New Jersey men given lengthy sentences for running North Korean laptop farms
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户的要求很明确,不需要特定的开头,直接写描述。首先,我得通读整篇文章,抓住主要信息。 文章讲的是两名新泽西男子因帮助朝鲜人在美国IT公司工作而被判刑。他们参与了一个涉及超过100家美国公司的计划,赚取了500万美元给朝鲜政府。他们通过管理企业设备和安装软件让朝鲜人远程访问。还涉及身份盗窃和数据泄露,尤其是国防承包商的敏感数据。 接下来,我需要提取关键点:两人名字、判刑时间、涉及公司数量、赚取金额、操作手段、影响等。然后把这些信息浓缩到100字以内,确保涵盖主要事件和后果。 可能的结构是:两名男子被判刑,帮助朝鲜人在美国IT公司工作,涉及百家公司,赚取资金给朝鲜政府,并通过管理设备和安装软件实现远程访问。同时提到身份盗窃和数据泄露的影响。 现在组织语言,确保简洁明了。例如:“两名新泽西男子因协助朝鲜人在美国IT公司工作被判刑7年多。他们通过管理企业设备并安装软件让朝鲜人远程访问,并窃取身份帮助其就业。” 这样既涵盖了主要人物、判刑结果、操作手段和影响,又控制在字数限制内。 </think> 两名新泽西男子因协助朝鲜人在美国IT公司工作被判刑7年多。他们通过管理企业设备并安装软件让朝鲜人远程访问,并窃取身份帮助其就业。 2026-4-16 16:50:30 Author: therecord.media(查看原文) 阅读量:11 收藏

Two men from New Jersey were given more than seven years in prison for their role in a scheme to help North Koreans get hired in IT roles at over 100 U.S. companies. 

The DOJ said Kejia Wang, 42, was sentenced to nine years in prison and Zhenxing Wang, 39, was given a nearly eight-year sentence for an operation that generated more than $5 million for the government of North Korea. 

The two men were arrested and indicted last year on accusations that they were key figures in a laptop farm operation that saw them manage hundreds of corporate devices and install software on them that gave the North Koreans remote access.

“Today’s announcement sends a clear message: U.S. nationals who facilitate DPRK IT worker schemes and funnel revenue to North Korea will face FBI investigation and potential prison time,” said FBI Cyber Division Assistant Director Brett Leatherman.

From 2021 to October 2024, the group allegedly stole the identities of about 80 U.S. citizens and provided them to North Koreans — allowing them to gain employment at several Fortune 500 companies. The court documents claim the American companies dealt with about $3 million in losses due to legal fees, network remediation costs and more.

Kejia Wang and Zhenxing Wang set up bank accounts and other infrastructure to facilitate the operation. Kejia Wang personally traveled in 2023 to Shenyang and Dandong, both of which are near the border of North Korea and China, to organize the scheme. 

Zhenxing Wang was allegedly one of several U.S. residents to receive laptops and host them at their homes, connecting the laptops to devices investigators called “keyboard-video-mouse or ‘KVM’ switches” that allowed people overseas to control them remotely.

Kejia Wang pleaded guilty in September to charges of conspiracy to commit wire fraud, conspiracy to commit money laundering and conspiracy to commit identity theft. Zhenxing Wang pleaded guilty in January to conspiracy to commit wire fraud and conspiracy to commit money laundering.

Both will be forced to forfeit a total of $600,000 paid to them by North Korea and they will serve three years of supervised release. Prosecutors said they have received about $400,000 of the total amount. 

Assistant Attorney General for National Security John Eisenberg said the two men “enriched themselves by assisting North Korean actors in a fraudulent scheme to gain employment with U.S. companies.”

“By operating so-called ‘laptop farms,’ these defendants enabled overseas actors to infiltrate U.S. businesses, access sensitive data and undermine our economic and national security,” said U.S. Attorney Leah Foley. 

During his trips to China in 2023, Kejia Wang met with a former classmate that he knew was from North Korea. Prosecutors said Kejia Wang was the “manager” of the scheme and supervised at least five others who collectively hosted hundreds of computers at their homes. 

Zhenxing Wang was one of the five and he was also deeply involved in creating shell companies to make it look like the North Koreans were working for legitimate U.S. businesses. 

Prosecutors noted that the North Korean IT workers involved in this specific scheme were able to steal sensitive data and source code from a California-based defense contractor that develops artificial intelligence-powered equipment and technologies. The data was sensitive enough to qualify under International Traffic in Arms Regulations (ITAR), according to the DOJ. 

Investigators have long warned that many of the North Korean IT workers who get hired at U.S. companies pass on their access to more sophisticated government hackers who steal sensitive information, install malware or take other actions beyond straightforward IT work. 

Department of Defense investigator John Helsing said the sentences “should act as a deterrent to foreign individuals and entities attempting to illegally access and export critical defense information.”

Zhenxing Wang and Kejia Wang were indicted alongside eight other people, most of whom are based in North Korea or China. The Justice Department issued a new $5 million reward for information on their whereabouts. 

The FBI and Defense Department seized dozens of websites in 2024 and 2025 that were specifically tied to Kejia Wang’s and Zhenxing Wang’s shell companies. 

Multiple U.S. citizens, including one active duty member of the U.S. Army, have been indicted and convicted in recent months for serving as facilitators to North Korean IT workers, offering their identities for use during the job application process or hosting laptop farms.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.


文章来源: https://therecord.media/new-jersey-men-sentenced-north-korean-laptop-farms
如有侵权请联系:admin#unsafe.sh