Two US nationals sentenced for role in prolific fake worker laptop farms
The Americans were raising money for the North Korean regime by allowing fake IT workers to appear as legitimate US-based employees
Two US nationals have been sentenced to 18 months in prison for their part in running 'laptop farms' aimed at raising money for the North Korean government.
Matthew Issac Knoot, of Nashville, Tennessee, and Erick Ntekereze Prince, of New York, were sent company-issued laptops under stolen identities. They then installed unauthorized remote desktop software that allowed fake North Korean IT workers to appear as legitimate US-based employees.
The two worked separately, but according to the Department of Justice, between them generated more than $1.2 million in revenue for the DPRK and impacted nearly 70 companies in the US.
"These sentences hold accountable U.S nationals who enabled North Korea’s illicit efforts to infiltrate US networks and profit on the back of US companies,” said assistant attorney general for National Security John A. Eisenberg.
“These defendants helped North Korean ‘IT workers’ masquerade as legitimate employees, compromising US corporate networks and helping generate revenue for a heavily sanctioned and rogue regime. The National Security Division will continue to pursue those who, through deception and cyber-enabled fraud, threaten our national security.”
Prince helped at least three DPRK IT workers obtain remote employment at US companies between around June 2020 and August 2024. Prince used his company, Taggcar Inc, to supply 'certified' IT staff using false and stolen identities.
He also kept laptops provided by the victim companies at his New York home, installing remote access software without authorization to make it look as if the DPRK IT workers were working there.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Prince was sentenced to 18 months in prison, followed by three years of supervised release. He was also ordered to forfeit $89,000, the amount the DPRK IT workers paid him for his help.
Knoot, meanwhile, ran a laptop farm from his Nashville home between around July 2022 and August 2023, supplying North Korean IT workers to at least four US companies.
These firms paid the DPRK IT workers associated with Knoot’s laptop farm more than $250,000 for their work - most of which was falsely reported to the IRS and Social Security Administration under the name of the actual US citizen whose identity had been stolen.
He and his co-conspirators cost the victim companies more than $500,000 for auditing and fixing their devices, systems, and networks.
Fake North Korean IT workers are rampant
The crimes mark the latest in a continuing series of North Korean campaigns to supply fake workers and steal money for the regime.
Notably, these groups increasingly use voice-changing software during remote interviews to disguise their accents, or using the AI app Face Swap to place their faces in stolen identity documents and generate convincing headshots for CVs.
A host of organisations in the US have been affected by these campaigns over the last two years. As ITPro previously reported, cybersecurity company KnowBe4 unknowingly hired a fake IT worker, who immediately began loading malware as soon as they received their Mac workstation.
“This scheme shows how national security threats now enter through ordinary business systems. These defendants helped North Korean IT workers pose as legitimate employees, gain access to American companies, and generate money for a sanctioned regime,” said US attorney Jason A. Reding Quiñones for the Southern District of Florida.
"These were not paperwork violations. They were deliberate acts that exposed U.S. businesses, compromised trust, and supported one of the world’s most dangerous adversaries. These sentences send a clear message: if you help foreign actors infiltrate American companies for profit, you will face federal prison and lose the money you made.”
FOLLOW US ON SOCIAL MEDIA
Follow ITPro on Google News and add us as a preferred source to keep tabs on all our latest news, analysis, views, and reviews.
You can also follow ITPro on LinkedIn, X, Facebook, and BlueSky.

Ross Kelly is ITPro's News & Analysis Editor, responsible for leading the brand's news output and in-depth reporting on the latest stories from across the business technology landscape. Ross was previously a Staff Writer, during which time he developed a keen interest in cyber security, business leadership, and emerging technologies.
He graduated from Edinburgh Napier University in 2016 with a BA (Hons) in Journalism, and joined ITPro in 2022 after four years working in technology conference research.
For news pitches, you can contact Ross at ross.kelly@futurenet.com, or on Twitter and LinkedIn.
-
Beware of emails threatening a code of conduct reviewNews A widespread phishing campaign has targeted tens of thousands of employees
-
North Korean hackers are duping freelance developers with fake interviews to steal cryptocurrency and deliver malware — Sophos warns the 'Nickel Alley' group is using LinkedIn, Upwork, and Fiverr to target victimsNews A fake interview process uses coding tests and repo downloads to deliver malware
-
Microsoft and NCSC issue alerts over hacker campaigns targeting WhatsApp, Signal messaging appsNews Microsoft warns about a sophisticated attack that starts with WhatsApp messages, while the NCSC says such incidents are on the rise
-
Is your new hire an AI clone? Microsoft says North Korean hackers are using AI to impersonate job seekers and steal company secretsNews The groups are increasingly using face-changing or voice-changing software to make their fake identities more plausible
-
Cloudflare warns state-backed hackers are ‘weaponizing legitimate enterprise ecosystems’ as ‘living off the land’ attacks surgeNews Chinese, North Korean, and Russian-backed threat groups now favor longer-term compromises over brute force attacks
-
Fake North Korean IT workers are rampant on LinkedIn – security experts warn operatives are stealing profiles to apply for jobs and infiltrate firmsNews The scammers' latest efforts mark a significant escalation in tactics, experts have warned
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
Thousands of Microsoft Teams users are being targeted in a new phishing campaignNews Microsoft Teams users should be on the alert, according to researchers at Check Point

