Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Ukrainian National Imprisoned for North Korea IT Fraud

Ukrainian National Imprisoned for North Korea IT Fraud

Posted on February 20, 2026 By CWS

A Ukrainian national has been sentenced by a U.S. court to five years in prison for his involvement in a scheme aiding North Korean IT workers. This operation enabled the workers to commit identity theft and secure employment in American companies, redirecting the income to support North Korea’s weapons initiatives.

Details of the Fraudulent Scheme

In November 2025, Oleksandr Didenko, aged 29, admitted to conspiring to commit wire fraud and aggravated identity theft. He was responsible for acquiring and selling U.S. citizens’ identities to North Korean IT professionals, allowing them to obtain jobs at 40 different U.S. firms. The salaries from these jobs were redirected to bolster North Korea’s military capabilities. Didenko was captured in Poland in 2024 and subsequently extradited to the United States.

In addition to his prison sentence, Didenko will undergo 12 months of supervised release and must repay $46,547.28 in restitution. He also forfeited over $1.4 million, which included seized U.S. dollars and cryptocurrency connected to the fraud.

Operations and Tactics

Didenko managed a website, Upworksell[.]com, starting in 2021 to facilitate the illegal activities. The site provided stolen or borrowed identities for IT workers seeking freelance opportunities in California and Pennsylvania. U.S. authorities shut down the site in May 2024. Furthermore, Didenko orchestrated the use of U.S. residences to receive and host laptops, creating the illusion that the workers were based domestically while they operated from countries like China.

The scheme involved managing 871 proxy identities and establishing three U.S.-based laptop farms. One such farm was operated by Christina Marie Chapman in Arizona, who was arrested in 2024 and sentenced to over eight years in prison for her role.

Impact and Continued Threat

Through Money Service Transmitters, Didenko assisted his clients in accessing U.S. financial systems without needing to open domestic bank accounts. This facilitated the transfer of employment earnings to foreign banks. Authorities reported that these workers earned substantial amounts, which were funneled back to North Korea.

U.S. Attorney Jeanine Ferris Pirro remarked on the severity of the scheme, emphasizing how it funneled American resources into North Korea’s hostile regime. Despite ongoing law enforcement efforts, North Korea continues to refine its tactics, posing an evolving threat.

A recent report from Security Alliance (SEAL) highlighted that these IT workers are now leveraging genuine LinkedIn profiles of impersonated individuals to further legitimize their fraudulent job applications.

The persistent nature of these operations underscores the need for heightened vigilance and robust measures to combat such cyber threats.

The Hacker News Tags:Cybercrime, Fraud, identity theft, IT workers, law enforcement, money laundering, North Korea, U.S. companies, Ukrainian national, wire fraud

Post navigation

Previous Post: Critical Chrome Zero-Day Vulnerability PoC Released
Next Post: Python-Based Malware Targets Windows for Credential Theft

Related Posts

AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories The Hacker News
New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT The Hacker News
175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign 175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign The Hacker News
The Silent Drivers Behind 2025’s Worst Breaches The Silent Drivers Behind 2025’s Worst Breaches The Hacker News
LOTUSLITE Backdoor Targets U.S. Policy Entities Using Venezuela-Themed Spear Phishing LOTUSLITE Backdoor Targets U.S. Policy Entities Using Venezuela-Themed Spear Phishing The Hacker News
How to Automate CVE and Vulnerability Advisory Response with Tines How to Automate CVE and Vulnerability Advisory Response with Tines The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Warns of Ploutus Malware Draining ATMs Nationwide
  • Engineers Charged in Silicon Valley Trade Secrets Case
  • Critical Flaws in VS Code Extensions Threaten Developers
  • Apache Tomcat Security Flaw Allows Constraint Bypass
  • Critical Flaw in BeyondTrust Exploited for Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Warns of Ploutus Malware Draining ATMs Nationwide
  • Engineers Charged in Silicon Valley Trade Secrets Case
  • Critical Flaws in VS Code Extensions Threaten Developers
  • Apache Tomcat Security Flaw Allows Constraint Bypass
  • Critical Flaw in BeyondTrust Exploited for Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News