New York City, NY, July 01, 2025 (GLOBE NEWSWIRE) —
BTCMiner is an intelligent cloud mining platform that helps global users easily enter the field of digital currency mining through simple operations and flexible investment methods. With its stable returns, zero-risk guarantee and innovative mining mechanism,
BTC Miner has obtained FCA (Financial Conduct Authority) certification, ensuring the compliance and fund security of the platform
BTCMiner platform’s original principal and interest guarantee contract allows investors to not worry about the risks brought by market fluctuations.
BTCMiner platform is equipped with AI intelligent scheduling system, which intelligently optimizes mining strategies according to market conditions, electricity costs, computing resources and other factors to provide each investor with maximum returns
It is better to act than to be moved, and choosing the right direction is more important than working hard
SANTIAGO, Chile, July 01, 2025 (GLOBE NEWSWIRE) — You are cordially invited to participate in Banco Santander Chile’s (NYSE: BSAC) conference call-webcast on Tuesday August 5, 2025, at 11.00 AM (ET time) where we will discuss 2Q 2025 financial results. The Bank’s Officers participating in the conference call are: Patricia Pérez, CFO, Cristian Vicuña, Chief Strategy Officer & Head of IR and Andrés Sansone, Chief Economist. A question and answer session will follow the presentation.
The Management Commentary report will be published on July 31, 2025, before the market opens. The quiet period begins on July 17.
Banco Santander Chile is one of the companies with the highest risk classifications in Latin America with an A2 rating from Moody’s, A- from Standard and Poor’s, A+ from Japan Credit Rating Agency, AA- from HR Ratings and A from KBRA. All our ratings as of the date of this report have a Stable Outlook.
As of March 31, 2025, the bank had total assets of Ch$67,059,423 million (US$70,284 million), total gross loans (including those owed by banks) at amortized cost of Ch$41,098,666 million (US$43,075 million), total deposits of Ch$30,607,715 million (US$32,080 million), and bank owners’ equity of Ch$4,400,233 million (US$4,612 million). The BIS capital ratio was 16.9%, with a core capital ratio of 10.7%. As of March 31, 2025, Santander Chile employed 8,712 people and had 237 branches throughout Chile.
MINNEAPOLIS and ST. PAUL, Minn., July 01, 2025 (GLOBE NEWSWIRE) — (NASDAQ: ONB)– Old National Bancorp (“Old National”) has appointed Matt Keen as Chief Information Officer (CIO). In this role, Keen will join Old National’s Executive Leadership Team – the company’s senior-most group of C-suite executives.
Keen brings more than three decades of experience in significant technology leadership roles at national companies, including leading architecture development, as well as experience with brokerage and banking services, cloud service optimization, and platform modernization.
“As Old National continues our Midwest and Southeast expansion, our technology strategy and capabilities are also evolving to continue meeting our ever-growing clients’ needs and expectations,” said Old National Chairman & CEO Jim Ryan. “Matt’s wide-ranging technology expertise will be essential for helping us innovate and deliver client-focused solutions, while also supporting the personal relationships that have always been the heart of our success.”
Keen’s previous technology leadership experience included consulting with American Express as part of his tenure at PriceWaterhouseCoopers, almost 15 years at Ameriprise Financial (formerly a division of American Express), and six years at Two Harbors Investments. Most recently, he served as CIO for Bremer Bank, which became a division of Old National Bank on May 1, 2025.
As Old National’s CIO, Keen will lead a forward-thinking approach to leveraging technology as an enabler for business success. He will shape and execute the company’s technology strategy, working closely and collaboratively with all aspects of the business to identify ways to increase efficiencies and drive growth. With a particular emphasis on innovation, Keen and his team will use technology, as well as data and analytics, to effectively support and enhance the client and team member experience, to meet their ever-evolving expectations.
“I’m looking forward to continuing to advance the strong technology foundation that has enabled Old National to achieve its growth goals,” Keen said. “Through a collaborative approach and intense focus on our clients, we’ll bring forward the best technology capabilities to serve the business and support the culture that our team members, clients, and communities expect and appreciate.”
A resident of Chanhassen, Minn., Keen holds a degree in quantitative methods and computer science from the University of St. Thomas.
Keen succeeds retiring Chief Information Officer Paul S. Kilroy, who joined Old National in 2020. During his tenure, Kilroy spearheaded a groundbreaking partnership with Infosys that vastly improved contact center quality and stabilized information quality metrics across the organization, leading to a 2024 “Tech Exec of the Year” honor from the Indianapolis Business Journal.
ABOUT OLD NATIONAL Old National Bancorp (NASDAQ: ONB) is the holding company of Old National Bank. As the fifth largest commercial bank headquartered in the Midwest, Old National proudly serves clients primarily in the Midwest and Southeast. With approximately $70 billion of assets and $37 billion of assets under management (including Bremer Financial Corporation on a pro forma basis as of March 31, 2025), Old National ranks among the top 25 banking companies headquartered in the United States. Tracing our roots to 1834, Old National focuses on building long-term, highly valued partnerships with clients while also strengthening and supporting the communities we serve. In addition to providing extensive services in consumer and commercial banking, Old National offers comprehensive wealth management and capital markets services. For more information and financial data, please visit Investor Relations at oldnational.com. In 2025, Points of Light again named Old National one of “The Civic 50” — an honor reserved for the 50 most community-minded companies in the United States.
Source: United States Senator for Massachusetts Ed Markey
Washington (July 1, 2025) – Overnight, the U.S. Senate voted 99-1 in favor of an amendment co-sponsored by Senator Edward J. Markey (D-Mass.), member of the Commerce, Science, and Transportation Committee, Senator Maria Cantwell (D-Wash.), Ranking Member of the Senate Committee on Commerce, Science and Transportation, and Senator Marsha Blackburn (R–Tenn.) to strip a ten-year moratorium on state AI regulations from the Republican budget reconciliation bill.
“Early this morning, the Senate overwhelmingly voted to reject a dangerous provision to block states from regulating artificial intelligence, including protecting kids online. This 99-1 vote sent a clear message that Congress will not sell out our kids and local communities in order to pad the pockets of Big Tech billionaires. I am proud to have partnered with Ranking Member Cantwell and Senator Blackburn on an amendment to strip this dangerous language, and I look forward to working with my colleagues to develop responsible guardrails for AI,” said Senator Markey.
For weeks, Senator Markey raised alarms over the provision which would have forced states to make an impossible choice between enforcing AI consumer protections or accepting federal BEAD funding to expand broadband access. Despite several revisions by its author and misleading assurances about its true impact, state officials from across the country, including 17 Republican Governors and 40 state Attorneys General, as well conservative and liberal organizations – from the Heritage Foundation to the Center for American Progress – rallied against the harmful proposal.
On June 30, Senator Markey introduced an amendment with Senator Cantwell to strip the entire provision prior to introducing the same amendment with Senator Cantwell and Senator Blackburn on July 1. On June 10, Senator Markey announced his plans to file an amendment to the Senate reconciliation bill to block Republicans’ attempt to prevent states from regulating artificial intelligence (AI) for the next 10 years. On June 4, Senator Markey convened a virtual roundtable with advocates to discuss the impacts this ban would have on communities across the country. On June 3, Senator Markey delivered remarks on the Senate floor opposing the provision in the House-passed reconciliation bill that would prevent states from regulating AI for the next ten years.
Senator Markey is the author of the Artificial Intelligence (AI) Civil Rights Act, the most comprehensive AI civil rights legislation introduced in Congress. The legislation would put strict guardrails on companies’ use of algorithms for consequential decisions, ensure algorithms are tested before and after deployment, help eliminate and prevent bias, and renew Americans’ faith in the accuracy and fairness of complex algorithms.
New York City, July 01, 2025 (GLOBE NEWSWIRE) — Against the backdrop of drastic fluctuations in the global economy, cryptocurrencies have become the “number one” investment asset pursued by global investors. In particular, BTC, ETH, and XRP continue to influence the global cryptocurrency market. However, AQUARONE, Steffan Luke, CEO of WinnerMining Co., Ltd., believes that amid the market fluctuations that everyone is worried about, there are business opportunities that cannot be missed.
“Volatility” turns into business opportunities WinnerMining not only prevents market volatility, but also stimulates more active trading. WinnerMining offers a variety of different investment contracts for investors of all levels, allowing them to make investment decisions with confidence. Despite the uncertainty of US policies under President Trump, which may affect global cryptocurrencies, WinnerMining can cope with the challenges that may arise in the second half of the year and maintain its leading position in the international cryptocurrency market. “WinnerMining has experienced crises, whether it is COVID-19 that disrupts the world, US taxation, or regional political conflicts, and each time it has been able to manage in a professional manner and has good resources and connections in the global crypto market, so our customers will still be taken care of in the best way without being affected by irregular market behavior.”
What are the advantages of Winnermining? 1. Fund security: The biggest concern of any investor is fund security. There is no need to worry about it at Winnermining, because Winnermining adopts military-grade double protection and stores funds in cold wallets and the world’s top 10 authoritative banks. And it can protect users from asset loss or inflation problems between conflicts.
2. Registration bonus: In order to welcome novices or experienced miners who join Winnermining for the first time, as long as they join Winnermining, they will immediately receive a platform reward of $15.
3. Multiple choices: Provide more than 10 different levels of contracts, suitable for users of any class, and also support free cloud mining!
4. Flexible participation: Support global users to invest in popular currencies such as BTC, ETH, XRP, SOL, DOGE, USDT, USDC, LTC, BCH, etc.
5. Maintain sustainability: Winnermining has more than 100 large and small new energy power generation sites around the world to maintain the development of cloud mining and continue the mining process.
6. Customer Support: We provide 24-hour online customer service. Users can visit and consult at any time in any region. Adhering to the concept that customers are God, we serve users from all over the world wholeheartedly and let users have the experience of first love.
How to participate in Winnermining? Step 1: Visit the official website, fill in your email address and set your username/password to complete the registration. Step 2: Select the appropriate contract to purchase and lease (all lease contracts can refund the principal). Step 3: After the purchase is completed, no operation is required, just wait for 24 hours to get daily income.
How to earn income on Winnermining? Users can complete registration on the official website or application and purchase contracts on the platform. Some equity contracts of WinnerMining in 2025 can be viewed here: I- Antminer S17e: Investment amount of $100, total profit of $100 + $8. II – Shenma Miner M30S: Investment amount of $1000, total profit of $1000 + $130. III – Antminer S19J Pro: Investment amount of $3000, total profit of $3000 + $675. IV- AvalonMiner A1346: Investment amount of $5000, total profit of $5000 + $1600. V – Desiwe Miner K10Ultra: Investment amount of $30,000, total profit of $30,000 + $24300. VI – Rack-mounted Filecoin Miner 4300TiB S: Investment amount of $100,000, total profit of $100,000 + $92,500. (Visit WinnerMining.VIP to view more contracts)
Overview: Winnermining knows that in the ever-changing crypto market, no one can stand still. The fluctuating crypto market has bubbles and opportunities, and participating in WinnerMining cloud mining is a good choice for digital growth. Join now and get a $15 reward without applying. —— Click to download the APP to participate in WinnerMining to take you to experience the daily growth progress of digital assets.
Villers-lès-Nancy, 1st July 2025 – 07:00 p.m. (CET)
PRESS RELEASE
RESULTS OF THE VOTES ON THE RESOLUTIONS SUBMITTED TO THE ORDINARY ANNUAL SHAREHOLDERS’ MEETING OF 25 JUNE 2025
Number of shares comprising the share capital: 15,174,125
Number of shares with voting rights: 14,830,415
Number of shares with voting rights possessed by shareholders presents or represented or having voted by mail: 13,173,125
That means a quorum of 88.83% of the 14,830,415 shares with voting rights:the Ordinary Annual General Meeting was able to deliberate.
The Ordinary Annual General Meeting was held on Wednesday, 25 June 2025 at 5:30 p.m. at the Company’s headquarters and approved the separate parent company and consolidated financial statements for the 2024 financial year. The results of the votes on the resolutions proposed at this meeting by the Board of Directors were as follows:
Resolutions
Results of the votes
RESOLUTION ONE
Approval of the annual financial statements
Resolution adopted by:
13,170,684 votes in favour
0 vote against
2,441 abstentions
RESOLUTION TWO
Discharge of directors and discharge of the Statutory Auditors for the performance of their engagement
Resolution adopted by:
12,831,312 votes in favour
339,266 votes against
2,547 abstentions
RESOLUTION THREE Approval of the consolidated financial statements
Resolution adopted by:
13,170,684 votes in favour
0 vote against
2,441 abstentions
RESOLUTION FOUR
Appropriation of earnings, setting the dividend
Resolution adopted by:
13,138,631 votes in favour
34,494 votes against
0 abstention
RESOLUTION FIVE
Agreements and commitments governed by Articles L. 225-38 of the French Commercial Code
Resolution adopted by (*):
13,101,211 votes in favour
59,549 votes against
12,365 abstentions
RESOLUTION SIX
Approval of the information on the compensation of corporate officers paid in or granted for fiscal 2024 and mentioned in Article L. 22-10-9 of the French Commercial Code
Resolution adopted by:
12,507,815 votes in favour
665,242 votes against
68 abstentions
RESOLUTION SEVEN
Approval of the components of compensation paid in 2024 to Mr. Thierry CHAPUSOT, Chairman of the Board of Directors
Resolution adopted by:
13,115,547 votes in favour
57,510 votes against
68 abstentions
RESOLUTION EIGHT
Approval of the components of compensation paid in 2024 to Mr. Denis SUPPLISSON, Chief Executive Officer
Resolution adopted by:
10,782,118 votes in favour
2,390,939 votes against
68 abstentions
RESOLUTION NINE
Approval of the components of compensation paid in 2024 to Mr. Grégoire DE ROTALIER, Deputy CEO
Resolution adopted by:
10,782,118 votes in favour
2,390,939 votes against
68 abstentions
RESOLUTION TEN
Approval of the components of compensation paid in 2024 to Mr. Damien VALICON, Deputy CEO (non-Board member), as from 01/04/2024
Resolution adopted by:
10,762,253 votes in favour
2,410,804 votes against
68 abstentions
RESOLUTION ELEVEN
Approval of the compensation policy for Mr. Thierry CHAPUSOT, Chairman of the Board of Directors, for 2025
Resolution adopted by:
13,115,547 votes in favour
57,510 votes against
68 abstentions
RESOLUTION TWELVE
Approval of the compensation policy for Mr. Denis SUPPLISSON, Chief Executive Officer, for 2025
Resolution adopted by:
10,545,572 votes in favour
2,454,875 votes against
172,678 abstentions
RESOLUTION THIRTEEN
Approval of the compensation policy for Mr. Grégoire de ROTALIER, Deputy Chief Executive Officer, for 2025
Resolution adopted by:
10,537,207 votes in favour
2,463,240 votes against
172,678 abstentions
RESOLUTION FOURTEEN
Approval of the compensation policy for Mr. Damien VALICON, Deputy Chief Executive Officer, for 2025
Resolution adopted by:
10,537,207 votes in favour
2,463,240 votes against
172,678 abstentions
RESOLUTION FIFTEEN
Approval of the compensation policy for Directors
Resolution adopted by:
13,127,845 votes in favour
45,212 votes against
68 abstentions
RESOLUTION SIXTEEN
Setting total annual compensation for Directors for 2025
Resolution adopted by:
13,127,845 votes in favour
45,212 votes against
68 abstentions
RESOLUTION SEVENTEEN
Authorisation by the Company to repurchase its own shares
Resolution adopted by:
11,297,178 votes in favour
1,875,947 votes against
0 abstention
RESOLUTION EIGHTEEN
Powers for formalities
Resolution adopted by:
13,173,125 votes in favour
0 vote against
0 abstention
(*)After deduction of excluded voting rights
Upcoming financial communications
31 July 2025: Q2 2025 revenue – After the close of trading
26 September 2025: H1 2025 results: 26 September 2025
Founded over 35 years ago, Equasens Group, a leader in digital healthcare solutions, today employs over 1.300 people across Europe. Equasens Group’s specialised business applications facilitate the day-to-day work of healthcare professionals and their teams, working in private practice, collaborative medical structures or healthcare establishments. The Group also provides comprehensive support to healthcare professionals in the transformation of their profession by developing electronic equipment, digital solutions and healthcare robotics, as well as data hosting, financing and training adapted to their specific needs. And reflecting the spirit of its tagline “Technology for a More Human Experience”, the Group is a leading provider of interoperability solutions that improve coordination between healthcare professionals, their communications and data exchange resulting in better patient care and a more efficient and secure healthcare system.
