle “laptop farms” launched in June. These setups, located in US homes, allow overseas North Korean IT workers to disguise their true locations by remotely controlling laptops issued by American companies to supposedly US-based employees.

“North Korea remains intent on funding its weapons programs by defrauding U.S. companies and exploiting American victims of identity theft, but the FBI is equally intent on disrupting this massive campaign and bringing its perpetrators to justice,” assistant director Roman Rozhavsky of the FBI Counterintelligence Division stated.

Last year, a federal court in St. Louis indicted 14 North Koreans for a long-running scheme to extort US companies and funnel money to Pyongyang’s weapons programs.

Besides infiltration, North Koreans scheme fraud by gaining access to companies holding crypto through employment and then hacking their wallets.  

According to blockchain analytics firm Elliptic, the country’s crypto-hacking groups have stolen approximately $2 billion in 2025 alone. This brought the total stolen digital assets in recent years by the regime to more than $6 billion. The funds, from hacks including those of crypto exchanges Bybit and Upbit, finance North Korea’s nuclear and missile programs.

However, as reported by Cryptopolitan, North Korea is allegedly using banned Nvidia GPUs to enhance its crypto theft schemes. According to recent analysis, researchers have revealed that the country has accumulated research on artificial intelligence since the late 90s, focusing on pattern recognition, speech processing, and data optimization.

The smartest crypto minds already read our newsletter. Want in? Join them.

Source: https://www.cryptopolitan.com/maryland-man-sentenced-to-15-months-for-helping-north-korean-hackers-infiltrate-us-tech-firms/

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Adoption Leads Traders to Snorter Token

Adoption Leads Traders to Snorter Token

The post Adoption Leads Traders to Snorter Token appeared on BitcoinEthereumNews.com. Largest Bank in Spain Launches Crypto Service: Adoption Leads Traders to Snorter Token Sign Up for Our Newsletter! For updates and exclusive offers enter your email. Leah is a British journalist with a BA in Journalism, Media, and Communications and nearly a decade of content writing experience. Over the last four years, her focus has primarily been on Web3 technologies, driven by her genuine enthusiasm for decentralization and the latest technological advancements. She has contributed to leading crypto and NFT publications – Cointelegraph, Coinbound, Crypto News, NFT Plazas, Bitcolumnist, Techreport, and NFT Lately – which has elevated her to a senior role in crypto journalism. Whether crafting breaking news or in-depth reviews, she strives to engage her readers with the latest insights and information. Her articles often span the hottest cryptos, exchanges, and evolving regulations. As part of her ploy to attract crypto newbies into Web3, she explains even the most complex topics in an easily understandable and engaging way. Further underscoring her dynamic journalism background, she has written for various sectors, including software testing (TEST Magazine), travel (Travel Off Path), and music (Mixmag). When she’s not deep into a crypto rabbit hole, she’s probably island-hopping (with the Galapagos and Hainan being her go-to’s). Or perhaps sketching chalk pencil drawings while listening to the Pixies, her all-time favorite band. This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Center or Cookie Policy. I Agree Source: https://bitcoinist.com/banco-santander-and-snorter-token-crypto-services/
Share
BitcoinEthereumNews2025/09/17 23:45
How The ByteDance App Survived Trump And A US Ban

How The ByteDance App Survived Trump And A US Ban

The post How The ByteDance App Survived Trump And A US Ban appeared on BitcoinEthereumNews.com. WASHINGTON, DC – MARCH 13: Participants hold signs in support of TikTok outside the U.S. Capitol Building on March 13, 2024 in Washington, DC. (Photo by Anna Moneymaker/Getty Images) Getty Images From President Trump’s first ban attempt to a near-blackout earlier this year, TikTok’s five-year roller coaster ride looks like it’s finally slowing down now that Trump has unveiled a deal framework to keep the ByteDance app alive in the U.S. A look back at the saga around TikTok starting in 2020, however, shows just how close the app came to being shut out of the US – how it narrowly averted a ban and forced sale that found rare bipartisan backing in Washington. Recapping TikTok’s dramatic five-year battle When I interviewed Brendan Carr back in 2022, for example, the future FCC chairman was already certain at that point that TikTok’s days were numbered. For a litany of perceived sins — everything from the too-cozy relationship of the app’s parent company with China’s ruling regime to the app’s repeated floating of user privacy — Carr was already convinced, at least during his conversation with me, that: “The tide is going out on TikTok.” It was, in fact, one of the few issues that Washington lawmakers seemed to agree on. Even then-President Biden was on board, having resurrected Trump’s aborted TikTok ban from his first term and signed it into law. “It feels different now than it did two years ago at the end of the Trump administration, when concerns were first raised,” Carr told me then, in August of 2022. “I think, like a lot of things in the Trump era, people sort of picked sides on the issue based on the fact that it was Trump.” One thing led to another, though, and it looked like Carr was probably…
Share
BitcoinEthereumNews2025/09/18 07:29