Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
OpenAI Confirms Security Breach from TanStack npm Attack
May 15, 2026
Cisco Catalyst SD-WAN Controller 0-Day Actively Exploited to Gain
May 15, 2026
Chinese APT Exploits Microsoft Exchange to Breach Energy Networks
May 14, 2026
Home/CyberSecurity News/Two U.S. Nationals Sentenced for Running Laptop Farm for DPRK
CyberSecurity News

Two U.S. Nationals Sentenced for Running Laptop Farm for DPRK

Two American nationals received federal prison sentences for operating a sophisticated “laptop farm” scheme. The operation successfully infiltrated over 100 U.S. companies, generating more than $5...

Sarah simpson
Sarah simpson
April 16, 2026 2 Min Read
5 0

Two American nationals received federal prison sentences for operating a sophisticated “laptop farm” scheme.

The operation successfully infiltrated over 100 U.S. companies, generating more than $5 million in illicit revenue to fund the Democratic People’s Republic of Korea (DPRK) and its weapons programs.

Kejia Wang, 42, received a 108-month prison sentence, while his co-conspirator, Zhenxing Wang, 39, received a 92-month sentence. Both individuals pleaded guilty to conspiracy charges involving wire fraud, money laundering, and identity theft.

According to federal prosecutors, the duo managed physical locations in the U.S. to host company-issued laptops, masking the true overseas locations of North Korean IT workers.

This sentencing is part of a massive ongoing nationwide crackdown on similar DPRK fraud networks.

The Laptop Farm Modus Operandi

The multi-year operation, active between 2021 and October 2024, relied heavily on identity theft and technical deception.

The perpetrators compromised the identities of more than 80 U.S. citizens to secure remote IT roles at major American corporations, including several Fortune 500 companies.

To create the illusion of legitimate domestic operations, the Wangs established multiple shell companies such as Hopana Tech LLC and Independent Lab LLC to launder the illicit salaries.

These phantom entities had no real employees but served as financial conduits to funnel millions of dollars to overseas co-conspirators.

In return for their facilitation, the U.S.-based operators kept nearly $700,000. The infiltration extended beyond financial fraud, posing severe risks to U.S. national security.

According to the DOJ, the scheme resulted in critical data breaches and at least $3 million in remediation costs.

Key technical details of the compromise include:

  • KVM Switch Exploitation: The operators connected victim companies’ laptops to Keyboard-Video-Mouse (KVM) switches, enabling overseas workers to remotely access the devices while appearing to log in from U.S. residential IP addresses.
  • Source Code Theft: Unauthorized remote access granted North Korean operatives entry into sensitive employer networks and proprietary source code repositories.
  • ITAR Data Exfiltration: In early 2024, overseas actors successfully breached a California-based defense contractor, stealing artificial intelligence technical data explicitly controlled under the International Traffic in Arms Regulations (ITAR).

This sentencing represents a major milestone in the DOJ’s “DPRK RevGen: Domestic Enabler Initiative.” Following raids across multiple states, federal agents seized dozens of laptops, remote access devices, and web domains tied to the shell companies.

Simultaneously, the U.S. Department of State announced a $5 million reward for information leading to the disruption of eight additional fugitive co-conspirators involved in the financial mechanisms supporting this DPRK scheme.

The FBI and Homeland Security Investigations emphasize that organizations must remain vigilant against remote worker fraud.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

BreachExploitSecurity

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

New UAC-0247 Campaign Steals Browser and WhatsApp Data From

Next Post

Critical Cisco ISE Flaws Let Remote Attackers Execute Code

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
node-ipc npm Package Compromised in Supply Weekly Downloads
May 14, 2026
TeamPCP and BreachForums Hackers Running $1,000 Contest for Supply
May 14, 2026
Critical Canon MailSuite Flaw Allows Remote Code Execution
May 14, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us