Listed on Euronext Paris™ – Compartment B
Indexes: MSCI GLOBAL SMALL CAP – GAÏA Index 2020 – CAC®SMALL and CAC®All-Tradable Included in the Euronext Tech Leaders segment and the European Rising Tech label
Eligible for the Deferred Settlement Service (“Service à Réglement Différé” – SRD) and equity savings accounts invested in small and mid-caps (PEA-PME). ISIN: FR 0012882389 – Ticker Code: EQS
The thriving, lively rural town of Totota, Bong County will never be the same, according to women beneficiaries of the Totota Peace Hut. “This town is growing and changing in terms of mentoring and improving the attitude, skills, and public-speaking confidence of women so we can reach to that height we all aspire to acquire in life,” said Annie G. Saah, 53, member of the peace hut and Chairlady of the One Voice Group.
“Our peace hut in Totota has helped in improving the lives of women and young girls. Through this peace hut, women and girls have gained valuable skills in literacy, computer training, group and individual farming, village savings and loan scheme as well as conflict resolution and mediation outreach at household and community-levels, and I am one such example. I have my individual potatoes garden, my house-side bag garden together with a group farm. We use the proceeds for our children’s tuition and other family needs,” added Annie G. Saah.
Annie, Miatta Borbor, and nearly 50 other women meet at the peace hut on a weekly basis to support one another in peacebuilding, literacy, computer skills, petty business management, and small-scale farming. “Thanks to UN Women, Plan International, Orange Foundation, and the Peacebuilding Fund for their support in giving women the skills they need to become marketable and active contributors not just to our families but also to the community of Totota,” said Miatta Borbor, a member of One Voice Group at the peace hut.
True to Annie and Miatta’s words on the empowerment of women, in November 2024, during an indoor programme at Totota Peace Hut in Bong County, visiting Peacebuilding Commission Chair and Sweden’s Ambassador to the UN in New York, Amb. Nicola Clase and delegation witnessed a life-changing moment. Three formerly illiterate women – Mary Sheriff, Gbentelo Kennedy, and Oretha Jallah – proudly demonstrated their peace hut-acquired literacy skills by writing their names and telephone numbers on paper to the admiration of the visitors. The audience applauded them for their literacy achievements. Ma Mary Sandiman, Chairlady of Totota Peace Hut, emphasized the need to continue the peace hut: “This peace hut must continue here so more women can learn to read and write and to enhance women’s unity so women themselves can drive the change they need.”
The vegetable gardens, small businesses, the conflict mediation roles, and the computer training have all had tremendous impact on women beneficiaries by enabling them to earn money, support their households, participate in public and community discussions, and enhance peaceful co-existence among people. Rev Fahnlon A. Mulbah, Coordinator of the Orange Digital Center (ODC) within the Totota Peace Hut, underscored the life-improving results of the peace hut and the ODC on young women. “Computer literacy is a globally required skills area especially for women and girls to earn income and advertise their work on phone and on a computer.” He disclosed that Grace Pope, a resident of Totota, acquired digital skills in the application of cell phone for business and started advertizing and doing Orange Mobile Money, and then relocated to Monrovia where she’s living and working.
The empowerment and results-oriented achievements at the Totota Peace Hut was made possible through the seamless collaboration among UN Women, Plan International, Government of Liberia, Orange Foundation, and other partners with funding from the UN Peacebuilding Fund. Each organization lent its own comparative advantage, garnered resources, and provided backstopping and technical inputs to make the peace hut functional and effective.
Peace huts across Liberia have become a useful model for driving rural women’s collective empowerment. According to UN Women, the women of Liberia gained national and international acclaim as champions of peace through their mass action campaign that pressured warring factions to agree to a peace settlement in 2003. As part of this effort, the women, under the banner “Liberian Women Mass Action for Peace”, launched the Peace Hut model in 2004 to provide a space for community women to discuss issues of peace, including ongoing community and domestic violence. Since then, the Peace Huts have evolved into a multi-faceted platform that promotes gender equality and the empowerment of women especially in rural communities.
Distributed by APO Group on behalf of UN Women – Africa.
Source: State University of Management – Official website of the State –
On July 1, 2025, a joint meeting of the commissions of the State Council of the Russian Federation in the areas of “Personnel”, “Youth and Children”, “Family” was held at the site of the State University of Management to consider the draft Strategy for the Development of Education in the Russian Federation until 2036.
The moderator of the meeting, Russian journalist and TV presenter Ernest Matskyavichyus, introduced the main participants in the discussion and reported that more than 1,000 experts worked on the text of the Education Development Strategy, many of whom are present at the meeting.
The Chairman of the Commission of the State Council of the Russian Federation on “Personnel”, Governor of the Kaluga Region, and graduate of the State University of Management Vladislav Shapsha noted in his welcoming speech that the education system should be flexible and adaptive, integrated into the real sector of the economy and continuous.
“Today, a situation has arisen where one specialty is no longer enough for an educated person; at least two are needed to always be prepared for the changing situation on the labor market. Qualified specialists of a new type must think innovatively and be able to solve problems in the context of rapid digital transformation and global competition. The key tasks now are: synchronizing education with the labor market, overcoming imbalances in personnel training and forming a system of advanced training, since in the future the situation will change even faster, and artificial intelligence can sharply reduce employment in many areas of labor activity,” warned Vladislav Shapsha.
The Chairman of the State Council of Russia Commission on “Youth and Children”, Governor of the Yamalo-Nenets Autonomous Okrug Dmitry Artyukhov expressed pleasure at the representative meeting on such a comprehensive topic.
“Education is a vital area that concerns absolutely everyone: teachers, parents, and millions of children and young people across the country. We have done serious work on the Education Development Strategy on the instructions of the President. Now it is time to move on to action – to focus on implementing our plans. Together, we are laying the foundation for the future of Russian education. This is a vital state task, because it is education that solves key problems for the country: it provides knowledge and skills, trains personnel for the economy, and most importantly, brings up a new generation of Russians,” said Dmitry Artyukhov.
The Chairman of the State Council of Russia’s Commission on the “Family” Direction, Head of the Republic of Mordovia Artem Zdunov drew the attention of those gathered to the fact that the document under discussion will determine the development vectors not only of education itself, but also through it of the entire country as a whole.
“I will note two key priorities of the Strategy. The first is the further implementation of high-quality education regardless of the place of residence and social status of the family. Much has already been done for this: new schools and kindergartens have been built, major repairs have been carried out, and institutions have been equipped with modern equipment. The second priority is that the education system should be built on the basis of traditional Russian values, including a strong family. Efforts in this direction should be systemic and continuous, starting from kindergarten to university. The cult of large families should be spread everywhere, similar to how this year we widely celebrate the 80th anniversary of Victory in the Great Patriotic War – information should be broadcast from TV screens, from the Internet, from billboards on city streets and in educational institutions,” said Artem Zdunov.
Deputy Minister of Education of the Russian Federation Irina Shvartsman said that a public opinion poll was conducted to prepare the draft Strategy for the Development of Education, which affected 338 thousand people. The structure of the Strategy was developed by 15 working groups, including representatives of all departments, the Presidential Administration, the Russian Academy of Education and other experts.
“The strategy does not hide the problems, it is designed to identify and eliminate them. These are the problems of a shortage of personnel and wages, dilapidated buildings, bureaucratic burden on teachers, and the ideological gap between teachers and students. One of the main values in the education system should be a person. The rights of children and teachers should be equally protected. And to achieve humanitarian and scientific-technical leadership of Russia in the world, it is necessary not only to train qualified specialists, but also to work systematically in the direction of patriotic education,” said Irina Shvartsman.
Deputy Minister of Science and Higher Education of the Russian Federation Dmitry Afanasyev noted that for the first time in Russia a single document on issues of education development is appearing.
“In response to current challenges, the Ministry of Education and Science proposes to create a new list of specialties that meet the country’s strategic objectives, reboot and update state programs such as “Priority 2030” and “Advanced Engineering Schools”, and continue to build new university campuses. In addition, it is necessary to strengthen the influence of domestic education abroad, develop online forms of education, and promote the Russian language as the language of international communication. In this area, the Strategy still requires revision,” Dmitry Afanasyev said.
Rector of the State University of Management Vladimir Stroyev noted the significant number of GUU graduates at a meeting of the State Council commissions and spoke about the work of the university.
“The need to change the education system is obvious, but its conservatism can also have its advantages. Until the 1990s, GUU was not a management university, but an engineering and economics university. And we managed to preserve elements of the previous system. Starting in 2022, we are actively reviving the system of training industry managers who understand and know the production base well. For this purpose, GUU is implementing a system of seamless project-based learning. The structure of the university includes the Pre-University – a budget school where, in addition to studying general subjects, students begin to get used to practice-oriented learning. GUU is probably the only university in the country where project-based learning is practiced in 100% of areas of education, starting from the 1st year, which by the end of the study leads to a high level of graduate employment. In addition, we do not forget about the meanings – we are a leading university in the field of educational work, we support student families, and we encourage employees to have children. Our task is not only to raise a competent manager, but also to educate him as a responsible citizen who works for the benefit of the state and society,” said Vladimir Stroyev.
In addition, the rector of the State University of Management introduced the meeting participants to the scientific and technical achievements of the university, in particular, to the system of work of the inter-university design bureau, and invited those interested to take a tour of the university.
The meeting was also attended by: Deputy Head of the Secretariat of the Deputy Prime Minister of the Russian Government Antony Shvindt, Director of the Department of Personnel Policy of the Ministry of Education and Science of the Russian Federation Alexey Svistunov, Deputy Governor of the Kaluga Region Tatyana Leonova, Deputy Head of the Federal Service for Supervision in Education and Science Evgeny Semchenko and many other experts.
Summing up the panel discussion, the Chairman of the State Council of the Russian Federation Commission on Personnel Vladislav Shapsha particularly highlighted the topic raised by many speakers about the key role of education within the Education Development Strategy. “You can teach a lot, but if a person does not have a moral core, then his technical skills can be harmful. The Russian person has always been spiritual. You cannot understand Russia with your mind, you cannot measure it with a common yardstick…”, Vladislav Valerievich concluded the meeting of the State Council commissions with a quote from a poem by Fyodor Tyutchev.
After the end of the panel discussion, the participants of the meeting of the State Council commissions were given a tour of the State University of Management, as promised by the rector. In addition to the experts, the moderator of the discussion, Ernest Matskyavichyus, did not miss this opportunity.
The guests were shown the new workshop of the student design bureau “Innovative Solutions”, the Engineering Project Management Center and the Media Center of the State University of Management. Antoniy Shvindt paid special attention to the scientific and technical developments of the State University of Management. Aleksey Svistunov appreciated the comfort and equipment of the premises. Ernest Matskyavichyus, naturally, was most interested in the studios, and Tatyana Leonova even proposed a project for a series of short educational videos on the topic of management science.
Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.
Glendale, California, July 01, 2025 (GLOBE NEWSWIRE) — RadCred, a leading innovator in financial technology, has launched a new platform designed to provide no credit check loans with guaranteed approval for U.S. consumers with bad credit. Unlike traditional banks, which often deny loans based on FICO scores, RadCred’s platform evaluates borrowers based on their income and repayment ability, ensuring that even those with low credit scores can access the funds they need.
With same day funding and no hard credit checks, RadCred provides fast financial relief for urgent needs like medical bills, car repairs, or rent payments. RadCred’s platform guarantees approval for bad credit personal loans for eligible applicants, offering loans up to $5,000, making it an ideal solution for those who might otherwise be rejected by traditional lenders. Whether you’re seeking quick loans for bad credit or an emergency loan for bad credit with guaranteed approval, RadCred ensures you can get the funds you need when you need them most.
What are No Credit Check Loans?
No credit check loans are a type of personal loan for bad credit where the lender does not perform a hard credit inquiry, which can negatively impact a borrower’s credit score. Instead, these no credit check loans focus on a borrower’s income and ability to repay. RadCred’s no credit check loans guaranteed approval provide immediate access to cash without the usual barriers imposed by traditional lenders.
Unlike traditional loans, which rely heavily on a borrower’s credit history, RadCred’s no credit check loans allow individuals with bad credit to access fast funding. RadCred uses a soft credit check to evaluate applications, meaning your credit score remains unaffected by the loan application process. This makes RadCred’s no credit check payday loans and bad credit personal loans guaranteed approval $5,000 ideal for people with low credit scores looking for fast financial relief.
How RadCred Solves the Problem
Many individuals with bad credit face barriers when seeking financial help. Traditional banks often reject loan applications from borrowers with a low credit score, leaving them without options in times of need. RadCred’s no credit check loans address this gap by focusing on income verification rather than credit history, making it easier for individuals to obtain loans for bad credit even with a credit score below 600.
RadCred’s process is simple, transparent, and fast. Borrowers can apply for no credit check payday loans from the comfort of their home and get same day payday loans. By evaluating applicants based on income, RadCred ensures more inclusive access to bad credit personal loans guaranteed approval $5,000, making it one of the most reliable lenders for bad credit borrowers.
Key Features of RadCred’s No Credit Check Loans:
Guaranteed Approval: Guaranteed approval for eligible applicants based on income, not FICO score. Borrowers with bad credit have a high chance of approval.
No Hard Credit Check: RadCred uses a soft credit inquiry, ensuring your credit score is not impacted by the loan application.
Same-Day Funding: Funds are typically deposited directly into your bank account the same day, providing fast access to cash.
Flexible Loan Terms: RadCred offers flexible repayment plans, allowing borrowers to choose a term length that suits their financial situation.
Transparent Terms: RadCred discloses APR, fees, and repayment schedules upfront, ensuring no hidden charges.
How to Get Guaranteed Approval for No Credit Check Loans
Applying for no credit check loans with guaranteed approval is easy with RadCred’s streamlined online process:
Apply Online: Complete a short application form with basic personal and financial information.
Soft Credit Check: RadCred uses a soft credit check, so your credit score is not affected by the application.
Receive Multiple Offers: RadCred’s system matches you with lenders based on your income and requested loan amount, giving you options to compare.
Choose Your Offer: Select the loan offer that best fits your needs.
Receive Funds: After approval, funds are typically transferred to your bank account within hours.
Eligibility for No Credit Check Loans
To apply for no credit check loans through RadCred, borrowers must meet the following criteria:
Must be at least 18 years old.
Must be a U.S. resident with a valid U.S. address.
Must have stable income (e.g., employment, benefits).
Must have an active bank account for loan disbursement.
No credit score requirement, though income and repayment ability are key factors.
Why RadCred is the Ideal Choice for Bad Credit Borrowers
RadCred stands out as a reliable solution for individuals seeking no credit check loans with guaranteed approval, especially those with bad credit. Here are some key advantages of choosing RadCred:
Same-Day Funding: RadCred offers fast access to funds, ensuring you get the money you need when emergencies arise.
No Hidden Fees: The platform provides transparent APRs and terms, ensuring borrowers won’t face unexpected charges or surprises.
Flexible Terms: You can select a loan amount and repayment plan that best fits your financial situation, offering more control over your loan.
Trustworthy Network: RadCred partners exclusively with licensed lenders who adhere to ethical lending practices, ensuring a safe borrowing experience.
Safe and Secure: With advanced encryption, RadCred protects your personal and financial data, giving you peace of mind throughout the process.
RadCred’s no credit check loans provide a transparent, secure, and flexible way for bad credit borrowers to access urgent financial relief.
RadCred Offers Various No Credit Check Loan Options for Borrowers with Bad Credit
RadCred’s platform is designed to help individuals facing financial difficulties, especially those with bad credit, by providing a range of no credit check loan options. With a focus on income and repayment ability, RadCred ensures a quick and seamless loan process, making it a reliable choice for borrowers who may have been turned down by traditional banks.
Types of No Credit Check Loans Provided by RadCred
Payday Loans Online (Same Day): RadCred connects borrowers with lenders who offer payday loans online with same-day funding. These short-term loans are ideal for those who need urgent financial assistance before their next paycheck.
