
๐ฏTwo men from New Jersey helped North Korea trick U.S. companies by pretending to be IT workers, stealing money and sensitive information. They've been sentenced to prison for their roles in this scheme.
What Happened
The U.S. Department of Justice has announced that New Jersey residents Kejia Wang, also known as Tony Wang, and Zhenxing Wang, also known as Danny Wang, have been sentenced to nine years and nearly eight years in prison, respectively, for facilitating a North Korean scheme that involved infiltrating U.S. businesses as fake IT workers. This conspiracy, which ran from at least 2021 to October 2024, generated over $5 million in illicit revenue for the North Korean regime. The two men were part of a broader operation that placed operatives in jobs at more than 100 U.S. companies across 27 states and the District of Columbia.
Who's Affected
The operation targeted U.S. businesses, including many Fortune 500 companies, by using stolen identities of at least 80 American individuals. This infiltration not only undermined the integrity of these businesses but also posed significant risks to national security, particularly when operatives accessed sensitive files from a California-based defense contractor related to U.S. military technology under International Traffic in Arms Regulations (ITAR).
What Data Was Exposed
The conspirators were involved in stealing sensitive data, which included proprietary information critical to U.S. military capabilities. The financial impact on victim companies exceeded $3 million, factoring in legal fees, remediation costs, and other losses.
Immediate Actions
Both Kejia and Zhenxing Wang pleaded guilty to multiple charges, including conspiracy to commit wire and mail fraud, money laundering, and identity theft. They were also ordered to forfeit a combined total of $600,000, of which two-thirds has already been paid. Authorities have ramped up efforts to target U.S.-based facilitators of North Korea's IT worker schemes, including those providing forged identities and operating laptop farms.
Additional Context
The sophisticated nature of this scheme involved the establishment of shell companies posing as legitimate software development firms. These front companies allowed North Korean operatives to appear as U.S.-based employees, thus evading suspicion during hiring processes. Experts note that while the primary goal of these operations is revenue generation, they also serve dual purposes, including espionage and potential support for state-backed hacking activities. Michael Barnhart, a nation-state investigator at DTEX, emphasized that not all North Korean IT workers are hackers, but every hacker has likely been an IT worker, complicating insider threat assessments.
Conclusion
The sentencing of Kejia Wang and Zhenxing Wang is part of a broader crackdown on North Korean operations that exploit the U.S. job market. As law enforcement continues to respond to these threats, researchers warn that North Korea's schemes are vast and constantly evolving, necessitating ongoing vigilance from both public and private sectors.
The case highlights the complex interplay between economic crime and national security, as North Korean operatives leverage legitimate business structures to conduct espionage and fraud.

.webp)


