The post Maryland man sentenced to 15 months for helping North Korean hackers infiltrate US tech firms appeared on BitcoinEthereumNews.com. A man in Maryland has been sentenced to a 15-month prison sentence and three years of supervised release after a revelation that he has been helping North Korea to place IT workers inside US companies covertly. For a cool 3 years, Minh Phuong Ngoc Vong used false credentials to secure jobs with at least 13 US companies. These employers collectively paid him more than $970,000 for software development work that was actually performed by an overseas co-conspirator. North Koreans get their hands on sensitive US government systems According to court documents, Vong conspired with others, including John Doe, aka William James, a foreign national living in Shenyang, China, to hire Vong as a remote software developer.  In fact, 2 years ago, Vong participated in an online job interview with the CEO of a Virginia-based company. He verified his identity and citizenship by showing his Maryland driver’s license and US passport.  Following the interview, the company hired Vong and assigned him to work on a contract for the Federal Aviation Administration (FAA) involving a particular software application used by various US government agencies to manage sensitive information regarding national defense matters. The company provided Vong with a laptop to use in connection with his employment, and the FAA authorized Vong to receive a Personal Identity Verification card to access government facilities and systems. Vong installed remote access software on the laptop to facilitate Doe’s access to it and conceal his location in China. The company paid Vong more than $28,000 in wages for work he performed, portions of which Vong then sent overseas to Doe and other conspirators. Additionally, Vong allowed Doe and others to use his computer access credentials to perform the remote software development work and receive payment for that work.  The resume falsely represented that Vong possessed a… The post Maryland man sentenced to 15 months for helping North Korean hackers infiltrate US tech firms appeared on BitcoinEthereumNews.com. A man in Maryland has been sentenced to a 15-month prison sentence and three years of supervised release after a revelation that he has been helping North Korea to place IT workers inside US companies covertly. For a cool 3 years, Minh Phuong Ngoc Vong used false credentials to secure jobs with at least 13 US companies. These employers collectively paid him more than $970,000 for software development work that was actually performed by an overseas co-conspirator. North Koreans get their hands on sensitive US government systems According to court documents, Vong conspired with others, including John Doe, aka William James, a foreign national living in Shenyang, China, to hire Vong as a remote software developer.  In fact, 2 years ago, Vong participated in an online job interview with the CEO of a Virginia-based company. He verified his identity and citizenship by showing his Maryland driver’s license and US passport.  Following the interview, the company hired Vong and assigned him to work on a contract for the Federal Aviation Administration (FAA) involving a particular software application used by various US government agencies to manage sensitive information regarding national defense matters. The company provided Vong with a laptop to use in connection with his employment, and the FAA authorized Vong to receive a Personal Identity Verification card to access government facilities and systems. Vong installed remote access software on the laptop to facilitate Doe’s access to it and conceal his location in China. The company paid Vong more than $28,000 in wages for work he performed, portions of which Vong then sent overseas to Doe and other conspirators. Additionally, Vong allowed Doe and others to use his computer access credentials to perform the remote software development work and receive payment for that work.  The resume falsely represented that Vong possessed a…

Maryland man sentenced to 15 months for helping North Korean hackers infiltrate US tech firms

2025/12/06 02:42

A man in Maryland has been sentenced to a 15-month prison sentence and three years of supervised release after a revelation that he has been helping North Korea to place IT workers inside US companies covertly.

For a cool 3 years, Minh Phuong Ngoc Vong used false credentials to secure jobs with at least 13 US companies. These employers collectively paid him more than $970,000 for software development work that was actually performed by an overseas co-conspirator.

North Koreans get their hands on sensitive US government systems

According to court documents, Vong conspired with others, including John Doe, aka William James, a foreign national living in Shenyang, China, to hire Vong as a remote software developer. 

In fact, 2 years ago, Vong participated in an online job interview with the CEO of a Virginia-based company. He verified his identity and citizenship by showing his Maryland driver’s license and US passport. 

Following the interview, the company hired Vong and assigned him to work on a contract for the Federal Aviation Administration (FAA) involving a particular software application used by various US government agencies to manage sensitive information regarding national defense matters.