Bad Credit Payday Loans: Tailored for individuals with poor credit scores, RadCred’s bad credit payday loans provide quick access to funds with guaranteed approval based on income verification, rather than credit history.
Installment Loans No Credit Check: For larger expenses, RadCred offers installment loans with flexible repayment terms. These loans are ideal for those who need more time to repay their borrowed amount.
Emergency Loans Without Credit Checks: RadCred provides emergency loans to cover unexpected expenses such as medical bills or urgent home repairs. The process is fast and efficient, ensuring that funds are available when needed most.
1-Hour Payday Loans: For immediate financial needs, RadCred offers 1-hour payday loans, providing quick funding for those in urgent need of cash.
These loan types offer flexibility and quick access to cash, all while ensuring that borrowers do not face the traditional barriers imposed by credit score checks.
How RadCred’s No Credit Check Loans Compare to Traditional Loans
Traditional Loans:
Strict credit score requirements: Traditional lenders, such as banks and credit unions, heavily rely on credit scores to determine eligibility. Individuals with bad credit or a low credit score often face difficulty in securing loans. If your score is below 600, the chances of qualifying for a traditional loan are significantly reduced.
Longer approval processes: The approval process for traditional loans is often lengthy and involves numerous steps. Applicants typically need to submit extensive paperwork, including proof of income and assets. The long waiting time is a major disadvantage for those needing immediate access to funds for emergencies.
Higher risk of rejection for bad credit borrowers: Traditional loans are usually not accessible to individuals with bad credit. The rejection rate is high for bad credit borrowers because traditional lenders focus primarily on the applicant’s credit history. As a result, those with poor credit scores or limited credit history are often denied financial assistance.
RadCred No Credit Check Loans:
Focus on income and repayment ability: Unlike traditional lenders, RadCred evaluates applicants based on their income and repayment ability, rather than credit scores. This provides an opportunity for borrowers with bad credit to qualify for loans.
Guaranteed approval for eligible applicants: RadCred offers guaranteed approval to borrowers who meet the basic eligibility criteria, ensuring that more individuals can secure funds.
Fast, same-day funding with no hard credit checks: RadCred’s platform offers same day funding and does not perform hard credit checks, which means applying will not impact your credit score. This makes it an ideal choice for those needing immediate funds for emergencies.
In comparison to traditional loans, RadCred is a faster, more inclusive, and accessible lending solution, especially for individuals with bad credit.
Frequently Asked Questions (FAQs)
Q1: What is the maximum loan amount for no credit check loans? RadCred offers loans up to $5,000 for eligible applicants, depending on income and other factors. Some lenders in RadCred’s network may even offer amounts up to $10,000 based on your financial profile.
Q2: How fast will I receive the money? Once approved, RadCred typically transfers funds to your bank account the same day. The exact timing can depend on your bank’s processing times.
Q3: Will applying for a loan affect my credit score? No, RadCred uses a soft credit check, which will not impact your credit score. This ensures you can apply for loans with confidence, even with a low credit score.
Q4: Are there any hidden fees? No, RadCred is committed to transparency. All fees, APR, and repayment terms are disclosed upfront, so you won’t face any unexpected charges.
Final Thoughts on RadCred’s No Credit Check Loans
RadCred’s no credit check loans offer a flexible, accessible solution for individuals who need bad credit loans. With guaranteed approval based on income and a no credit check approach, RadCred makes it easier for U.S. residents to access funds when they need them most. Whether you need emergency loans for bad credit or are simply looking for a way to manage unexpected expenses, RadCred offers a fast, secure, and reliable platform for financial relief.
Disclaimer:
RadCred’s loan offers are subject to meeting lender requirements and state-specific regulations. While RadCred provides high approval rates for bad credit applicants, no loan is truly guaranteed for everyone. Borrowers must meet basic eligibility criteria. RadCred uses a soft credit check, so your credit score won’t be affected by applying. Loan terms and amounts vary based on lender and borrower profile. Funds are typically deposited the same day, though exact timing may differ.
Paritii, creator of Swyft, is now backed by Google.org as part of the 2025 Generative AI Accelerator. Swyft utilizes generative AI to automate higher education workflows, offering personalized student support 24/7 and enabling staff to focus on high-value tasks, targeting 2 million students.
Photo Courtesy of Paritii
LONDON, July 01, 2025 (GLOBE NEWSWIRE) — Paritii, an EdTech leader in generative AI for higher education, has joined the 2025 Google.org Generative AI Accelerator. This recognition highlights Paritii’s work transforming student experience through its AI-powered Swyft platform, automating administrative processes, and delivering on-demand student support.
“Our commitment to social impact is recognized and trusted by our community. Based on that trust, we are honored to receive this backing from Google.org as we continue this vital work,” said Dr. Shmona Simpson, CEO of Paritii.
Administrative burdens at underfunded colleges reduce retention, satisfaction, and graduation rates due to inefficient systems and overwhelmed advisors, especially for students with historically poor outcomes.
Paritii’s Swyft platform automates high-volume administrative tasks, allowing staff to focus on impactful student interactions. Leveraging a proprietary frontend API and a retrieval-augmented generation (RAG) enabled large language model (LLM), Swyft processes millions of data points to streamline document workflows and support requests.
Swyft combines generative AI with a tailored backend to deliver precision, speed, and personalized support. Students access a 24/7 AI-powered workspace to manage tasks, get guidance, and generate documents.
The solution is poised to reach over 2 million students in the next two years, transforming how institutions serve learners at scale.
According to Paritii, Swyft has already demonstrated transformative potential with quantifiable impact and outcomes.
85% reduction in administrative processing times across partner institutions.
Serve 200,000 students by the end of the accelerator and 2M students in two years
90% student satisfaction and a 60% reduction in document-related queries.
15% increase in student retention rates through faster, more equitable support.
This opportunity helps to affirm Paritii’s bold approach to using generative AI for systemic change, spotlighting Swyft as a model for equitable innovation and empowering the team to reimagine student support across the higher education landscape.
The Google.org Generative AI Accelerator offers over $30 million in funding and support, plus access to Google’s AI experts and Cloud tools. This partnership will help Paritii expand Swyft’s capabilities and advance its mission to improve student outcomes across higher education at scale.
About Paritii
Paritii is an innovation firm at the forefront of ethical AI, specializing in inclusive technology solutions for education, medicine, and public systems. Since 2020, Paritii has partnered with over 50 institutions to design tools that are as responsible as they are effective. Flagship platforms like Swyft and SwyftRFP reflect Paritii’s mission: to expand access, reduce disparities, and make systems work better for the people they serve. From streamlining student support to reimagining procurement, Paritii is building a future where technology works for everyone.
Contact Information:
Contact Person’s Name: Griselle Colon Organization / Company: Paritii Company website: www.paritii.com Contact Email Address: griselle@paritii.com City, State / Province, Country: Spokane, Washington, USA
BALTIMORE — An investigation conducted by U.S. Immigration and Customs Enforcement led to the sentencing of Mark Rice, 38, to 30 years in prison followed by lifetime supervised release, for producing and distributing child sexual abuse material.
“This sentencing is a powerful reminder that those who exploit and abuse children will be relentlessly pursued and held accountable,” said ICE Homeland Security Investigations Baltimore Special Agent in Charge Michael McCarthy. “There is no place in society for predators who create and distribute child sexual abuse material. These crimes shatter lives, and HSI will never waver in our mission to bring justice to victims by targeting those who commit these horrific acts. We will continue to work with our partners to ensure the strongest possible consequences under the law.”
Rice previously pled guilty to one count of producing child sexual abuse material, one count of distributing child sexual abuse material and one count of possessing child sexual abuse material. These charges stem from Rice sexually abusing two minors in his care while using social media to distribute and solicit child sexual abuse material.
According to his plea agreement, Rice used his position of authority to sexually abuse a minor — beginning when she was less than 3 years old — as he created photographic evidence of the abuse. He also exploited a second minor through surreptitious photography. Rice actively participated in online communities dedicated to trading child sexual abuse material. He used platforms such as Reddit, Telegram and Kik to distribute images of his victims and obtain material depicting other children.
In April 2023, the National Center for Missing and Exploited Children received a CyberTip from Reddit regarding the transmission of child sexual abuse material. Authorities traced the tip to an IP address associated with Rice’s Elkton residence.
During a Maryland State Police interview, Rice denied the accusation but was observed deleting photos from his phone. When Rice showed officers his phone, investigators spotted child sexual abuse material in a thumbnail image. Through a deeper search, authorities uncovered additional material in his recently deleted folder.
Then, HSI Baltimore special agents discovered more than 600 child sexual abuse material images across Rice’s devices. Investigators also found that Rice used a public Reddit community to connect with people that he traded child sexual abuse material with using encrypted messaging platforms.
McCarthy, U.S. Attorney for the District of Maryland Kelly O. Hayes and Maryland State Police Superintendent Roland L. Butler Jr. announced the indictment.
Members of the public with information about criminal activity should contact the ICE Tip Line at 866-DHS-2-ICE (866-347-2423).
Learn more about HSI Baltimore’s mission to increase public safety in our Maryland communities on X at @HSIBaltimore.
Singapore, July 01, 2025 (GLOBE NEWSWIRE) — SIMPPLE Ltd. (NASDAQ: SPPL) (“SIMPPLE” or “the Company”), a leading technology provider and innovator in the facilities management (FM) sector, today announced that it believes it has regained compliance with the minimum shareholders’ equity requirement under Nasdaq Listing Rule 5550(b)(1) due to strong financial performance and closing of a financing round, as well as the requirement to hold an annual meeting of shareholders under Nasdaq Listing Rule 5620(a).
Shareholders’ Equity Compliance
As of the date of this report, the Company believes its shareholders’ equity is above the Nasdaq $2.5 million requirement. This increase is partially attributable to the closing of a private investment in public equity (“PIPE”) offering for total gross proceeds of $2,000,001.00. The objective of this fund raise is to accelerate product development and to increase market share, especially in the Australia and New Zealand (ANZ) markets. In addition, the Company expects to continue strengthening its financial position for the full year, supported by robust operating performance for the first half of 2025. Based on these trends and internal forecasts, the Company projects that it will continue to meet and exceed shareholders’ equity requirement by year-end.
Annual General Meeting Compliance
Separately, the Company confirms that it has successfully concluded its Annual General Meeting of Shareholders (“AGM”), which was held at 9:00am Eastern Time, on June 30, 2025. The convening of this AGM satisfies the requirement under Nasdaq Listing Rule 5620(a) to hold an annual meeting of shareholders within the required timeframe. It is, however, also noted that the Company has announced earlier this year that it will rely on Cayman Islands home country exemption with regards to AGM requirements in the future.
The Company will continue to monitor its ongoing compliance with all applicable Nasdaq listing standards and will provide further updates as appropriate.
About SIMPPLE LTD.
Headquartered in Singapore, SIMPPLE LTD. is an advanced technology solution provider in the emerging PropTech space, focused on helping facilities owners and managers manage facilities autonomously. Founded in 2016, the Company has a strong foothold in the Singapore facilities management market, serving over 60 clients in both the public and private sectors and extending out of Singapore into Australia and the Middle East. The Company has developed its proprietary SIMPPLE Ecosystem, to create an automated workforce management tool for building maintenance, surveillance and cleaning comprised of a mix of software and hardware solutions such as robotics (both cleaning and security) and Internet-of-Things (“IoT”) devices.
This press release contains forward-looking statements. In addition, from time to time, we or our representatives may make forward-looking statements orally or in writing. We base these forward-looking statements on our expectations and projections about future events, which we derive from the information currently available to us. Such forward-looking statements relate to future events or our future performance, including: our financial performance and projections; our growth in revenue and earnings; and our business prospects and opportunities. You can identify forward-looking statements by those that are not historical in nature, particularly those that use terminology such as “may,” “should,” “expects,” “anticipates,” “contemplates,” “estimates,” “believes,” “plans,” “projected,” “predicts,” “potential,” or “hopes” or the negative of these or similar terms. In evaluating these forward-looking statements, you should consider various factors, including: our ability to change the direction of the Company; our ability to keep pace with new technology and changing market needs; and the competitive environment of our business. These and other factors may cause our actual results to differ materially from any forward-looking statement.
Forward-looking statements are only predictions. The forward-looking events discussed in this press release and other statements made from time to time by us or our representatives, may not occur, and actual events and results may differ materially and are subject to risks, uncertainties, and assumptions about us. We are not obligated to publicly update or revise any forward-looking statement, whether as a result of uncertainties and assumptions, the forward-looking events discussed in this press release and other statements made from time to time by us or our representatives might not occur.
Headline: We’re teaming up with the Premier League to bring one billion-plus fans closer than ever to the game they love.
The Premier League is entering a new era, powered by Microsoft. As the Official Cloud and AI Partner of the Premier League, we’re helping the world’s most-watched football league unlock new value on and off the pitch. With one intelligent platform powering everything from fan experiences to organizational productivity, this partnership is redefining what’s possible. https://msft.it/6002SFRcO
Headline: Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations
Since 2024, Microsoft Threat Intelligence has observed remote information technology (IT) workers deployed by North Korea leveraging AI to improve the scale and sophistication of their operations, steal data, and generate revenue for the Democratic People’s Republic of Korea (DPRK). Among the changes noted in the North Korean remote IT worker tactics, techniques, and procedures (TTPs) include the use of AI tools to replace images in stolen employment and identity documents and enhance North Korean IT worker photos to make them appear more professional. We’ve also observed that they’ve been utilizing voice-changing software.
North Korea has deployed thousands of remote IT workers to assume jobs in software and web development as part of a revenue generation scheme for the North Korean government. These highly skilled workers are most often located in North Korea, China, and Russia, and use tools such as virtual private networks (VPNs) and remote monitoring and management (RMM) tools together with witting accomplices to conceal their locations and identities.
Historically, North Korea’s fraudulent remote worker scheme has focused on targeting United States (US) companies in the technology, critical manufacturing, and transportation sectors. However, we’ve observed North Korean remote workers evolving to broaden their scope to target various industries globally that offer technology-related roles. Since 2020, the US government and cybersecurity community have identified thousands of North Korean workers infiltrating companies across various industries.
Organizations can protect themselves from this threat by implementing stricter pre-employment vetting measures and creating policies to block unapproved IT management tools. For example, when evaluating potential employees, employers and recruiters should ensure that the candidates’ social media and professional accounts are unique and verify their contact information and digital footprint. Organizations should also be particularly cautious with staffing company employees, check for consistency in resumes, and use video calls to confirm a worker’s identity.
Microsoft Threat Intelligence tracks North Korean IT remote worker activity as Jasper Sleet (formerly known as Storm-0287). We also track several other North Korean activity clusters that pursue fraudulent employment using similar techniques and tools, including Storm-1877 and Moonstone Sleet. To disrupt this activity and protect our customers, we’ve suspended 3,000 known Microsoft consumer accounts (Outlook/Hotmail) created by North Korean IT workers. We have also implemented several detections to alert our customers of this activity through Microsoft Entra ID Protection and Microsoft Defender XDR as noted at the end of this blog. As with any observed nation-state threat actor activity, Microsoft has directly notified targeted or compromised customers, providing them with important information needed to secure their environments. As we continue to observe more attempts by threat actors to leverage AI, not only do we report on them, but we also have principles in place to take action against them.
This blog provides additional information on the North Korean remote IT worker operations we published previously, including Jasper Sleet’s usual TTPs to secure employment, such as using fraudulent identities and facilitators. We also provide recent observations regarding their use of AI tools. Finally, we share detailed guidance on how to investigate, monitor, and remediate possible North Korean remote IT worker activity, as well as detections and hunting capabilities to surface this threat.
From North Korea to the world: The remote IT workforce
Since at least early 2020, Microsoft has tracked a global operation conducted by North Korea in which skilled IT workers apply for remote job opportunities to generate revenue and support state interests. These workers present themselves as foreign (non-North Korean) or domestic-based teleworkers and use a variety of fraudulent means to bypass employment verification controls.
