US nationals behind DPRK IT worker 'laptop farm' sent to prison
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,抓住主要信息。 文章讲的是两名美国公民帮助朝鲜IT人员冒充美国居民,进入超过100家公司工作,包括很多 Fortune 500 公司。他们通过创建虚假网站和公司来掩盖朝鲜工人的身份,并协助他们进入美国公司网络。两人被指控并判刑,分别获刑9年半和7年半。另外还有九人仍然在逃,美国悬赏500万美元捉拿他们。 接下来,我需要将这些信息浓缩到100字以内。要确保涵盖主要人物、行为、后果以及相关处罚。同时,避免使用“文章内容总结”之类的开头语。 可能的结构是:两名美国人帮助朝鲜IT人员冒充美国居民进入公司工作,涉及百余家大公司,非法获利五百万美元,两人被判刑。另外还有九人被通缉。 现在检查字数是否符合要求,并确保信息准确无误。 </think> 两名美国公民帮助朝鲜IT人员冒充美国居民进入百余家大公司工作,非法获利500万美元。两人被判刑9年半和7年半。 2026-4-16 08:33:37 Author: www.bleepingcomputer.com(查看原文) 阅读量:13 收藏

North Korea

Two U.S. nationals have been sent to prison for helping North Korean remote information technology (IT) workers to pose as U.S. residents and get hired by over 100 companies across the country, including many Fortune 500 firms.

42-year-old Kejia Wang and 39-year-old Zhenxing Wang were charged in June 2025 following a coordinated law enforcement action against the Democratic People's Republic of Korea (DPRK) government's fundraising operations led by the U.S. Department of Justice (DoJ).

According to court documents, between 2021 and October 2024, the two generated more than $5 million in illicit revenue for the DPRK's government and an estimated $3 million in financial damages to companies that hired North Korean workers who were using the stolen identities of more than 80 U.S. citizens.

Wiz

As part of their scheme, they created financial accounts, fake websites, and multiple shell companies (e.g., Tony WKJ LLC, Hopana Tech LLC, Independent Lab LLC) to make it appear that DPRK workers were affiliated with legitimate U.S. businesses and collect payments.

Zhenxing Wang also hosted company-issued laptops in homes across the United States to help remote North Korean IT workers access the companies' networks without raising suspicion.

"For years, the defendants enriched themselves by assisting North Korean actors in a fraudulent scheme to gain employment with U.S. companies," said Assistant Attorney General for National Security John A. Eisenberg. "The ruse placed North Korean IT workers on the payrolls of unwitting U.S. companies and in U.S. computer systems, thereby harming our national security."

Fake driver's license and Social Security card
Fake driver's license and Social Security card (DOJ)

​Nine other defendants linked to the same scheme, who were also charged in June 2025, remain at large. The U.S. State Department has announced a reward of up to $5 million for information on the suspects, which can help disrupt illicit activities that support North Korea's weapons of mass destruction (WMD) program.

Kejia Wang was sentenced to 108 months in prison after pleading guilty to his role in the scheme in September 2025, and Zhenxing Wang to 92 months after pleading guilty in January 2026 to conspiracy to commit money laundering and conspiracy to commit wire fraud.

In February, Ukrainian national Oleksandr Didenko, who pleaded guilty in November 2025 to wire fraud conspiracy and aggravated identity theft, was also sentenced to five years in prison for providing DPRK IT workers with stolen identities that helped them infiltrate U.S. companies.

The FBI has been warning about North Korean threat actors impersonating U.S.-based IT staff since at least 2023.

As the FBI also repeatedly noted, the DPRK maintains a large army of thousands of IT workers who use stolen identities to secure employment with hundreds of American companies.

tines

Automated Pentesting Covers Only 1 of 6 Surfaces.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.


文章来源: https://www.bleepingcomputer.com/news/security/us-nationals-behind-north-korean-it-worker-laptop-farm-sent-to-prison/
如有侵权请联系:admin#unsafe.sh