The company provided Vong with a laptop to use in connection with his employment, and the FAA authorized Vong to receive a Personal Identity Verification card to access government facilities and systems. Vong installed remote access software on the laptop to facilitate Doe’s access to it and conceal his location in China.

The company paid Vong more than $28,000 in wages for work he performed, portions of which Vong then sent overseas to Doe and other conspirators. Additionally, Vong allowed Doe and others to use his computer access credentials to perform the remote software development work and receive payment for that work. 

The resume falsely represented that Vong possessed a Bachelor of Science degree and 16 years of experience as a software developer. However, Vong did not have a college degree or experience in software development.

The court documents reveal that Vong was aware that Doe was located near North Korea. Doe’s communications show that he is likely a North Korean national who was working to generate revenue for the North Korean government. To that end, the court has reasons to believe that the conspirators gained unauthorized access to sensitive government systems.

North Korea increased its illicit cyber operations 

Employment infiltration is one among several revenue streams for North Korea’s cyber operations. The US has put on efforts to counter the infiltration campaign, including nationwide efforts to dismantle “laptop farms” launched in June. These setups, located in US homes, allow overseas North Korean IT workers to disguise their true locations by remotely controlling laptops issued by American companies to supposedly US-based employees.

“North Korea remains intent on funding its weapons programs by defrauding U.S. companies and exploiting American victims of identity theft, but the FBI is equally intent on disrupting this massive campaign and bringing its perpetrators to justice,” assistant director Roman Rozhavsky of the FBI Counterintelligence Division stated.

Last year, a federal court in St. Louis indicted 14 North Koreans for a long-running scheme to extort US companies and funnel money to Pyongyang’s weapons programs.

Besides infiltration, North Koreans scheme fraud by gaining access to companies holding crypto through employment and then hacking their wallets.  

According to blockchain analytics firm Elliptic, the country’s crypto-hacking groups have stolen approximately $2 billion in 2025 alone. This brought the total stolen digital assets in recent years by the regime to more than $6 billion. The funds, from hacks including those of crypto exchanges Bybit and Upbit, finance North Korea’s nuclear and missile programs.

However, as reported by Cryptopolitan, North Korea is allegedly using banned Nvidia GPUs to enhance its crypto theft schemes. According to recent analysis, researchers have revealed that the country has accumulated research on artificial intelligence since the late 90s, focusing on pattern recognition, speech processing, and data optimization.

The smartest crypto minds already read our newsletter. Want in? Join them.

Source: https://www.cryptopolitan.com/maryland-man-sentenced-to-15-months-for-helping-north-korean-hackers-infiltrate-us-tech-firms/

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Litecoin Fluctuates Below The $116 Threshold

Litecoin Fluctuates Below The $116 Threshold

The post Litecoin Fluctuates Below The $116 Threshold appeared on BitcoinEthereumNews.com. Sep 17, 2025 at 23:05 // Price Litecoin price analysis by Coinidol.com: LTC price has slipped below the moving average lines after hitting resistance at $120. Litecoin price long-term prediction: bearish The 21-day SMA support helped to alleviate the selling pressure. In other words, the price of the cryptocurrency is above the 21-day SMA support but below the 50-day SMA barrier. This suggests that Litecoin will be trapped in a narrow range for a few days. If the 21-day SMA support or the 50-day SMA barrier is overreached, the cryptocurrency will trend upwards. For example, if the LTC price breaks through the 50-day SMA barrier, it will rise to a high of $124. Litecoin will fall to its current support level of $106 if the 21-day SMA support is broken. Technical Indicators  Resistance Levels: $100, $120, $140 Support Levels: $60, $40, $20 LTC price indicators analysis Litecoin’s price is squeezed between the moving average lines. It is unclear in which direction Litecoin will move. The moving average lines are horizontal in both charts. However, the price bars are limited to the distance between the moving averages. The price bars on the 4-hour chart are below the moving average lines. LTC/USD price chart – September 17, 2025 What is the next move for LTC? On the 4-hour chart, Litecoin is currently trading in a bearish trend zone. The altcoin is trading above the $112 support and below the moving average lines, which represent resistance at $116. The upward movement is hindered by the moving average lines, which are causing the price to oscillate within a limited range. Meanwhile, the signal for the cryptocurrency is bearish, with price bars below the moving average…
Share
BitcoinEthereumNews2025/09/18 08:15