North Korea’s fraudulent remote worker scheme has since evolved, establishing itself as a well-developed operation that has allowed North Korean remote workers to infiltrate technology-related roles across various industries. In some cases, victim organizations have even reported that remote IT workers were some of their most talented employees. Historically, this operation has focused on applying for IT, software development, and administrator positions in the technology sector. Such positions provide North Korean threat actors access to highly sensitive information to conduct information theft and extortion, among other operations.
North Korean IT workers are a multifaceted threat because not only do they generate revenue for the North Korean regime, which violates international sanctions, they also use their access to steal sensitive intellectual property, source code, or trade secrets. In some cases, these North Korean workers even extort their employer into paying them in exchange for not publicly disclosing the company’s data.
Between 2020 and 2022, the US government found that over 300 US companies in multiple industries, including several Fortune 500 companies, had unknowingly employed these workers, indicating the magnitude of this threat. The workers also attempted to gain access to information at two government agencies. Since then, the cybersecurity community has continued to detect thousands of North Korean workers. On January 3, 2025, the Justice Department released an indictment identifying two North Korean nationals and three facilitators responsible for conducting fraudulent work between 2018 and 2024. The indicted individuals generated a revenue of at least US$866,255 from only ten of the at least 64 infiltrated US companies.
North Korean threat actors are evolving across the threat landscape to incorporate more sophisticated tactics and tools to conduct malicious employment-related activity, including the use of custom and AI-enabled software.
Tactics and techniques
The tactics and techniques employed by North Korean remote IT workers involve a sophisticated ecosystem of crafting fake personas, performing remote work, and securing payments. North Korean IT workers apply for remote roles, in various sectors, at organizations across the globe.
They create, rent, or procure stolen identities that match the geo-location of their target organizations (for example, they would establish a US-based identity to apply for roles at US-based companies), create email accounts and social media profiles, and establish legitimacy through fake portfolios and profiles on developer platforms like GitHub and LinkedIn. Additionally, they leverage AI tools to enhance their operations, including image creation and voice-changing software. Facilitators play a crucial role in validating fraudulent identities and managing logistics, such as forwarding company hardware and creating accounts on freelance job websites. To evade detection, these workers use VPNs, virtual private servers (VPSs), and proxy services as well as RMM tools to connect to a device housed at a facilitator’s laptop farm located in the country of the job.
Figure 1. The North Korean IT worker ecosystem
Crafting fake personas and profiles
The North Korean remote IT worker fraud scheme begins with the procurement of identities for the workers. These identities, which can be stolen or “rented” from witting individuals, include names, national identification numbers, and dates of birth. The workers might also leverage services that generate fraudulent identities, complete with seemingly legitimate documentation, to fabricate their personas. They then create email accounts and social media pages they use to apply for jobs, often indirectly through staffing or contracting companies. They also apply for freelance opportunities through freelancer sites as an additional avenue for revenue generation. Notably, they often use the same names/profiles repeatedly rather than creating unique personas for each successful infiltration.
Additionally, the North Korean IT workers have used fake profiles on LinkedIn to communicate with recruiters and apply for jobs.
Figure 2. An example of a North Korean IT worker LinkedIn profile that has since been taken down.
The workers tailor their fake resumes and profiles to match the requirements for specific remote IT positions, thus increasing their chances of getting selected. Over time, we’ve observed these fake resumes and employee documents noticeably improving in quality, now appearing more polished and lacking grammatical errors facilitated by AI.
After creating their fake personas, the North Korean IT workers then attempt to establish legitimacy by creating digital footprints for these fake personas. They typically leverage communication, networking, and developer platforms, (for example, GitHub) to showcase their supposed portfolio of previous work samples:
Figure 3. Example profile used by a North Korean IT worker that has since been taken down.
Using AI to improve operations
Microsoft Threat intelligence has observed North Korean remote IT workers leveraging AI to improve the quantity and quality of their operations. For example, in October 2024, we found a public repository containing actual and AI-enhanced images of suspected North Korean IT workers:
Figure 4. Photos of potential North Korean IT workers
The repository also contained the resumes and email accounts used by the said workers, along with the following tools and resources they can use to secure employment and to do their work:
VPS and VPN accounts, along with specific VPS IP addresses
Playbooks on conducting identity theft and creating and bidding jobs on freelancer websites
Wallet information and suspected payments made to facilitators
LinkedIn, GitHub, Upwork, TeamViewer, Telegram, and Skype accounts
Tracking sheet of work performed, and payments received by the IT workers
Image creation
Based on our review of the repository mentioned previously, North Korean IT workers appear to conduct identity theft and then use AI tools like Faceswap to move their pictures over to the stolen employment and identity documents. The attackers also use these AI tools to take pictures of the workers and move them to more professional looking settings. The workers then use these AI-generated pictures on one or more resumes or profiles when applying for jobs.
Figure 5. Use of AI apps to modify photos used for North Korean IT workers’ resumes and profilesFigure 6. Examples of resumes for North Korean IT workers. These two resumes use different versions of the same photo.
Communications
Microsoft Threat Intelligence has observed that North Korean IT workers are also experimenting with other AI technologies such as voice-changing software. While we haven’t observed threat actors using combined AI voice and video products as a tactic first hand, we do recognize that combining these technologies could allow future threat actor campaigns to trick interviewers into thinking they aren’t communicating with a North Korean IT worker. If successful, this tactic could allow the North Korean IT workers to do interviews directly and no longer rely on facilitators standing in for them on interviews or selling them account access.
Facilitators for initial access
North Korean Remote IT workers require assistance from a witting facilitator to help find jobs, pass the employment verification process, and once hired, successfully work remotely. We’ve observed Jasper Sleet advertising job opportunities for facilitator roles under the guise of partnering with a remote job candidate to help secure an IT role in a competitive market:
Figure 7. Example of a job opportunity for a facilitator role
The IT workers may have the facilitators assist in creating accounts on remote and freelance job websites. They might also ask the facilitator to perform the following tasks as their relationship builds:
Create a bank account for the North Korean IT worker, or lend their (the facilitator’s) own account to the worker
Purchase mobile phone numbers or SIM cards
During the employment verification process, the witting accomplice helps the North Korean IT workers validate the latter’s fraudulent identities using online background check service providers. The documents submitted by the workers include fake or stolen drivers’ licenses, social security cards, passports, and permanent resident identification cards. Workers train using interview scripts, which include a justification for why the employee must work remotely.
Once hired, the remote workers direct company laptops and hardware to be sent to the address of the accomplice. The accomplice then either runs a laptop farm that provides the laptops with an internet connection at the geo-location of the role or forwards the items internationally. For hardware that remain in the country of the role, the accomplice signs into the computers and installs software that enables the workers to connect remotely. Remote IT workers might also access devices remotely using IP-based KVM devices, like PiKVM or TinyPilot.
Defense evasion and persistence
To conceal their physical location as well as maintain persistence and blend into the target organization’s environment, the workers typically use VPNs (particularly Astrill VPN), VPSs, proxy services, and RMM tools. Microsoft Threat Intelligence has observed the persistent use of JumpConnect, TinyPilot, Rust Desk, TeamViewer, AnyViewer, and Anydesk. When an in-person presence or face-to-face meeting is required, for example to confirm banking information or attend a meeting, the workers have been known to pay accomplices to stand in for them. When possible, however, the workers eliminate all face-to-face contact, offering fraudulent excuses for why they are not on camera during video teleconferencing calls or speaking.
Attribution
Microsoft Threat Intelligence uses the name Jasper Sleet (formerly known as Storm-0287) to represent activity associated with North Korean’s remote IT worker program. These workers are primarily focused on revenue generation, use remote access tools, and likely fall under a particular leadership structure in North Korea. We also track several other North Korean activity clusters that pursue fraudulent employment using similar techniques and tools, including Storm-1877 and Moonstone Sleet.
How Microsoft disrupts North Korean remote IT worker operations with machine learning
Microsoft has successfully scaled analyst tradecraft to accelerate the identification and disruption of North Korean IT workers in customer environments by developing a custom machine learning solution. This has been achieved by leveraging Microsoft’s existing threat intelligence and weak signals generated by monitoring for many of the red flags listed in this blog, among others. For example, this solution uses impossible time travel risk detections, most commonly between a Western nation and China or Russia. The machine learning workflow uses these features to surface suspect accounts most likely to be North Korean IT workers for assessment by Microsoft Threat Intelligence analysts.
Once Microsoft Threat Intelligence reviews and confirms that an account is indeed associated with a North Korean IT worker, customers are then notified with a Microsoft Entra ID Protection risk detection warning of a risky sign-in based on Microsoft’s threat intelligence. Microsoft Defender XDR customers also receive the alert Sign-in activity by a suspected North Korean entity in the Microsoft Defender portal.
Defending against North Korean remote IT worker infiltration
Defending against the threats from North Korean remote IT workers involves a threefold strategy:
Ensuring a proper vetting approach is in place for freelance workers and vendors
Monitoring for anomalous user activity
Responding to suspected Jasper Sleet signals in close coordination with your insider risk team
Investigate
How can you identify a North Korean remote IT worker in the hiring process?
To protect your organization against a potential North Korean insider threat, it is important for your organization to prioritize a process for verifying employees to identify potential risks. The following can be used to assess potential employees:
Confirm the potential employee has a digital footprint and look for signs of authenticity. This includes a real phone number (not VoIP), a residential address, and social media accounts. Ensure the potential employee’s social media/professional accounts are not highly similar to the accounts of other individuals. In addition, check that the contact phone number listed on the potential employee’s account is unique and not also used by other accounts.
Scrutinize resumes and background checks for consistency of names, addresses, and dates. Consider contacting references by phone or video-teleconference rather than email only.
Exercise greater scrutiny for employees of staffing companies, since this is the easiest avenue for North Korean workers to infiltrate target companies.
Search whether a potential employee is employed at multiple companies using the same persona.
Ensure the potential employee is seen on camera during multiple video telecommunication sessions. If the potential employee reports video and/or microphone issues that prohibit participation, this should be considered a red flag.
During video verification, request individuals to physically hold driver’s licenses, passports, or identity documents up to camera.
Keep records, including recordings of video interviews, of all interactions with potential employees.
Require notarized proof of identity.
Monitor
How can your organization prevent falling victim to the North Korean remote IT worker technique?
To prevent the risks associated with North Korean insider threats, it’s vital to monitor for activity typically associated with this fraudulent scheme.
Monitor for identifiable characteristics of North Korean remote workers
Microsoft has identified the following characteristics of a North Korean remote worker. Note that not all the criteria are necessarily required, and further, a positive identification of a remote worker doesn’t guarantee that the worker is North Korean.
The employee lists a Chinese phone number on social media accounts that is used by other accounts.
The worker’s work-issued laptop authenticates from an IP address of a known North Korean IT worker laptop farm, or from foreign—most commonly Chinese or Russian—IP addresses even though the worker is supposed to have a different work location.
The worker is employed at multiple companies using the same persona. Employees of staffing companies require heightened scrutiny, given this is the easiest way for North Korean workers to infiltrate target companies.
Once a laptop is issued to the worker, RMM software is immediately downloaded onto it and used in combination with a VPN.
The worker has never been seen on camera during a video telecommunication session or is only seen a few times. The worker may also report video and/or microphone issues that prohibit participation from the start.
The worker’s online activity doesn’t align with routine co-worker hours, with limited engagement across approved communication platforms.
Monitor for activity associated with Jasper Sleet access
If RMM tools are used in your environment, enforce security settings where possible, to implement MFA:
If an unapproved installation is discovered, reset passwords for accounts used to install the RMM services. If a system-level account was used to install the software, further investigation may be warranted.
Monitor for impossible travel—for example, a supposedly US-based employee signing in from China or Russia.
Monitor for use of public VPNs such as Astrill. For example, IP addresses associated with VPNs known to be used by Jasper Sleet can be added to Sentinel watchlists. Or, Microsoft Defender for Identity can integrate with your VPN solution to provide more information about user activity, such as extra detection for abnormal VPN connections.
Monitor for signals of insider threats in your environment. Microsoft Purview Insider Risk Management can help identify potentially malicious or inadvertent insider risks.
Monitor for consistent user activity outside of typical working hours.
Remediate
What are the next steps if you positively identify a North Korean remote IT worker employed at your company?
Because Jasper Sleet activity follows legitimate job offers and authorized access, Microsoft recommends approaching confirmed or suspected Jasper Sleet intrusions with an insider risk approach using your organization’s insider risk response plan or incident response provider like Microsoft Incident Response. Some steps might include:
Restrict response efforts to a small, trusted insider risk working group, trained in operational security (OPSEC) to avoid tipping off subjects and potential collaborators.
Rapidly evaluate the subject’s proximity to critical assets, such as:
Leadership or sensitive teams
Direct reports or vendor staff the subject has influence over
Suppliers or vendors
People/non-people accounts, production/pre-production environments, shared accounts, security groups, third-party accounts, security groups, distribution groups, data clusters, and more
Conduct preliminary link analysis to:
Detect relationships with potential collaborators, supporters, or other potential aliases operated by the same actor
Identify shared indicators (for example, shared IP addresses, behavioral overlap)
Avoid premature action that might alert other Jasper Sleet operators
Conduct a risk-based prioritization of efforts, informed by:
Placement and access to critical assets (not necessarily where you identified them)
Stakeholder insight from potentially impacted business units
Business impact considerations of containment (which might support additional collection/analysis) or mitigation (for example, eviction)
Conduct open-source intelligence (OSINT) collection and analysis to:
Determine if the identity associated with the threat actor is associated with a real person. For example, North Korean IT workers have leveraged stolen identities of real US persons to facilitate their fraud. Conduct OSINT on all available personally identifiable information (PII) provided by the actor (name, date of birth, SSN, home of record, phone number, emergency contact, and others) and determine if these items are linked to additional North Korean actors, and/or real persons’ identities.
Gather all known external accounts operated by the alias/persona (for example, LinkedIn, GitHub, freelance working sites, bug bounty programs).
Perform analysis on account images using open-source tools such as FaceForensics++ to determine prevalence of AI-generated content. Detection opportunities within video and imagery include:
Temporal consistency issues: Rapid movements cause noticeable artifacts in video deepfakes as the tracking system struggles to maintain accurate landmark positioning.
Occlusion handling: When objects pass over the AI-generated content such as the face, deepfake systems tend to fail at properly reconstructing the partially obscured face.
Lighting adaptation: Changes in lighting conditions might reveal inconsistencies in the rendering of the face
Audio-visual synchronization: Slight delays between lip movements and speech are detectable under careful observation
Exaggerated facial expressions.
Duplicative or improperly placed appendages.
Pixelation or tearing at edges of face, eyes, ears, and glasses.
Engage counterintelligence or insider risk/threat teams to:
Understand tradecraft and likely next steps
Gain national-level threat context, if applicable
Make incremental, risk-based investigative and response decisions with the support of your insider threat working group and your insider threat stakeholder group; one providing tactical feedback and the other providing risk tolerance feedback.
Preserve evidence and document findings.
Share lessons learned and increase awareness.
Educate employees on the risks associated with insider threats and provide regular security training for employees to recognize and respond to threats, including a section on the unique threat posed by North Korean IT workers.
After an insider risk response to Jasper Sleet, it might be necessary to also conduct a thorough forensic investigation of all systems that the employee had access to for indicators of persistence, such as RMM tools or system/resource modifications.
For additional resources, refer to CISA’s Insider Threat Mitigation Guide. If you suspect your organization is being targeted by nation-state cyber activity, report it to the appropriate national authority. For US-based organizations, the Federal Bureau of Investigation (FBI) recommends reporting North Korean remote IT worker activity to the Internet Crime Complaint Center (IC3).
Microsoft Defender XDR detections
Microsoft Defender XDR customers can refer to the list of applicable detections below. Microsoft Defender XDR coordinates detection, prevention, investigation, and response across endpoints, identities, email, apps to provide integrated protection against attacks like the threat discussed in this blog.
Customers with provisioned access can also use Microsoft Security Copilot in Microsoft Defender to investigate and respond to incidents, hunt for threats, and protect their organization with relevant threat intelligence.
Microsoft Defender XDR
Alerts with the following titles in the security center can indicate threat activity on your network:
Sign-in activity by a suspected North Korean entity
Microsoft Defender for Endpoint
Alerts with the following titles in the security center can indicate Jasper Sleet RMM activity on your network. These alerts, however, can be triggered by unrelated threat activity.
