{"id":43810,"date":"2026-02-20T18:02:29","date_gmt":"2026-02-20T10:02:29","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/20\/ukrainian-gets-5-years-for-helping-north-koreans-infiltrate-us-firms\/"},"modified":"2026-02-20T18:02:29","modified_gmt":"2026-02-20T10:02:29","slug":"ukrainian-gets-5-years-for-helping-north-koreans-infiltrate-us-firms","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/20\/ukrainian-gets-5-years-for-helping-north-koreans-infiltrate-us-firms\/","title":{"rendered":"Ukrainian gets 5 years for helping North Koreans infiltrate US firms"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2025\/11\/05\/North-Korea.jpg\" width=\"1600\" alt=\"Ukrainian gets 5 years for helping North Koreans infiltrate US firms\"><\/p>\n<p>A Ukrainian national was sentenced to five years in prison for providing North Korean IT workers with stolen identities that helped them infiltrate U.S. companies.<\/p>\n<p>39-year-old Oleksandr Didenko of Kyiv, Ukraine, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/five-plead-guilty-to-helping-north-koreans-infiltrate-us-firms\/\" target=\"_blank\" rel=\"nofollow noopener\">pleaded guilty<\/a> in November 2025 to aggravated identity theft and wire fraud conspiracy after being arrested in Poland in May 2024.<\/p>\n<p>This week, he was&nbsp;sentenced to 60 months in prison and 12 months of supervised release, and agreed to forfeit more than $1.4 million, including cash and cryptocurrency seized from Didenko and his accomplices.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.wiz.io\/lp\/ai-security-board-report-template?utm_source=bleepingcomputer&amp;utm_medium=display&amp;utm_campaign=FY26Q4_INB_FORM_AI-Security-Board-Report-Template&amp;sfcid=701Vh00000Wn7E1IAJ&amp;utm_term=FY27-bleepingcomputer-article-970x250&amp;utm_content=AI-Board-Report\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/w\/ai-security-board-report-template.jpg\" style=\"margin-top: 0px;\" alt=\"Ukrainian gets 5 years for helping North Koreans infiltrate US firms\"><\/a> <\/div>\n<p>&#8220;Oleksandr Didenko participated in a scheme that stole the identities of hundreds of people, to include United States citizens, which were used by North Korea to fraudulently secure lucrative IT jobs,&#8221; said James Barnacle, Assistant Director in Charge of the FBI&#8217;s New York Field Office. &#8220;This massive operation not only created an unauthorized backdoor into our country&#8217;s job market, but helped fund the regime of an adversary.&#8221;<\/p>\n<p>According to <a href=\"https:\/\/storage.courtlistener.com\/recap\/gov.uscourts.dcd.269127\/gov.uscourts.dcd.269127.7.0.pdf\" target=\"_blank\" rel=\"nofollow noopener\">court documents<\/a>, Didenko stole U.S. citizens&#8217; identities and sold them to overseas IT workers through <a href=\"https:\/\/www.justice.gov\/usao-dc\/media\/1352196\/dl\" target=\"_blank\" rel=\"nofollow noopener\">an online platform known as UpWorkSell<\/a> (which was <a href=\"https:\/\/upworksell.com\/\" target=\"_blank\" rel=\"nofollow noopener\">seized<\/a> by the Justice Department), who used them to fraudulently secure jobs with 40 U.S. companies in California and Pennsylvania.<\/p>\n<p>Throughout this scheme, he provided the North Korean remote workers with at least 871 proxy identities and proxy accounts on three freelance IT hiring platforms. He also facilitated the operation of at least eight &#8220;laptop farms&#8221; in Virginia, Tennessee, California, Florida, Ecuador, Poland, and Ukraine that allowed the North Koreans to make it look like their devices were located in the United States.<\/p>\n<p>One of these &#8220;laptop farms&#8221; was run by Christina Marie Chapman, a 50-year-old woman from Arizona, from her own home between October 2020 and October 2023. Chapman <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/five-arizona-ukraine-charged-for-cyber-schemes-infiltrating-over-300-companies-to-benefit-north-koreas-weapons-program\/\" target=\"_blank\" rel=\"nofollow noopener\">was charged<\/a> in May 2024 and was <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/us-woman-sentenced-to-8-years-in-prison-for-running-laptop-farm-helping-north-koreans-infiltrate-300-firms\/\" target=\"_blank\" rel=\"nofollow noopener\">sentenced to 102 months in prison<\/a> after a July 2025 guilty plea.<\/p>\n<p>The FBI <a href=\"http:\/\/www.ic3.gov\/Media\/Y2024\/PSA240516\" rel=\"nofollow noopener\" target=\"_blank\">has been warning<\/a> about the danger presented by North Korean threat actors <a href=\"http:\/\/www.state.gov\/rewards-for-justice-reward-offer-for-information-on-north-korean-it-workers\/\" rel=\"nofollow noopener\" target=\"_blank\">impersonating U.S.