North Korea IT worker scheme industrializes stolen US identities
Ukrainian operator behind Upworksell gets five years as laptop farms mimic domestic employment, compliance theater likely expands surveillance more than security
Images
A screenshot showing Upworksell’s website at the time it was seized by the FBI (ImagE: TechCrunch/screenshot)
TechCrunch/screenshot)
Zack Whittaker
techcrunch.com
A US federal court has sentenced Oleksandr Didenko, a 29-year-old from Kyiv, to five years in prison for helping North Korean workers obtain jobs at dozens of US companies using stolen American identities, according to TechCrunch. Prosecutors say Didenko ran a site called Upworksell that let overseas workers buy or rent identities; the Justice Department said he handled more than 870 stolen identities.
The mechanics are depressingly modern: fake resumes and remote interviews on one end, and “laptop farms” on the other—rooms in the United States where paid intermediaries receive and host company-issued machines so the worker abroad appears to be working domestically. TechCrunch reports that Didenko paid people in California, Tennessee, and Virginia to host these devices, enabling remote access by North Korean workers.
Security researchers have described North Korea’s “IT worker” operations as a triple threat: sanctions evasion, data theft, and extortion. CrowdStrike has said it is seeing a rise in North Korean workers infiltrating firms as remote developers and engineers, TechCrunch notes. Wages are routed back to Pyongyang and, US officials argue, help finance a nuclear weapons program under international sanctions.
This is not merely a cybercrime story; it is a labor-market story. Remote work and global contracting created a legitimate market for hiring across borders. North Korea is exploiting that market by selling a counterfeit version of “trust” at scale—stolen identities, plausible LinkedIn profiles, and US-based hardware footprints.
The predictable response in the West will be “compliance,” meaning compliance theater: more identity checks, more background screening vendors, more HR paperwork, and—inevitably—pressure to expand monitoring of workers and devices. The pitch will be national security; the result will be a higher-friction hiring pipeline for everyone, including ordinary freelancers who are not part of a state-backed fraud program.
The FBI seized Upworksell in 2024 and diverted its traffic to government-controlled servers, TechCrunch reports. Polish authorities arrested Didenko, who was extradited to the United States and pleaded guilty.
The uncomfortable reality is that centralized corporate IT stacks and standardized onboarding workflows make this kind of fraud scalable. When every company uses the same remote hiring patterns, a hostile state only needs to industrialize the spoofing once.
Western firms may respond by collecting more data on applicants, building a surveillance-heavy labor market that still gets gamed by the most determined adversaries. A more robust approach would focus on limiting blast radius—segmented access, least-privilege permissions, and systems designed for the assumption that credentials and identities will be compromised. That is less glamorous than new forms to fill out, but it is the difference between security and ritual.