Suspicious usage of remote management software
Suspicious connection to remote access software
Microsoft Defender for Identity
Alerts with the following titles in the security center can indicate atypical identity access on your network. These alerts, however, can be triggered by unrelated threat activity.
Atypical travel
Suspicious behavior: Impossible travel activity
Microsoft EntraID Protection
Microsoft Entra ID Protection risk detections inform Entra ID user risk events and can indicate associated threat activity, including unusual user activity consistent with known patterns identified by Microsoft Threat Intelligence research. Note, however, that these alerts can be also triggered by unrelated threat activity.
Microsoft Entra threat intelligence (sign-in): (RiskEventType: investigationsThreatIntelligence)
Microsoft Defender for Cloud Apps
Alerts with the following titles in the security center can indicate atypical identity access on your network. These alerts, however, can be triggered by unrelated threat activity.
Impossible travel activity
Microsoft Security Copilot
Security Copilot customers can use the standalone experience to create their own prompts or run the following pre-built promptbooks to automate incident response or investigation tasks related to this threat:
Incident investigation
Microsoft User analysis
Threat actor profile
Note that some promptbooks require access to plugins for Microsoft products such as Microsoft Defender XDR or Microsoft Sentinel.
Hunting queries
Microsoft Defender XDR
Because organizations might have legitimate and frequent uses for RMM software, we recommend using the Microsoft Defender XDR advanced hunting queries available on GitHub to locate RMM software that hasn’t been endorsed by your organization for further investigation. In some cases, these results might include benign activity from legitimate users. Regardless of use case, all newly installed RMM instances should be scrutinized and investigated.
If any queries have high fidelity for discovering unsanctioned RMM instances in your environment, and don’t detect benign activity, you can create a custom detection rule from the advanced hunting query in the Microsoft Defender portal.
Microsoft Sentinel
The alert Insider Risk Sensitive Data Access Outside Organizational Geo-locationjoins Azure Information Protection logs (InformationProtectionLogs_CL) with Microsoft Entra ID sign-in logs (SigninLogs) to provide a correlation of sensitive data access by geo-location. Results include:
User principal name
Label name
Activity
City
State
Country/Region
Time generated
The recommended configuration is to include (or exclude) sign-in geo-locations (city, state, country and/or region) for trusted organizational locations. There is an option for configuration of correlations against Microsoft Sentinel watchlists. Accessing sensitive data from a new or unauthorized geo-location warrants further review.
References
Acknowledgments
For more information on North Korean remote IT worker operations, we recommend reviewing DTEX’s in-depth analysis in the report Exposing DPRK’s Cyber Syndicate and IT Workforce.
Learn more
Meet the experts behind Microsoft Threat Intelligence, Incident Response, and the Microsoft Security Response Center at our VIP Mixer at Black Hat 2025. Discover how our end-to-end platform can help you strengthen resilience and elevate your security posture.
For the latest security research from the Microsoft Threat Intelligence community, check out the Microsoft Threat Intelligence Blog.
To get notified about new publications and to join discussions on social media, follow us on LinkedIn, X (formerly Twitter), and Bluesky.
To hear stories and insights from the Microsoft Threat Intelligence community about the ever-evolving threat landscape, listen to the Microsoft Threat Intelligence podcast.
Source: United States Senator Ted Budd (R-North Carolina)
Washington, D.C. — U.S. Senator Ted Budd (R-N.C.) released the following statement after voting in support of President Trump’s One Big Beautiful Bill Act, historic legislation that lowers taxes for families, makes America safer and more secure, and unleashes economic growth for the future:
“I voted in favor of the One Big Beautiful Bill Act because the people of North Carolina deserve more of their hard-earned wages, a more secure border, a reinvigorated military, responsible spending reforms for government programs, and a thriving economy. My colleagues and I fought successfully to protect North Carolina’s tobacco growers to help them stay competitive with China. I am also grateful that this bill included my PELL Act, which will help Americans earn in-demand credentials for rewarding careers. I hope my colleagues in the House quickly get this bill on President Trump’s desk because Americans cannot afford the largest tax increase in our nation’s history,” said Sen. Budd.
Here’s How the One Big Beautiful Bill Act Directly Benefits North Carolina:
Provides Unprecedented Tax Relief for Families
This legislation helps Americans keep more money in their pockets by extending key provisions of President Trump’s 2017 Tax Cuts and Jobs Act. Preventing the largest tax increase in American history will save the average North Carolinian $2,474 in 2026.
Working families will receive significant savings with the increase and permanence of the child tax credit, expanded tax credits for paid leave, enhanced 529 savings accounts, and additional childcare access.
This legislation lowers taxes for seniors relying on Social Security.
Gives Workers the Tools They Need to Advance Their Careers
Sen. Budd fought to have his PELL Act included in this legislation, a provision that expands Pell Grant eligibility for high-quality, short-term workforce programs. This would benefit individuals seeking to advance their careers without long-term debt while also providing American businesses with a broader, better-prepared talent pool ready to meet the demands of a rapidly evolving economy.
Protects North Carolina Agriculture
Sen. Budd successfully defended tobacco’s eligibility to receive the “duty drawback,” allowing tobacco manufacturers to receive reimbursement for the tariffs they pay on materials used to produce tobacco products that they ship to international markets. This will protect North Carolina growers and prevent the tobacco market from being flooded with cheaper, lower-quality products from China and Brazil.
This legislation provides serious tax relief for North Carolina farmers by raising the death tax exemption, ensuring family farms can be passed down to future generations, rather than being broken up and sold.
Unlocks Economic Growth & American Manufacturing
This legislation will create a renaissance in American manufacturing by delivering full expensing for companies that build new factories and invest in equipment and machinery. This will help create new, good-paying jobs.
By enhancing the small business deduction and making it permanent, small businesses will be able to hire more workers.
Increasing deductions for small businesses’ equipment and property will quickly help businesses grow.
Reduces Government Spending to Preserve & Protect Government Programs
This legislation contains the first structural reforms to address waste, fraud, and abuse in key government programs like SNAP and Medicaid in over three decades. Slowing the rate of exponential cost increases will result in significant deficit savings and will preserve and protect these programs for future generations.
Invests in America’s National Defense
Sen. Budd helped secure funding to boost manufacturing capacity for the next generation of the F-15, the F-15EX, which will sustain the training mission at Seymour Johnson far into the future.
This legislation also includes significant funding to enhance America’s air superiority by preventing the retirement of the F-15E aircraft flying out of Seymour Johnson Air Force Base.
America’s troops deserve a pay raise. This legislation increases pay and allowances while making improvements to housing, healthcare, childcare, and education.
This legislation makes generational investments in our military readiness that will protect the American homeland and deter our adversaries by boosting America’s missile defense by building the “Golden Dome.”
Sen. Budd worked to secure investments to improve housing at Fort Bragg and Seymour Johnson and funds for restoration and modernization at Camp Lejeune.
This legislation creates new production lines to scale innovative, cost-effective munitions, so we are no longer shooting $4M missiles at $50,000 drones.
This legislation makes the largest ever investment in the Coast Guard’s history, which will purchase more than 40 new helicopters and six new C-130J aircraft, which will be serviced at the Aviation Technical Training Center in Elizabeth City. The legislation also funds 17 new icebreakers to protect American interests and 21 new cutters to combat drug runners and human traffickers.
Keeps America’s Border Secure
While President Trump’s policies have resulted in a dramatic drop-off of illegal immigration, this legislation also boosts America’s border security by surging funding for 3,000 new Border Patrol agents and 10,000 new ICE agents. The One Big Beautiful Bill also increases funding to finish President Trump’s border wall.
Ushers in Next-Generation Technologies
This legislation includes funding for the transformational air traffic control modernization project underway at the FAA. This will quickly update aging and failing technologies to keep Americans safe in the sky.
This legislation makes a historic amount of spectrum available for commercial use, which will create new jobs and unleash the next generation of wireless technology. This will ensure America remains the premier destination for innovation and help unleash a new area of advanced manufacturing. This will also make the internet faster & more dependable across the country through commercial success stories like 5G, 6G, wi-fi, and private networks using CBRS.
An ARU graduation ceremony at Chelmsford Cathedral
July will see approximately 6,000 Anglia Ruskin University (ARU) students across the East of England cross the stage to graduate, ready to take the next step in their careers.
Ceremonies begin at the Cambridge Corn Exchange from Monday, July 7 until Wednesday, July 9. In addition to students formally receiving their degrees, an honorary doctorate will be bestowed on Nadia Edwards-Dashti, entrepreneur, author, equity and inclusion thought-leader, and co-founder of London-based Harrington Starr, a global leader in FinTech recruitment.
Peterborough Cathedral will host the first ever set of graduations for ARU Peterborough students at 2pm on Friday, 11 July.
On Monday, 14 July, graduation ceremonies take place in Essex, with 21 ceremonies to be held at Chelmsford Cathedral across the week.
On Thursday, 17 July, ARU will bestow the award of Honorary Doctor of Business Administration on alumnus Vice Admiral Andrew Kyte, the Royal Navy’s Chief of Defence Logistics and Support.
Many of the 6,000 students due to attend graduation ceremonies this month will go on to take up vital roles in public service, including careers as doctors and police officers.
“Graduation is always a fantastic occasion, not only for our students and their families, but also our staff who have worked with them for several years to help them to earn their degree.
“My warmest congratulations to all our graduates, we are extremely proud of them and they will always be part of our ARU community.”
Professor Roderick Watkins, Vice Chancellor of Anglia Ruskin University (ARU)
Law Enforcement Actions Across 16 States Result in Charges, Arrest, and Seizures of 29 Financial Accounts, 21 Fraudulent Websites, and Approximately 200 Computers
The Justice Department announced today coordinated actions against the Democratic People’s Republic of North Korea (DPRK) government’s schemes to fund its regime through remote information technology (IT) work for U.S. companies. These actions include two indictments, an arrest, searches of 29 known or suspected “laptop farms” across 16 states, and the seizure of 29 financial accounts used to launder illicit funds and 21 fraudulent websites.
According to court documents, the schemes involve North Korean individuals fraudulently obtaining employment with U.S. companies as remote IT workers, using stolen and fake identities. The North Korean actors were assisted by individuals in the United States, China, United Arab Emirates, and Taiwan, and successfully obtained employment with more than 100 U.S. companies.
As alleged in court documents, certain U.S.-based individuals enabled one of the schemes by creating front companies and fraudulent websites to promote the bona fides of the remote IT workers, and hosted laptop farms where the remote North Korean IT workers could remote access into U.S. victim company-provided laptop computers. Once employed, the North Korean IT workers received regular salary payments, and they gained access to, and in some cases stole, sensitive employer information such as export controlled U.S. military technology and virtual currency. In another scheme, North Korean IT workers used false or fraudulently obtained identities to gain employment with an Atlanta, Georgia-based blockchain research and development company and stole virtual currency worth approximately over $900,000.
“These schemes target and steal from U.S. companies and are designed to evade sanctions and fund the North Korean regime’s illicit programs, including its weapons programs,” said Assistant Attorney General John A. Eisenberg of the Department’s National Security Division. “The Justice Department, along with our law enforcement, private sector, and international partners, will persistently pursue and dismantle these cyber-enabled revenue generation networks.”
“North Korean IT workers defraud American companies and steal the identities of private citizens, all in support of the North Korean regime,” said Assistant Director Brett Leatherman of FBI’s Cyber Division. “That is why the FBI and our partners continue to work together to disrupt infrastructure, seize revenue, indict overseas IT workers, and arrest their enablers in the United States. Let the actions announced today serve as a warning: if you host laptop farms for the benefit of North Korean actors, law enforcement will be waiting for you.”
“North Korea remains intent on funding its weapons programs by defrauding U.S. companies and exploiting American victims of identity theft, but the FBI is equally intent on disrupting this massive campaign and bringing its perpetrators to justice,” said Assistant Director Roman Rozhavsky of the FBI Counterintelligence Division. “North Korean IT workers posing as U.S. citizens fraudulently obtained employment with American businesses so they could funnel hundreds of millions of dollars to North Korea’s authoritarian regime. The FBI will do everything in our power to defend the homeland and protect Americans from being victimized by the North Korean government, and we ask all U.S. companies that employ remote workers to remain vigilant to this sophisticated threat.”
Zhenxing Wang, et al. Indictment, Seizure Warrants, and Arrest – District of Massachusetts
Today, the United States Attorney’s Office for the District of Massachusetts and the National Security Division announced the arrest of U.S. national Zhenxing “Danny” Wang of New Jersey pursuant to a five-count indictment. The indictment describes a multi-year fraud scheme by Wang and his co-conspirators to obtain remote IT work with U.S. companies that generated more than $5 million in revenue. The indictment also charges Chinese nationals Jing Bin Huang (靖斌 黄), Baoyu Zhou (周宝玉), Tong Yuze (佟雨泽), Yongzhe Xu (徐勇哲 andيونجزهي أكسو), Ziyou Yuan (زيو) and Zhenbang Zhou (周震邦), and Taiwanese nationals Mengting Liu (劉 孟婷) and Enchia Liu (刘恩) for their roles in the scheme.
“The threat posed by DPRK operatives is both real and immediate. Thousands of North Korean cyber operatives have been trained and deployed by the regime to blend into the global digital workforce and systematically target U.S. companies,” said U.S. Attorney Leah B. Foley for the District of Massachusetts. “We will continue to work relentlessly to protect U.S. businesses and ensure they are not inadvertently fueling the DPRK’s unlawful and dangerous ambitions.”
According to the indictment, from approximately 2021 until October 2024, the defendants and other co-conspirators compromised the identities of more than 80 U.S. persons to obtain remote jobs at more than 100 U.S. companies, including many Fortune 500 companies, and caused U.S. victim companies to incur legal fees, computer network remediation costs, and other damages and losses of at least $3 million. Overseas IT workers were assisted by Kejia Wang, Zhenxing Wang, and at least four other identified U.S. facilitators. Kejia Wang, for example, communicated with overseas co-conspirators and IT workers, and traveled to Shenyang and Dandong, China, including in 2023, to meet with them about the scheme. To deceive U.S. companies into believing the IT workers were located in the United States, Kejia Wang, Zhenxing Wang, and the other U.S. facilitators received and/or hosted laptops belonging to U.S. companies at their residences, and enabled overseas IT workers to access the laptops remotely by, among other things, connecting the laptops to hardware devices designed to allow for remote access (referred to as keyboard-video-mouse or “KVM” switches).
Kejia Wang and Zhenxing Wang also created shell companies with corresponding websites and financial accounts, including Hopana Tech LLC, Tony WKJ LLC, and Independent Lab LLC, to make it appear as though the overseas IT workers were affiliated with legitimate U.S. businesses. Kejia Wang and Zhenxing Wang established these and other financial accounts to receive money from victimized U.S. companies, much of which was subsequently transferred to overseas co‑conspirators. In exchange for their services, Kejia Wang, Zhenxing Wang, and the four other U.S. facilitators received a total of at least $696,000 from the IT workers.
IT workers employed under this scheme also gained access to sensitive employer data and source code, including International Traffic in Arms Regulations (ITAR) data from a California-based defense contractor that develops artificial intelligence-powered equipment and technologies. Specifically, between on or about Jan. 19, 2024, and on or about April 2, 2024, an overseas co-conspirator remotely accessed without authorization the company’s laptop and computer files containing technical data and other information. The stolen data included information marked as being controlled under the ITAR.
Simultaneously with today’s announcement, the FBI and Defense Criminal Investigative Service (DCIS) seized 17 web domains used in furtherance of the charged scheme and further seized 29 financial accounts, holding tens of thousands of dollars in funds, used to launder revenue for the North Korean regime through the remote IT work scheme.
Previously, in October 2024, as part of this investigation, federal law enforcement executed searches at eight locations across three states that resulted in the recovery of more than 70 laptops and remote access devices, such as KVMs. Simultaneously with that action, the FBI seized four web domains associated with Kejia Wang’s and Zhenxing Wang’s shell companies used to facilitate North Korean IT work.
The FBI Las Vegas Field Office, DCIS San Diego Resident Agency, and Homeland Security Investigations San Diego Field Office are investigating the case.
