Two U.S. Nationals Sentenced in $5M North Korea IT Worker Scheme
嗯,用户让我用中文帮他总结一篇文章,控制在100字以内,而且不需要用“文章内容总结”这样的开头。好的,我先看看这篇文章讲的是什么。 文章主要讲的是两名美国国民帮助朝鲜进行欺诈性的远程就业操作,导致他们被判刑。这涉及到“笔记本农场”计划,利用被盗的身份和美国基础设施,让朝鲜的海外 operatives 进入美国公司工作,从而获取敏感数据。他们还通过空壳公司转移资金,涉及金额超过500万美元。 我需要把这些关键点浓缩到100字以内。首先,两名美国男子帮助朝鲜通过欺诈手段进入美国公司工作。然后提到“笔记本农场”计划,利用被盗身份和空壳公司转移资金。最后说明涉及金额和危害数据安全。 可能的结构是:两名美国男子因协助朝鲜通过欺诈手段进入美国公司工作被判刑。他们利用“笔记本农场”计划和空壳公司转移资金,涉及金额超过500万美元,并危害数据安全。 检查一下字数是否在100字以内,并确保信息准确无误。 </think> 两名美国男子因协助朝鲜通过欺诈性远程就业操作进入美国公司工作被判刑。他们利用"笔记本农场"计划和空壳公司转移资金,涉及金额超500万美元,并危害数据安全。 2026-4-16 08:58:50 Author: thecyberexpress.com(查看原文) 阅读量:27 收藏

A major North Korea IT worker scheme has led to the sentencing of two U.S. nationals who helped facilitate fraudulent remote employment operations that generated millions of dollars for the Democratic People’s Republic of Korea (DPRK), according to the U.S. Department of Justice.

The case highlights how foreign actors exploited remote work systems, stolen identities, and U.S.-based infrastructure to infiltrate companies and access sensitive data.

Sentencing in North Korea IT Worker Scheme

Kejia Wang, 42, and Zhenxing Wang, 39, were sentenced for their roles in supporting the North Korea IT worker scheme, which placed overseas operatives into jobs at more than 100 U.S. companies.

Kejia Wang received a sentence of 108 months in prison, while Zhenxing Wang was sentenced to 92 months. Both had pleaded guilty to multiple charges, including conspiracy to commit wire fraud and money laundering. The court also ordered three years of supervised release and financial penalties, including forfeiture of $600,000.

Officials confirmed that the scheme generated more than $5 million in revenue for the DPRK, with at least $400,000 already recovered by authorities.

How the Laptop Farm Scheme Worked

At the center of the North Korea IT worker scheme were so-called “laptop farms” operated by the defendants in the United States. These setups were designed to make it appear that remote IT workers were physically located in the U.S.

report-ad-banner

Using stolen identities of more than 80 Americans, the group secured remote IT roles across multiple organizations, including several Fortune 500 companies. The defendants and their associates hosted company-issued laptops at U.S. locations, enabling overseas workers to access them remotely.

To facilitate this, they used hardware tools such as keyboard-video-mouse switches, allowing remote control of the devices from abroad. This setup helped bypass location checks and security controls commonly used by employers.

Use of Shell Companies and Financial Networks

The defendants also created shell companies, including Hopana Tech LLC and Independent Lab LLC, to support the North Korea IT worker scheme. These entities had no real operations but were used to present the overseas workers as legitimate U.S.-based employees.

Payments from victim companies were routed through financial accounts linked to these shell companies. Authorities said millions of dollars were funneled through these accounts, with a significant portion transferred to overseas co-conspirators.

In return, the facilitators in the U.S. received nearly $700,000 for their involvement.

Access to Sensitive Data and Security Risks

The North Korea IT worker scheme raised serious concerns about data security and national security. Investigators found that some of the fraudulently hired workers gained access to sensitive corporate information, including source code and restricted technical data.

In one instance, an overseas co-conspirator accessed data controlled under International Traffic in Arms Regulations from a U.S.-based defense contractor. The data included sensitive information related to advanced technologies.

Officials warned that such access could expose critical systems and intellectual property to foreign adversaries.

Ongoing Investigation and Wanted Suspects

Authorities continue to investigate the broader North Korea IT worker scheme, with several individuals still at large. The Federal Bureau of Investigation has identified multiple suspects believed to be involved in the operation.

The U.S. Department of State has announced a reward of up to $5 million for information that helps disrupt financial networks supporting such activities.

Law enforcement agencies have already taken action to dismantle parts of the operation. This includes the seizure of web domains and financial accounts linked to the scheme, along with the recovery of more than 70 laptops and remote access devices during coordinated searches.

The North Korea IT worker scheme is part of a broader effort by DPRK-linked actors to generate revenue through cyber-enabled operations. Authorities say these schemes often rely on stolen identities, fake online profiles, and third-party facilitators to gain access to company systems.

Public advisories from U.S. agencies have previously warned that such workers can earn significant sums, sometimes up to $300,000 annually, contributing to large-scale funding operations tied to North Korea’s strategic programs.


文章来源: https://thecyberexpress.com/north-korea-it-worker-scheme-two-sentenced/
如有侵权请联系:admin#unsafe.sh