-based IT staff<\/a> since at least 2023. As the law enforcement agency <a href=\"http:\/\/www.ic3.gov\/Media\/Y2023\/PSA231018\" rel=\"nofollow noopener\" target=\"_blank\">repeatedly<\/a> noted, North Korea maintains a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/us-sanctions-orgs-behind-north-koreas-illicit-it-worker-army\/\" rel=\"nofollow noopener\" target=\"_blank\">large and well-organized army of IT workers<\/a> who use stolen identities to secure employment with <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/five-arizona-ukraine-charged-for-cyber-schemes-infiltrating-over-300-companies-to-benefit-north-koreas-weapons-program\/\" rel=\"nofollow noopener\" target=\"_blank\">hundreds of American companies<\/a>.<\/p>\n<p>In July 2024, U.S. authorities sanctioned, charged, or indicted 20 individuals and 8 companies across <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/us-sanctions-north-korean-firm-nationals-behind-it-worker-schemes\/\" target=\"_blank\" rel=\"nofollow noopener\">three<\/a> separate <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/us-disrupts-north-korean-it-worker-laptop-farm-scheme-in-16-states\/\" target=\"_blank\" rel=\"nofollow noopener\">enforcement<\/a> <a href=\"https:\/\/www.bleepingcomputer.com\/news\/legal\/treasury-sanctions-north-korean-over-it-worker-malware-scheme\/\" target=\"_blank\" rel=\"nofollow noopener\">waves<\/a>. These actions were followed by a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/legal\/us-targets-north-korean-it-worker-army-with-new-sanctions\/\" target=\"_blank\" rel=\"nofollow noopener\">fourth wave of sanctions<\/a> in August 2025 that targeted companies associated with North Korean IT worker schemes operated by Russian and Chinese nationals.<\/p>\n<p>More recently, in December 2025, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/north-korea-lures-engineers-to-rent-identities-in-fake-it-worker-scheme\/\" target=\"_blank\" rel=\"nofollow noopener\">security researchers revealed<\/a> that Famous Chollima (or WageMole) operatives, part of the notorious North Korean state-backed Lazarus hacking group, tricked recruiters using AI tools and stolen identities and got hired by Fortune 500 companies.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&#038;utm_medium=paid_media&#038;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/t\/tines-in-art-square.jpg\" alt=\"Ukrainian gets 5 years for helping North Koreans infiltrate US firms\">         <\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&#038;utm_medium=paid_media&#038;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">The future of IT infrastructure is here<\/a><\/h2>\n<p>Modern IT infrastructure moves faster than manual workflows can handle.<\/p>\n<p>In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.<\/p>\n<p>          <button><a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&#038;utm_medium=paid_media&#038;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">Get the guide<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ukrainian-hacker-admits-affiliate-role-in-nefilim-ransomware-gang\/\">Ukrainian hacker admits affiliate role in Nefilim ransomware gang<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/glendale-man-gets-5-years-in-prison-for-role-in-darknet-drug-trafficking-operation\/\">Glendale man gets 5 years in prison for role in darknet drug ring<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-orders-feds-to-patch-beyondtrust-flaw-within-three-days\/\">CISA gives feds 3 days to patch actively exploited BeyondTrust flaw<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fake-job-recruiters-hide-malware-in-developer-coding-challenges\/\">Fake job recruiters hide malware in developer coding challenges<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/north-korean-hackers-use-new-macos-malware-in-crypto-theft-attacks\/\">North Korean hackers use new macOS malware in crypto-theft attacks<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A Ukrainian national was sentenced to five years in pri [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-43810","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43810","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43810"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43810\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43810"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43810"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}