Assistant U.S. Attorney Jason Casey for the District of Massachusetts and Trial Attorney Gregory J. Nicosia, Jr. of the National Security Division’s National Security Cyber Section are prosecuting the case, with significant assistance from Legal Assistants Daniel Boucher and Margaret Coppes. Valuable assistance was also provided by Mark A. Murphy of the National Security Division’s Counterintelligence and Export Control Section and the U.S. Attorneys’ Offices for the District of New Jersey, Eastern District of New York, and Southern District of California.
Kim Kwang Jin et al. Indictment – Northern District of Georgia
Today, the Northern District of Georgia unsealed a five-count wire fraud and money laundering indictment charging four North Korean nationals, Kim Kwang Jin (김관진), Kang Tae Bok (강태복), Jong Pong Ju (정봉주) and Chang Nam Il (창남일), with a scheme to steal virtual currency from two companies, valued at over $900,000 at the time of the thefts, and to launder proceeds of those thefts. The defendants remain at large and wanted by the FBI.
“The defendants used fake and stolen personal identities to conceal their North Korean nationality, pose as remote IT workers, and exploit their victims’ trust to steal hundreds of thousands of dollars,” said U.S. Attorney Theodore S. Hertzberg for the Northern District of Georgia. “This indictment highlights the unique threat North Korea poses to companies that hire remote IT workers and underscores our resolve to prosecute any actor, in the United States or abroad, who steals from Georgia businesses.”
According to the indictment, the defendants traveled to the United Arab Emirates on North Korean travel documents and worked as a co-located team. In approximately December 2020 and May 2021, respectively, Kim Kwang Jin (using victim P.S.’s stolen identity) and Jong Pong Ju (using the alias “Bryan Cho”) were hired by a blockchain research and development company headquartered in Atlanta, Georgia, and a virtual token company based in Serbia. Both defendants concealed their North Korean identities from their employers by providing false identification documents containing a mix of stolen and fraudulent identity information. Neither company would have hired Kim Kwang Jin and Jong Pong Ju had they known that they were North Korean citizens. Later, on a recommendation from Jong Pong Ju, the Serbian company hired “Peter Xiao,” who in fact was Chang Nam Il.
After gaining their employers’ trust, Kim Kwang Jin and Jong Pong Ju were assigned projects that provided them access to their employers’ virtual currency assets. In February 2022, Jong Pong Ju used that access to steal virtual currency worth approximately $175,000 at the time of the theft, sending it to a virtual currency address he controlled. In March 2022, Kim Kwang Jin stole virtual currency worth approximately $740,000 at the time of theft by modifying the source code of two of his employer’s smart contracts, then sending it to a virtual currency address he controlled.
To launder the funds after the thefts, Kim Kwang Jin and Jong Pong Ju “mixed” the stolen funds using the virtual currency mixer Tornado Cash and then transferred the funds to virtual currency exchange accounts controlled by defendants Kang Tae Bok and Chang Nam Il but held in the name of aliases. These accounts were opened using fraudulent Malaysian identification documents.
The FBI Atlanta Field Office is investigating the case.
Assistant U.S. Attorneys Samir Kaushal and Alex Sistla for the Northern District of Georgia and Trial Attorney Jacques Singer-Emery of the National Security Division’s National Security Cyber Section are prosecuting the case.
21 Searches of Known or Suspected U.S.-based Laptop Farms – Multi-District
Between June 10 and June 17, 2025, the FBI executed searches of 21 premises across 14 states hosting known and suspected laptop farms. These actions, coordinated by the FBI Denver Field Office, related to investigations of North Korean remote IT worker schemes being conducted by the U.S. Attorneys’ Offices of the District of Colorado, Eastern District of Missouri, and Northern District of Texas. In total, the FBI seized approximately 137 laptops.
Valuable assistance was provided by the U.S. Attorney’s Offices for the District of Connecticut, the Eastern District of Michigan, the Eastern District of Wisconsin, the Middle District of Florida, the Northern District of Georgia, the Northern District of Illinois, the Northern District of Indiana, the District of Oregon, the Southern District of Florida, the Southern District of Ohio, the Western District of New York, and the Western District of Pennsylvania.
***
The Department’s actions to combat these schemes are the latest in a series of law enforcement actions under a joint National Security Division and FBI Cyber and Counterintelligence Divisions effort, the DPRK RevGen: Domestic Enabler Initiative. This effort prioritizes targeting and disrupting the DPRK’s illicit revenue generation schemes and its U.S.-based enablers. The Department previously announced other actions pursuant to the initiative, including in January 2025 and prior, as well as the filing of a civil forfeiture complaint in early June 2025 for over $7.74 million tied to an illegal employment scheme.
As the FBI has described in Public Service Announcements published in May 2024 and January 2025, North Korean remote IT workers posing as legitimate remote IT workers have committed data extortion and exfiltrated the proprietary and sensitive data from U.S. companies. DPRK IT worker schemes typically involve the use of stolen identities, alias emails, social media, online cross-border payment platforms, and online job site accounts, as well as false websites, proxy computers, and witting and unwitting third parties located in the U.S. and elsewhere.
Other public advisories about the threats, red flag indicators, and potential mitigation measures for these schemes include a May 2022 advisory released by the FBI, Department of the Treasury, and Department of State; a July 2023 advisory from the Office of the Director of National Intelligence; and guidance issued in October 2023 by the United States and the Republic of Korea (South Korea). As described the May 2022 advisory, North Korean IT workers have been known individually to earn up to $300,000 annually, generating hundreds of millions of dollars collectively each year, on behalf of designated entities, such as the North Korean Ministry of Defense and others directly involved in the DPRK’s weapons programs.
The U.S. Department of State has offered potential rewards for up to $5 million in support of international efforts to disrupt the DPRK’s illicit financial activities, including for cybercrimes, money laundering, and sanctions evasion.
The details in the above-described court documents are merely allegations. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.
WASHINGTON — Achieving a result otherwise unavailable through litigation, earlier today the Justice Department advised the court it had reached a settlement with HPE and Juniper that allows their merger to continue. This novel approach by the Justice Department reflects a commitment to solving unique challenges in mergers. Under the leadership of Attorney General Pam Bondi the laws of this country will be zealously enforced.
“Thank you to the hardworking men and women of the Antitrust Division for their work on this case.” — Gail Slater, Assistant Attorney General for the Antitrust Divison
“This marks another key legal victory from the Department of Justice’s Antitrust division. Our attorneys will continue fighting and winning to defend the American people and consumers.” — Department of Justice Chief of Staff Chad Mizelle
The settlement requires HPE to divest its Instant On business and mandates that the merged firm license critical Juniper software to independent competitors. HPE must divest its global “Instant On” campus and branch WLAN business, including all assets, intellectual property, R&D personnel, and customer relationships, to a DOJ-approved buyer within 180 days. The agreement also ensures that key software assets will be available to rivals looking to compete with the merged company. The parties must hold an auction to license Juniper’s AI Ops for Mist source code—an important component in modern WLAN systems. The license will be perpetual, non-exclusive, and include optional transitional support and personnel transfers to facilitate competition.
Orlando, Florida – United States Attorney Gregory W. Kehoe announces the unsealing of an indictment charging Salvatore Russotto (58, Orlando) with threatening to injure and kill the victim, the United States Attorney for the District of New Jersey, Alina Habba, and with retaliating against a federal law enforcement officer by threat. If convicted on both counts, Russotto faces a maximum penalty of 10 years in federal prison.
According to the indictment, on May 19, 2025, Russotto made a threat to injure and kill the victim in a series of postings from an online account belonging to him. Specifically, Russotto stated, among other things, “A slow painful death for HABBA,” “Eliminate HABBA. 86 Traitor. Death penalty for all traitors,” “I HOPE YOU DIE A PAINFUL DEATH,” a true threat of violence.
An indictment is merely a formal charge that a defendant has committed one or more violations of federal criminal law, and every defendant is presumed innocent unless, and until, proven guilty.
This case was investigated by the Federal Bureau of Investigation – Newark, Jersey and Tampa, Florida Field Offices – and the United States Marshals Service. It will be prosecuted by Assistant United States Attorney Kara Wick.
WASHINGTON — Achieving a result otherwise unavailable through litigation, earlier today the Justice Department advised the court it had reached a settlement with HPE and Juniper that allows their merger to continue. This novel approach by the Justice Department reflects a commitment to solving unique challenges in mergers. Under the leadership of Attorney General Pam Bondi the laws of this country will be zealously enforced.
“Thank you to the hardworking men and women of the Antitrust Division for their work on this case.” — Gail Slater, Assistant Attorney General for the Antitrust Divison
“This marks another key legal victory from the Department of Justice’s Antitrust division. Our attorneys will continue fighting and winning to defend the American people and consumers.” — Department of Justice Chief of Staff Chad Mizelle
The settlement requires HPE to divest its Instant On business and mandates that the merged firm license critical Juniper software to independent competitors. HPE must divest its global “Instant On” campus and branch WLAN business, including all assets, intellectual property, R&D personnel, and customer relationships, to a DOJ-approved buyer within 180 days. The agreement also ensures that key software assets will be available to rivals looking to compete with the merged company. The parties must hold an auction to license Juniper’s AI Ops for Mist source code—an important component in modern WLAN systems. The license will be perpetual, non-exclusive, and include optional transitional support and personnel transfers to facilitate competition.
Law Enforcement Actions Across 16 States Result in Charges, Arrest, and Seizures of 29 Financial Accounts, 21 Fraudulent Websites, and Approximately 200 Computers
The Justice Department announced today coordinated actions against the Democratic People’s Republic of North Korea (DPRK) government’s schemes to fund its regime through remote information technology (IT) work for U.S. companies. These actions include two indictments, an arrest, searches of 29 known or suspected “laptop farms” across 16 states, and the seizure of 29 financial accounts used to launder illicit funds and 21 fraudulent websites.
According to court documents, the schemes involve North Korean individuals fraudulently obtaining employment with U.S. companies as remote IT workers, using stolen and fake identities. The North Korean actors were assisted by individuals in the United States, China, United Arab Emirates, and Taiwan, and successfully obtained employment with more than 100 U.S. companies.
As alleged in court documents, certain U.S.-based individuals enabled one of the schemes by creating front companies and fraudulent websites to promote the bona fides of the remote IT workers, and hosted laptop farms where the remote North Korean IT workers could remote access into U.S. victim company-provided laptop computers. Once employed, the North Korean IT workers received regular salary payments, and they gained access to, and in some cases stole, sensitive employer information such as export controlled U.S. military technology and virtual currency. In another scheme, North Korean IT workers used false or fraudulently obtained identities to gain employment with an Atlanta, Georgia-based blockchain research and development company and stole virtual currency worth approximately over $900,000.
“These schemes target and steal from U.S. companies and are designed to evade sanctions and fund the North Korean regime’s illicit programs, including its weapons programs,” said Assistant Attorney General John A. Eisenberg of the Department’s National Security Division. “The Justice Department, along with our law enforcement, private sector, and international partners, will persistently pursue and dismantle these cyber-enabled revenue generation networks.”
“North Korean IT workers defraud American companies and steal the identities of private citizens, all in support of the North Korean regime,” said Assistant Director Brett Leatherman of FBI’s Cyber Division. “That is why the FBI and our partners continue to work together to disrupt infrastructure, seize revenue, indict overseas IT workers, and arrest their enablers in the United States. Let the actions announced today serve as a warning: if you host laptop farms for the benefit of North Korean actors, law enforcement will be waiting for you.”
“North Korea remains intent on funding its weapons programs by defrauding U.S. companies and exploiting American victims of identity theft, but the FBI is equally intent on disrupting this massive campaign and bringing its perpetrators to justice,” said Assistant Director Roman Rozhavsky of the FBI Counterintelligence Division. “North Korean IT workers posing as U.S. citizens fraudulently obtained employment with American businesses so they could funnel hundreds of millions of dollars to North Korea’s authoritarian regime. The FBI will do everything in our power to defend the homeland and protect Americans from being victimized by the North Korean government, and we ask all U.S. companies that employ remote workers to remain vigilant to this sophisticated threat.”
Zhenxing Wang, et al. Indictment, Seizure Warrants, and Arrest – District of Massachusetts
Today, the United States Attorney’s Office for the District of Massachusetts and the National Security Division announced the arrest of U.S. national Zhenxing “Danny” Wang of New Jersey pursuant to a five-count indictment. The indictment describes a multi-year fraud scheme by Wang and his co-conspirators to obtain remote IT work with U.S. companies that generated more than $5 million in revenue. The indictment also charges Chinese nationals Jing Bin Huang (靖斌 黄), Baoyu Zhou (周宝玉), Tong Yuze (佟雨泽), Yongzhe Xu (徐勇哲 andيونجزهي أكسو), Ziyou Yuan (زيو) and Zhenbang Zhou (周震邦), and Taiwanese nationals Mengting Liu (劉 孟婷) and Enchia Liu (刘恩) for their roles in the scheme.
“The threat posed by DPRK operatives is both real and immediate. Thousands of North Korean cyber operatives have been trained and deployed by the regime to blend into the global digital workforce and systematically target U.S. companies,” said U.S. Attorney Leah B. Foley for the District of Massachusetts. “We will continue to work relentlessly to protect U.S. businesses and ensure they are not inadvertently fueling the DPRK’s unlawful and dangerous ambitions.”
According to the indictment, from approximately 2021 until October 2024, the defendants and other co-conspirators compromised the identities of more than 80 U.S. persons to obtain remote jobs at more than 100 U.S. companies, including many Fortune 500 companies, and caused U.S. victim companies to incur legal fees, computer network remediation costs, and other damages and losses of at least $3 million. Overseas IT workers were assisted by Kejia Wang, Zhenxing Wang, and at least four other identified U.S. facilitators. Kejia Wang, for example, communicated with overseas co-conspirators and IT workers, and traveled to Shenyang and Dandong, China, including in 2023, to meet with them about the scheme. To deceive U.S. companies into believing the IT workers were located in the United States, Kejia Wang, Zhenxing Wang, and the other U.S. facilitators received and/or hosted laptops belonging to U.S. companies at their residences, and enabled overseas IT workers to access the laptops remotely by, among other things, connecting the laptops to hardware devices designed to allow for remote access (referred to as keyboard-video-mouse or “KVM” switches).
Kejia Wang and Zhenxing Wang also created shell companies with corresponding websites and financial accounts, including Hopana Tech LLC, Tony WKJ LLC, and Independent Lab LLC, to make it appear as though the overseas IT workers were affiliated with legitimate U.S. businesses. Kejia Wang and Zhenxing Wang established these and other financial accounts to receive money from victimized U.S. companies, much of which was subsequently transferred to overseas co‑conspirators. In exchange for their services, Kejia Wang, Zhenxing Wang, and the four other U.S. facilitators received a total of at least $696,000 from the IT workers.
IT workers employed under this scheme also gained access to sensitive employer data and source code, including International Traffic in Arms Regulations (ITAR) data from a California-based defense contractor that develops artificial intelligence-powered equipment and technologies. Specifically, between on or about Jan. 19, 2024, and on or about April 2, 2024, an overseas co-conspirator remotely accessed without authorization the company’s laptop and computer files containing technical data and other information. The stolen data included information marked as being controlled under the ITAR.
Simultaneously with today’s announcement, the FBI and Defense Criminal Investigative Service (DCIS) seized 17 web domains used in furtherance of the charged scheme and further seized 29 financial accounts, holding tens of thousands of dollars in funds, used to launder revenue for the North Korean regime through the remote IT work scheme.
Previously, in October 2024, as part of this investigation, federal law enforcement executed searches at eight locations across three states that resulted in the recovery of more than 70 laptops and remote access devices, such as KVMs. Simultaneously with that action, the FBI seized four web domains associated with Kejia Wang’s and Zhenxing Wang’s shell companies used to facilitate North Korean IT work.
The FBI Las Vegas Field Office, DCIS San Diego Resident Agency, and Homeland Security Investigations San Diego Field Office are investigating the case.
Assistant U.S. Attorney Jason Casey for the District of Massachusetts and Trial Attorney Gregory J. Nicosia, Jr. of the National Security Division’s National Security Cyber Section are prosecuting the case, with significant assistance from Legal Assistants Daniel Boucher and Margaret Coppes. Valuable assistance was also provided by Mark A. Murphy of the National Security Division’s Counterintelligence and Export Control Section and the U.S. Attorneys’ Offices for the District of New Jersey, Eastern District of New York, and Southern District of California.
