Two U.S. Nationals Sentenced for Running Laptop Farm for DPRK Remote Workers
Cybersecurity NewsArchived Apr 16, 2026✓ Full text saved
Two American nationals have been sentenced to federal prison for operating a sophisticated “laptop farm” scheme. The operation successfully infiltrated over 100 U.S. companies, generating more than $5 million in illicit revenue to fund the Democratic People’s Republic of Korea (DPRK) and its weapons programs. Kejia Wang, 42, received a 108-month prison sentence, while his […] The post Two U.S. Nationals Sentenced for Running Laptop Farm for DPRK Remote Workers appeared first on Cyber Security Ne
Full text archived locally
✦ AI Summary· Claude Sonnet
Home Cyber Security News Two U.S. Nationals Sentenced for Running Laptop Farm for DPRK Remote Workers
Two American nationals have been sentenced to federal prison for operating a sophisticated “laptop farm” scheme.
The operation successfully infiltrated over 100 U.S. companies, generating more than $5 million in illicit revenue to fund the Democratic People’s Republic of Korea (DPRK) and its weapons programs.
Kejia Wang, 42, received a 108-month prison sentence, while his co-conspirator, Zhenxing Wang, 39, received a 92-month sentence. Both individuals pleaded guilty to conspiracy charges involving wire fraud, money laundering, and identity theft.
According to federal prosecutors, the duo managed physical locations in the U.S. to host company-issued laptops, masking the true overseas locations of North Korean IT workers.
This sentencing is part of a massive ongoing nationwide crackdown on similar DPRK fraud networks.
The Laptop Farm Modus Operandi
The multi-year operation, active between 2021 and October 2024, relied heavily on identity theft and technical deception.
The perpetrators compromised the identities of more than 80 U.S. citizens to secure remote IT roles at major American corporations, including several Fortune 500 companies.
To create the illusion of legitimate domestic operations, the Wangs established multiple shell companies such as Hopana Tech LLC and Independent Lab LLC to launder the illicit salaries.
These phantom entities had no real employees but served as financial conduits to funnel millions of dollars to overseas co-conspirators.
In return for their facilitation, the U.S.-based operators kept nearly $700,000. The infiltration extended beyond financial fraud, posing severe risks to U.S. national security.
According to the DOJ, the scheme resulted in critical data breaches and at least $3 million in remediation costs.
Key technical details of the compromise include:
KVM Switch Exploitation: The operators connected victim companies’ laptops to Keyboard-Video-Mouse (KVM) switches, enabling overseas workers to remotely access the devices while appearing to log in from U.S. residential IP addresses.
Source Code Theft: Unauthorized remote access granted North Korean operatives entry into sensitive employer networks and proprietary source code repositories.
ITAR Data Exfiltration: In early 2024, overseas actors successfully breached a California-based defense contractor, stealing artificial intelligence technical data explicitly controlled under the International Traffic in Arms Regulations (ITAR).
This sentencing represents a major milestone in the DOJ’s “DPRK RevGen: Domestic Enabler Initiative.” Following raids across multiple states, federal agents seized dozens of laptops, remote access devices, and web domains tied to the shell companies.
Simultaneously, the U.S. Department of State announced a $5 million reward for information leading to the disruption of eight additional fugitive co-conspirators involved in the financial mechanisms supporting this DPRK scheme.
The FBI and Homeland Security Investigations emphasize that organizations must remain vigilant against remote worker fraud.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
RELATED ARTICLESMORE FROM AUTHOR
Cyber Security News
New UAC-0247 Campaign Steals Browser and WhatsApp Data From Hospitals and Governments
Cyber Security News
Critical Cisco ISE Vulnerabilities Let Remote Attackers Execute Malicious Code
Cyber Security News
McGraw Hill Confirms Data Breach Exposing 13.5 Million Users’ Personal Data
Top 10
Top 10 Best User Access Management Tools in 2026
April 4, 2026
Top 10 Best VPN For Chrome in 2026
April 4, 2026
20 Best Application Performance Monitoring Tools in 2026
April 3, 2026
Top 10 Best VPN For Linux In 2026
April 3, 2026
10 Best VPN For Privacy In 2026
April 2, 2026