Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
North Korean Hackers Infiltrated 136 U.S. Companies to Generate .2 Million in Revenue

North Korean Hackers Infiltrated 136 U.S. Companies to Generate $2.2 Million in Revenue

Posted on November 17, 2025November 17, 2025 By CWS

The U.S. Justice Division introduced main actions in opposition to North Korean cybercrime, together with 5 folks admitting guilt and the federal government taking greater than $15 million in property linked to the crimes.

These operations reveal how the Democratic Folks’s Republic of Korea (DPRK) makes use of fraudulent IT employees and cryptocurrency heists to fund its weapons packages whereas evading worldwide sanctions.

Facilitators in america and Ukraine helped North Korean actors safe distant IT jobs with American firms.

The scheme concerned utilizing stolen or false identities and internet hosting company-provided laptops at U.S. residences to create the false appearancethat employees had been based mostly within the U.S.

This elaborate fraud impacted greater than 136 U.S. firms, producing over $2.2 million in income for the North Korean regime and compromising the identities of over 18 Americans.

In response to the Justice Division, 5 people have admitted they’re responsible of their roles in these schemes.

Three U.S. nationals, Audricus Phagnasay, Jason Salazar, and Alexander Paul Travis, admitted to offering their identities to abroad IT employees and internet hosting laptops at their properties.

Travis, an active-duty U.S. Military member on the time, obtained not less than $51,397 for his participation. Their scheme alone earned roughly $1.28 million from sufferer firms.

Ukrainian nationwide Oleksandr Didenko pleaded responsible to stealing U.S. citizen identities and promoting them to abroad IT employees, enabling fraudulent employment at 40 U.S. firms.

Didenko agreed to forfeit greater than $1.4 million. Moreover, Erick Ntekereze Prince admitted to supplying falsely licensed IT employees by his firm, incomes over $89,000.

Individually, the Justice Division went to courtroom to get again over $15 million in cryptocurrency stolen by APT38, a North Korean navy hacking group.

The group executed 4 main heists in 2023, stealing digital foreign money from platforms in Estonia, Panama, and Seychelles, totaling roughly $382 million.

These enforcement actions display the federal government’s complete strategy to disrupting North Korean income technology schemes that fund weapons improvement and threaten nationwide safety.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Companies, Generate, Hackers, Infiltrated, Korean, Million, North, Revenue, U.S

Post navigation

Previous Post: Unremovable Spyware on Samsung Devices Comes Pre-installed on Galaxy Series Devices
Next Post: Researchers Detailed Techniques to Detect Outlook NotDoor Backdoor Malware

Related Posts

Threat Actors Advertised NtKiller Malware on Dark Web Claiming Terminate Antivirus and EDR Bypass Threat Actors Advertised NtKiller Malware on Dark Web Claiming Terminate Antivirus and EDR Bypass Cyber Security News
Salt Typhoon Using Zero-Day Exploits and DLL Sideloading Techniques to Attack Organizations Salt Typhoon Using Zero-Day Exploits and DLL Sideloading Techniques to Attack Organizations Cyber Security News
Hackers Allegedly Selling WinRAR 0-day Exploit on Dark Web Forums for ,000 Hackers Allegedly Selling WinRAR 0-day Exploit on Dark Web Forums for $80,000 Cyber Security News
CISA Warns of WHILL Model C2 Wheelchairs Vulnerability Let Attackers Take Control of Product CISA Warns of WHILL Model C2 Wheelchairs Vulnerability Let Attackers Take Control of Product Cyber Security News
New Charon Ransomware Employs DLL Sideloading, and Anti-EDR Capabilities to Attack Organizations New Charon Ransomware Employs DLL Sideloading, and Anti-EDR Capabilities to Attack Organizations Cyber Security News
FortiVoice 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code FortiVoice 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News