Kim Kwang Jin et al. Indictment – Northern District of Georgia
Today, the Northern District of Georgia unsealed a five-count wire fraud and money laundering indictment charging four North Korean nationals, Kim Kwang Jin (김관진), Kang Tae Bok (강태복), Jong Pong Ju (정봉주) and Chang Nam Il (창남일), with a scheme to steal virtual currency from two companies, valued at over $900,000 at the time of the thefts, and to launder proceeds of those thefts. The defendants remain at large and wanted by the FBI.
“The defendants used fake and stolen personal identities to conceal their North Korean nationality, pose as remote IT workers, and exploit their victims’ trust to steal hundreds of thousands of dollars,” said U.S. Attorney Theodore S. Hertzberg for the Northern District of Georgia. “This indictment highlights the unique threat North Korea poses to companies that hire remote IT workers and underscores our resolve to prosecute any actor, in the United States or abroad, who steals from Georgia businesses.”
According to the indictment, the defendants traveled to the United Arab Emirates on North Korean travel documents and worked as a co-located team. In approximately December 2020 and May 2021, respectively, Kim Kwang Jin (using victim P.S.’s stolen identity) and Jong Pong Ju (using the alias “Bryan Cho”) were hired by a blockchain research and development company headquartered in Atlanta, Georgia, and a virtual token company based in Serbia. Both defendants concealed their North Korean identities from their employers by providing false identification documents containing a mix of stolen and fraudulent identity information. Neither company would have hired Kim Kwang Jin and Jong Pong Ju had they known that they were North Korean citizens. Later, on a recommendation from Jong Pong Ju, the Serbian company hired “Peter Xiao,” who in fact was Chang Nam Il.
After gaining their employers’ trust, Kim Kwang Jin and Jong Pong Ju were assigned projects that provided them access to their employers’ virtual currency assets. In February 2022, Jong Pong Ju used that access to steal virtual currency worth approximately $175,000 at the time of the theft, sending it to a virtual currency address he controlled. In March 2022, Kim Kwang Jin stole virtual currency worth approximately $740,000 at the time of theft by modifying the source code of two of his employer’s smart contracts, then sending it to a virtual currency address he controlled.
To launder the funds after the thefts, Kim Kwang Jin and Jong Pong Ju “mixed” the stolen funds using the virtual currency mixer Tornado Cash and then transferred the funds to virtual currency exchange accounts controlled by defendants Kang Tae Bok and Chang Nam Il but held in the name of aliases. These accounts were opened using fraudulent Malaysian identification documents.
The FBI Atlanta Field Office is investigating the case.
Assistant U.S. Attorneys Samir Kaushal and Alex Sistla for the Northern District of Georgia and Trial Attorney Jacques Singer-Emery of the National Security Division’s National Security Cyber Section are prosecuting the case.
21 Searches of Known or Suspected U.S.-based Laptop Farms – Multi-District
Between June 10 and June 17, 2025, the FBI executed searches of 21 premises across 14 states hosting known and suspected laptop farms. These actions, coordinated by the FBI Denver Field Office, related to investigations of North Korean remote IT worker schemes being conducted by the U.S. Attorneys’ Offices of the District of Colorado, Eastern District of Missouri, and Northern District of Texas. In total, the FBI seized approximately 137 laptops.
Valuable assistance was provided by the U.S. Attorney’s Offices for the District of Connecticut, the Eastern District of Michigan, the Eastern District of Wisconsin, the Middle District of Florida, the Northern District of Georgia, the Northern District of Illinois, the Northern District of Indiana, the District of Oregon, the Southern District of Florida, the Southern District of Ohio, the Western District of New York, and the Western District of Pennsylvania.
***
The Department’s actions to combat these schemes are the latest in a series of law enforcement actions under a joint National Security Division and FBI Cyber and Counterintelligence Divisions effort, the DPRK RevGen: Domestic Enabler Initiative. This effort prioritizes targeting and disrupting the DPRK’s illicit revenue generation schemes and its U.S.-based enablers. The Department previously announced other actions pursuant to the initiative, including in January 2025 and prior, as well as the filing of a civil forfeiture complaint in early June 2025 for over $7.74 million tied to an illegal employment scheme.
As the FBI has described in Public Service Announcements published in May 2024 and January 2025, North Korean remote IT workers posing as legitimate remote IT workers have committed data extortion and exfiltrated the proprietary and sensitive data from U.S. companies. DPRK IT worker schemes typically involve the use of stolen identities, alias emails, social media, online cross-border payment platforms, and online job site accounts, as well as false websites, proxy computers, and witting and unwitting third parties located in the U.S. and elsewhere.
Other public advisories about the threats, red flag indicators, and potential mitigation measures for these schemes include a May 2022 advisory released by the FBI, Department of the Treasury, and Department of State; a July 2023 advisory from the Office of the Director of National Intelligence; and guidance issued in October 2023 by the United States and the Republic of Korea (South Korea). As described the May 2022 advisory, North Korean IT workers have been known individually to earn up to $300,000 annually, generating hundreds of millions of dollars collectively each year, on behalf of designated entities, such as the North Korean Ministry of Defense and others directly involved in the DPRK’s weapons programs.
The U.S. Department of State has offered potential rewards for up to $5 million in support of international efforts to disrupt the DPRK’s illicit financial activities, including for cybercrimes, money laundering, and sanctions evasion.
The details in the above-described court documents are merely allegations. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.
The Reserve Bank of India (RBI) has appointed Shri Kesavan Ramachandran as Executive Director (ED) with effect from July 01, 2025.
Prior to being promoted as ED, Shri Kesavan Ramachandran was serving as Principal Chief General Manager in Risk Monitoring Department.
Shri Kesavan Ramachandran has experience of over three decades in areas relating to currency management, Banking and Non-Banking supervision, training and administration. He also served as Principal of the Reserve Bank Staff College during his career. He served as, RBI’s nominee on the Board of Canara Bank for over five years and on the Auditing and Assurance Standards Board of ICAI for two years.
As Executive Director, Shri Kesavan Ramachandran will look after Department of Regulation (Prudential Regulation Division).
Shri Kesavan Ramachandran is a post-graduate with an MBA in Banking and Finance and holds a diploma in International Financial Reporting from ACCA, UK. He is also a Certified Associate of the IIBF.
Houston, TX, July 01, 2025 (GLOBE NEWSWIRE) — Access guaranteed installment loans for bad credit through Honest Loans—no credit check, flexible terms, and fast approvals from direct lenders in 2025. Get the emergency funds you need, securely and stress-free.
Honest Loans has introduced a groundbreaking solution for individuals facing financial stress by launching guaranteed installment loans for bad credit—a core offering in 2025. This initiative aims to connect borrowers with direct lenders who offer flexible, fast, and secure installment loans, even for those with poor or limited credit histories.
Meeting the Rising Demand for Guaranteed Installment Loans in 2025
As more Americans face unexpected financial burdens—including inflation, medical expenses, and urgent bills—the need for accessible and fast financial solutions has grown significantly. In response, installment loans for bad credit have emerged as a preferred option, offering structured repayment terms and no hard credit checks.
Unlike traditional payday loans, installment loans provide longer repayment periods, fixed interest rates, and manageable payments, making them more sustainable for borrowers. Honest Loans answers this demand by streamlining access to licensed direct lenders offering these loans with guaranteed approval.
Why Borrowers Are Choosing Honest Loans in 2025
Honest Loans’ installment loan platform stands out by offering a seamless and transparent digital experience. Borrowers gain access to a broad network of trusted lenders who specialize in bad credit financing, all without needing to step into a storefront or complete burdensome paperwork.
Key Benefits of Honest Loans’ Installment Loans for Bad Credit:
Guaranteed Approval: Even applicants with poor credit are matched with lenders offering high approval rates.
No Hard Credit Check: Applications avoid traditional credit pulls that can negatively impact credit scores.
Flexible Repayment Terms: Borrowers choose from various loan sizes and durations based on their needs.
Same-Day Processing: In many cases, funds are deposited as soon as the same business day.
Licensed Direct Lenders Only: All partners are verified, ensuring a safe and compliant borrowing experience.
Honest Loans simplifies the process of getting installment loans by leveraging technology to reduce friction and boost approval speed. Here’s how it works:
Online Application: Applicants complete a secure digital form with basic personal and income details.
Instant Matching: Honest Loans uses advanced algorithms to pair users with suitable direct lenders instantly.
Loan Check & Offer: Borrowers review terms like interest rates, repayment schedules, and loan amounts before committing.
Electronic Transfer: Once accepted, funds are usually deposited directly into the borrower’s bank account within hours.
2025: The Shift Toward Digital Installment Lending
The landscape of short-term lending is evolving. Traditional payday loans—often criticized for high fees and short repayment windows—are being replaced by installment options that are more borrower-friendly. Honest Loans is at the forefront of this shift, offering a mobile-first, paperless experience.
Borrowers can enjoy faster processing, often receiving decisions within minutes. They benefit from transparent loan terms—APR, repayment schedules, and fees are clearly disclosed upfront. With access to a large network of lenders, applicants can compare multiple offers to find the one that fits their situation. And most importantly, the entire process is available online—no need for in-person visits.
Technology & Privacy First
Honest Loans uses secure servers and end-to-end encryption to protect personal and financial data. All partners operate under strict compliance guidelines, ensuring secure sharing and responsible lending practices.
Eligibility Requirements
To qualify for an installment loan with Honest Loans, applicants must meet the following criteria:
Be at least 18 years old
Have a valid checking or savings account
Provide proof of income
Be a U.S. resident
These minimal requirements help expand access to those traditionally underserved by the financial system.
Final Thoughts
Honest Loansis reshaping emergency lending in 2025 by making installment loans for bad credit accessible, transparent, and safe. Whether you’re facing an urgent expense or simply want a smarter borrowing option, Honest Loans offers a proven digital path to relief.
With a strong lender network, guaranteed approval, and fast online processing, borrowers can rely on Honest Loans to deliver emergency cash with long-term repayment options—all without the stress of credit denials or surprise fees.
FAQs About Installment Loans for Bad Credit
What is the easiest type of loan to get approved for with bad credit? The easiest loans to get approved for are installment loans or no credit check personal loans from direct lenders. These loans typically feature quick application processes and high approval rates, especially when accessed through platforms like Honest Loans.
How can I borrow $500 immediately with bad credit? To access $500 fast, consider applying for a guaranteed installment loan through Honest Loans. With no hard credit check and same-day approvals, funds may be deposited into your account within hours—making it a reliable option for urgent needs.
Is it possible to get $1000 today without good credit? Yes. Honest Loans connects borrowers to a wide network of licensed lenders offering bad credit installment loans. If eligible, you can receive up to $1000 or more via electronic transfer, often on the same business day.
What is a hardship loan and who qualifies? A hardship loan is designed for individuals facing financial strain from unexpected events like job loss, medical bills, or emergencies. These loans often offer more flexible repayment terms. Honest Loans can help match you with lenders offering installment loans that fit your situation, even with bad credit.
Contact Information
Company: Honest Loans Email: support@onlineloannetwork.com Phone: 888-718-9134 Address: Springates Building, Lower Government Road, Charlestown, Saint Kitts and Nevis
Disclaimer and Affiliate Disclosure
This content is intended for informational and commercial purposes only and should not be construed as financial, legal, or professional advice. It does not constitute an endorsement of any specific loan provider.
While every effort has been made to ensure the accuracy and relevance of the information presented, no guarantees are made regarding its completeness, accuracy, or timeliness. Readers are advised to conduct independent research and consult qualified professionals—such as licensed financial advisors or legal experts—prior to making any financial decisions.
Please note the following:
Loan products and services mentioned may not be suitable for everyone.
Terms, conditions, and eligibility criteria vary by lender and location.
Approval is not guaranteed and may depend on various factors, including income, creditworthiness, residency status, identity verification, and compliance with applicable laws.
This article may contain affiliate links. If you press on a link and apply for or purchase a product or service, the publisher and its partners may earn a commission at no additional cost to you. This compensation does not affect the content’s objectivity or the impartiality of any recommendations. All opinions are general in nature and do not reflect the views of any specific lender unless clearly stated.
By engaging with this content, you acknowledge that the publisher, its authors, affiliates, and third-party partners are not liable for any errors, omissions, outdated information, or financial outcomes resulting from use of the material. This includes—but is not limited to—loan denials, disputes, or issues arising from contractual agreements with lenders.
References to companies such as “Honest Loans” are for informational comparison only and do not imply any formal endorsement, partnership, or legal relationship. For questions about specific loan offerings, please contact the respective lender directly using official contact details.
All trademarks, service marks, and brand names mentioned remain the property of their respective owners.
Houston, TX, July 01, 2025 (GLOBE NEWSWIRE) — Access guaranteed installment loans for bad credit through Honest Loans—no credit check, flexible terms, and fast approvals from direct lenders in 2025. Get the emergency funds you need, securely and stress-free.
Honest Loans has introduced a groundbreaking solution for individuals facing financial stress by launching guaranteed installment loans for bad credit—a core offering in 2025. This initiative aims to connect borrowers with direct lenders who offer flexible, fast, and secure installment loans, even for those with poor or limited credit histories.
Meeting the Rising Demand for Guaranteed Installment Loans in 2025
As more Americans face unexpected financial burdens—including inflation, medical expenses, and urgent bills—the need for accessible and fast financial solutions has grown significantly. In response, installment loans for bad credit have emerged as a preferred option, offering structured repayment terms and no hard credit checks.
Unlike traditional payday loans, installment loans provide longer repayment periods, fixed interest rates, and manageable payments, making them more sustainable for borrowers. Honest Loans answers this demand by streamlining access to licensed direct lenders offering these loans with guaranteed approval.
Why Borrowers Are Choosing Honest Loans in 2025
Honest Loans’ installment loan platform stands out by offering a seamless and transparent digital experience. Borrowers gain access to a broad network of trusted lenders who specialize in bad credit financing, all without needing to step into a storefront or complete burdensome paperwork.
Key Benefits of Honest Loans’ Installment Loans for Bad Credit:
Guaranteed Approval: Even applicants with poor credit are matched with lenders offering high approval rates.
No Hard Credit Check: Applications avoid traditional credit pulls that can negatively impact credit scores.
Flexible Repayment Terms: Borrowers choose from various loan sizes and durations based on their needs.
Same-Day Processing: In many cases, funds are deposited as soon as the same business day.
Licensed Direct Lenders Only: All partners are verified, ensuring a safe and compliant borrowing experience.
Honest Loans simplifies the process of getting installment loans by leveraging technology to reduce friction and boost approval speed. Here’s how it works:
Online Application: Applicants complete a secure digital form with basic personal and income details.
Instant Matching: Honest Loans uses advanced algorithms to pair users with suitable direct lenders instantly.
Loan Check & Offer: Borrowers review terms like interest rates, repayment schedules, and loan amounts before committing.
Electronic Transfer: Once accepted, funds are usually deposited directly into the borrower’s bank account within hours.
2025: The Shift Toward Digital Installment Lending
The landscape of short-term lending is evolving. Traditional payday loans—often criticized for high fees and short repayment windows—are being replaced by installment options that are more borrower-friendly. Honest Loans is at the forefront of this shift, offering a mobile-first, paperless experience.
Borrowers can enjoy faster processing, often receiving decisions within minutes. They benefit from transparent loan terms—APR, repayment schedules, and fees are clearly disclosed upfront. With access to a large network of lenders, applicants can compare multiple offers to find the one that fits their situation. And most importantly, the entire process is available online—no need for in-person visits.
Technology & Privacy First
Honest Loans uses secure servers and end-to-end encryption to protect personal and financial data. All partners operate under strict compliance guidelines, ensuring secure sharing and responsible lending practices.
Eligibility Requirements
To qualify for an installment loan with Honest Loans, applicants must meet the following criteria:
Be at least 18 years old
Have a valid checking or savings account
Provide proof of income
Be a U.S. resident
These minimal requirements help expand access to those traditionally underserved by the financial system.
Final Thoughts
Honest Loansis reshaping emergency lending in 2025 by making installment loans for bad credit accessible, transparent, and safe. Whether you’re facing an urgent expense or simply want a smarter borrowing option, Honest Loans offers a proven digital path to relief.
With a strong lender network, guaranteed approval, and fast online processing, borrowers can rely on Honest Loans to deliver emergency cash with long-term repayment options—all without the stress of credit denials or surprise fees.
FAQs About Installment Loans for Bad Credit
What is the easiest type of loan to get approved for with bad credit? The easiest loans to get approved for are installment loans or no credit check personal loans from direct lenders. These loans typically feature quick application processes and high approval rates, especially when accessed through platforms like Honest Loans.
How can I borrow $500 immediately with bad credit? To access $500 fast, consider applying for a guaranteed installment loan through Honest Loans. With no hard credit check and same-day approvals, funds may be deposited into your account within hours—making it a reliable option for urgent needs.
Is it possible to get $1000 today without good credit? Yes. Honest Loans connects borrowers to a wide network of licensed lenders offering bad credit installment loans. If eligible, you can receive up to $1000 or more via electronic transfer, often on the same business day.
What is a hardship loan and who qualifies? A hardship loan is designed for individuals facing financial strain from unexpected events like job loss, medical bills, or emergencies. These loans often offer more flexible repayment terms. Honest Loans can help match you with lenders offering installment loans that fit your situation, even with bad credit.
Contact Information
Company: Honest Loans Email: support@onlineloannetwork.com Phone: 888-718-9134 Address: Springates Building, Lower Government Road, Charlestown, Saint Kitts and Nevis
Disclaimer and Affiliate Disclosure
This content is intended for informational and commercial purposes only and should not be construed as financial, legal, or professional advice. It does not constitute an endorsement of any specific loan provider.
While every effort has been made to ensure the accuracy and relevance of the information presented, no guarantees are made regarding its completeness, accuracy, or timeliness. Readers are advised to conduct independent research and consult qualified professionals—such as licensed financial advisors or legal experts—prior to making any financial decisions.
Please note the following:
Loan products and services mentioned may not be suitable for everyone.
Terms, conditions, and eligibility criteria vary by lender and location.
Approval is not guaranteed and may depend on various factors, including income, creditworthiness, residency status, identity verification, and compliance with applicable laws.
This article may contain affiliate links. If you press on a link and apply for or purchase a product or service, the publisher and its partners may earn a commission at no additional cost to you. This compensation does not affect the content’s objectivity or the impartiality of any recommendations. All opinions are general in nature and do not reflect the views of any specific lender unless clearly stated.
By engaging with this content, you acknowledge that the publisher, its authors, affiliates, and third-party partners are not liable for any errors, omissions, outdated information, or financial outcomes resulting from use of the material. This includes—but is not limited to—loan denials, disputes, or issues arising from contractual agreements with lenders.
References to companies such as “Honest Loans” are for informational comparison only and do not imply any formal endorsement, partnership, or legal relationship. For questions about specific loan offerings, please contact the respective lender directly using official contact details.
All trademarks, service marks, and brand names mentioned remain the property of their respective owners.
Bernin (Grenoble), France, on July 1, 2025 – Soitec (Euronext Paris) reminds that the Company’s shareholders are invited to attend the Annual General Meeting to be held on Tuesday July 22, 2025 at 9:30 a.m. (Paris time), in the Auditorium of the VERSO conference Center located at 52 rue de la Victoire, 75009 Paris, France.
The preliminary meeting notice serving as convening notice as provided for in Article R. 225-73 of the French Commercial Code, including the agenda and the draft resolutions to be submitted to the shareholders’ vote during this Annual General Meeting as well as the information on how to attend and vote at the Annual General Meeting, has been published in the French legal gazette (Bulletin des Annonces Légales Obligatoires(BALO)) of June 13, 2025, bulletin No 71.
The convening notice for this Annual General Meeting will be published in the French legal gazette “Les Affiches de Grenoble et du Dauphiné” on July 4, 2025.
All the documents related to this Annual General Meeting are available on the Company’s website (www.soitec.com), in the section Investors/Shareholders & Analysts/Shareholders’ General Meetings/ 2025 Annual General Meeting, in accordance with laws and regulations in force.
In accordance with article R. 225-88 of the French Commercial Code, shareholders may also obtain the documents provided for in articles R. 225-81 and R. 225-83 of the French Commercial Code, on written request made no later than five days before the date of the General Meeting, i.e. no later than Thursday July 17, 2025. This request shall be sent to the Company’s registered office by post, to the attention of the General Secretary, “AG 22 juillet 2025” Parc Technologique des Fontaines – Chemin des Franques – 38190 Bernin – France, or by e-mail to the following address: shareholders-gm@soitec.com. Requests from bearer shareholders must be accompanied by a shareholding certificate delivered by their financial intermediary mentioned in Article L. 211-3 of the French Monetary and Financial Code.
Shareholders are invited to consult regularly the section dedicated to the 2025 Annual General Meeting on the Company’s website.
This General Meeting will be broadcast live on Soitec’s website and will also be available for replay.
# # #
Agenda
First-quarter 2025-2026 revenue: July 22, 2025, after market close.
# # #
About Soitec
Soitec (Euronext – Tech 40 Paris), a world leader in innovative semiconductor materials, has for more than 30 years developed cutting-edge products that combine technological performance and energy efficiency. From its global headquarters in France, Soitec is expanding internationally with its unique solutions. The company occupies a key position in the semiconductor value chain, serving three strategic markets: mobile communications, automotive and industry, and smart devices. Soitec draws on the talent and diversity of its 2,300 employees, of 50 different nationalities, across its sites in Europe, the United States and Asia. More than 4,100 patents have been registered by Soitec.
Soitec, SmartSiC™ and Smart Cut™ are registered trademarks of Soitec.
WELLESLEY, Mass., July 01, 2025 (GLOBE NEWSWIRE) — Cloze, the AI-powered real estate platform for sphere selling, today announced its inclusion in eXp Realty’s new CRM of Choice program. Beginning today, eXp Realty agents across the U.S., Canada, and Puerto Rico will be able to select Cloze as their preferred CRM — at no additional cost — as part of their monthly tech package.
According to the National Association of Realtors (NAR), the typical REALTOR® earned 41% of their business through referrals and repeat clients, with high-performing agents often seeing a much higher percentage. Yet, 88% of the people an agent interacts with never make it into their CRM. Cloze is the only CRM that tracks calls and texts automatically from an agent’s own phone number, enabling the platform to capture an agent’s entire sphere, not just the 12% that are entered into a traditional CRM. With every communication captured in one place, Cloze’s AI keeps contact info fresh and surfaces relationships—so that agents can capitalize on their entire sphere of influence.
Designed for agents and teams whose growth is powered by real relationships, Cloze offers agents and team leaders tools that deepen client connections, maximize productivity, and drive repeat and referral business. Cloze uses AI to surface the right outreach and follow-ups—so agents get more from their sphere with less effort—thanks to deep integrations with Canva, SkySlope, eXp Access, and more.
“CRM of Choice represents a new chapter in how we support our agents’ growth at eXp,” said Kendall Bonner, Vice President, Industry Relations and Strategic Partnerships, eXp Realty. “Cloze’s use of AI to personalize automation and recommendations for relationship-driven selling gives agents a smarter way to turn everyday connections into lasting business.”
A platform designed around how agents work
At the heart of Cloze is the Cloze Intelligence Engine, which uses AI to automatically build and maintain each agent’s database by capturing real-world activity — emails, calls, texts, and meetings — without requiring manual data entry. The built-in personal assistant then nudges agents to follow up, surfaces action items from conversations, and helps prioritize the relationships that are most likely to drive future deals.
Cloze is uniquely designed to help agents make the most of their sphere of influence:
Stay organized, automatically—Cloze automatically logs calls, texts, emails, and meetings, pulling in full history, even from the past, to discover warm opportunities
Focus on what drives Gross Commission Income (GCI)—Cloze AI reminds agents to reconnect and follow-up, surfacing key action items, deadlines, and milestones, including reaching out to past contacts, so agents hit their goals
Simplify and scale personal outreach—With one platform for both personal and automated outreach, agents can seamlessly move between 1:1 messages, automated marketing, and mail-merged mass outreach without switching tools
Stay productive while on the go—Cloze’s best-in-class mobile experience through both iOS and Android apps offer full functionality so that agents can run every part of their business from anywhere
Easy, polished marketing—powered by AI and Canva
Cloze’s Canva integration provides a one-click experience to create polished, eXp-branded materials — flyers, postcards, videos, social posts, and more — pre-filled with listing details. Agents can customize and send materials directly from within Cloze, ensuring brand consistency without the design hassle.
In addition, Cloze’s real estate-savvy generative AI can ghostwrite listing descriptions, newsletters, agent bios, one-off emails, and multi-step campaigns — all from a single platform.
Agents and teams who sell to clients that speak different languages can use Cloze’s multi-lingual marketing, which can automatically detect the language of every client to ensure everyone receives marketing materials in their language of choice, automatically.
Embedded into the eXp ecosystem
In addition to Canva, Cloze connects with other tools agents already use, such as eXp-supported systems like SkySlope, Dotloop, Slack, DialSafe, and eXp Access, as well as over 100 additional applications, so that agents can be more productive, all while seamlessly capturing all interactions in one place without manual entry.
Built to support every agent—solo or on a team
Cloze is designed to adapt to how agents actually work—whether they’re growing a solo business or working as part of a team. Shared communication history, lead routing, and visibility keep teams coordinated and on track, while personal contacts and conversations stay private by default. Agents get the structure they need without giving up control, and team leaders gain the visibility they need to support performance and accountability.
“Cloze was built from the ground up to support sphere-based selling — and it’s why agents who use Cloze consistently outperform,” said Dan Foody, CEO and Co-Founder of Cloze. “Our new relationship with eXp Realty will bring these capabilities to even more agents across North America.”
About Cloze
Cloze is an AI-powered sales and marketing platform that helps real estate brokerages, agents, and teams strengthen relationships, automate outreach, and manage lead routing. Real estate leaders like Windermere, Baird & Warner, Brown Harris Stevens, and Sotheby’s International Realty use Cloze’s open platform to create a sales and marketing hub that future-proofs their tech stack. By integrating deeply with existing tools, Cloze makes it easy to add, change, or update those tools whenever needed. For more information on Cloze, visit cloze.com.
Media Relations Contact: Cloze, Inc. Alex Coté press@cloze.com
About eXp World Holdings, Inc.
eXp World Holdings, Inc. (Nasdaq: EXPI) (the “Company”) is the holding company for eXp Realty® and SUCCESS® Enterprises. eXp Realty is the largest independent real estate brokerage in the world, with nearly 81,000 agents across 27 countries. As a cloud-based, agent-centric brokerage, eXp Realty provides real estate agents industry-leading commission splits, revenue share, equity ownership opportunities, and a global network that empowers agents to build thriving businesses. For more information about eXp World Holdings, Inc., visit: expworldholdings.com.
SUCCESS® Enterprises, anchored by SUCCESS® magazine, has been a trusted name in personal and professional development since 1897. As part of the eXp ecosystem, it offers agents access to valuable resources to enhance their skills, grow their businesses, and achieve long-term success. For more information about SUCCESS, visit success.com.
Ageas announced today that all necessary regulatory approvals for the acquisition of Acromas Insurance Company Limited (AICL), Saga’s Underwriting Business, have been obtained and the transaction has been completed.
The completion of the acquisition of AICL represents the first milestone towards the establishment of a 20-year partnership with Saga Services Limited (SSL) for the distribution of personal lines Motor and Home insurance products to Saga’s customers, as communicated on 16 December 2024 (read the press release).
The acquisition and the distribution agreement with Saga, the UK specialist provider of products and services to people aged over 50, aligns perfectly with Ageas’s Elevate27 strategy, to capitalise on its robust Non-Life presence across Europe, while accelerating solutions targeted at an ageing population, a rapidly expanding customer segment where the Group and Ageas UK already have real strength and expertise. Furthermore, it presents Ageas with the opportunity to enhance its position as a leading personal lines insurer in the UK.
The overall consideration for the acquisition is approximately GBP 67 million – consistent with prior communications, and to be paid out between acquisition and the operational start date of the partnership. The overall Solvency II impact, including the Affinity Partnership, remains aligned with the previously communicated – 5%.
Ageas is a Belgian rooted listed international insurance Group with a heritage spanning of 200 years. It offers Retail and Business customers Life and Non-Life insurance products designed to suit their specific needs, today and tomorrow, and is also engaged in reinsurance activities. As one of Europe’s larger insurance companies, Ageas concentrates its activities in Europe and Asia, which together make up the major part of the global insurance market. It operates successful insurance businesses in Belgium, the UK, Portugal, Türkiye, China, Malaysia, India, Thailand, Vietnam, Laos, Cambodia, Singapore, and the Philippines through a combination of wholly owned subsidiaries and long-term partnerships with strong financial institutions and key distributors. Ageas ranks among the market leaders in the countries in which it operates. It represents a staff force of about 50,000 people and reported annual inflows of EUR 18.5 billion in 2024.
Ageas announced today that all necessary regulatory approvals for the acquisition of Acromas Insurance Company Limited (AICL), Saga’s Underwriting Business, have been obtained and the transaction has been completed.
The completion of the acquisition of AICL represents the first milestone towards the establishment of a 20-year partnership with Saga Services Limited (SSL) for the distribution of personal lines Motor and Home insurance products to Saga’s customers, as communicated on 16 December 2024 (read the press release).
The acquisition and the distribution agreement with Saga, the UK specialist provider of products and services to people aged over 50, aligns perfectly with Ageas’s Elevate27 strategy, to capitalise on its robust Non-Life presence across Europe, while accelerating solutions targeted at an ageing population, a rapidly expanding customer segment where the Group and Ageas UK already have real strength and expertise. Furthermore, it presents Ageas with the opportunity to enhance its position as a leading personal lines insurer in the UK.
The overall consideration for the acquisition is approximately GBP 67 million – consistent with prior communications, and to be paid out between acquisition and the operational start date of the partnership. The overall Solvency II impact, including the Affinity Partnership, remains aligned with the previously communicated – 5%.
Ageas is a Belgian rooted listed international insurance Group with a heritage spanning of 200 years. It offers Retail and Business customers Life and Non-Life insurance products designed to suit their specific needs, today and tomorrow, and is also engaged in reinsurance activities. As one of Europe’s larger insurance companies, Ageas concentrates its activities in Europe and Asia, which together make up the major part of the global insurance market. It operates successful insurance businesses in Belgium, the UK, Portugal, Türkiye, China, Malaysia, India, Thailand, Vietnam, Laos, Cambodia, Singapore, and the Philippines through a combination of wholly owned subsidiaries and long-term partnerships with strong financial institutions and key distributors. Ageas ranks among the market leaders in the countries in which it operates. It represents a staff force of about 50,000 people and reported annual inflows of EUR 18.5 billion in 2024.
Non-communicable diseases like stroke and heart disease have swapped spots with infectious diseases as top global killers. Improving health access – whether in the developed or emerging world — can save the lives of billions. CEO Bernd Montag explains how Siemens Healthineers is partnering with providers around the world to deliver technologies and help reduce the complexities that can stand in the way of efficient treatment. He’ll also share his own unique background – as a professional basketball player and later theoretical physicist – and how it shaped how he makes decisions and leads.
This interview was recorded January 2025 at the World Economic Forum Annual Meeting in Davos, Switzerland.
About this episode:
https://www.siemens-healthineers.com/
Related podcasts:
Bridging the gap in women’s health technology, policy and more:
Kearney:
https://tinyurl.com/3jmahwwj
Tackling these surprising blindspots can bridge gender gaps in health, opportunity and more: https://open.spotify.com/episode/0HfUaxq69cJBZfVgGctVMB?go=1&sp_cid=974f0d02895cc3e5dc6ee274371893a7&utm_source=embed_player_p&utm_medium=desktop&nd=1&dlsi=38d6c85af7df484e
The World Economic Forum is the International Organization for Public-Private Cooperation. The Forum engages the foremost political, business, cultural and other leaders of society to shape global, regional and industry agendas. We believe that progress happens by bringing together people from all walks of life who have the drive and the influence to make positive change.