Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

678+ Articles
118+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. New Jersey Men Sentenced to Combined 17 Years for Running North Korean Laptop Farms
New Jersey Men Sentenced to Combined 17 Years for Running North Korean Laptop Farms
NEWS

New Jersey Men Sentenced to Combined 17 Years for Running North Korean Laptop Farms

Two New Jersey men received prison sentences of nine and nearly eight years respectively for operating IT laptop farms that funneled over $5 million to the North Korean government by fraudulently placing DPRK nationals as remote workers at US companies.

Dylan H.

News Desk

April 18, 2026
3 min read

Two New Jersey residents have received lengthy federal prison sentences for their roles in one of the most operationally sophisticated North Korean IT worker fraud schemes prosecuted to date. The Department of Justice announced that Kejia Wang, 42, was sentenced to nine years in federal prison, while Zhenxing Wang, 39, received a sentence of nearly eight years — a combined 17-year sentence reflecting the scale and national security implications of the operation.

The Scheme

The pair ran what prosecutors described as a laptop farm — a physical location stocked with US-registered laptops that North Korean nationals could remotely access to pose as legitimate American IT workers. By routing their connections through US-based hardware, the North Korean workers could bypass geolocation checks and appear as domestic employees to US companies hiring for remote IT and software development roles.

According to the DOJ, the scheme generated more than $5 million in fraudulent income that was ultimately funneled back to the government of North Korea, which uses IT worker revenue to fund its weapons programs and evade international sanctions.

How the Operation Worked

  1. Recruitment — North Korean nationals (operating from North Korea, China, or other third countries) applied for remote IT contractor and software development positions at US companies under false identities
  2. Identity fraud — the defendants provided stolen or fabricated US identities, including Social Security Numbers and fabricated work histories, to make the applications appear legitimate
  3. Laptop farm infrastructure — laptops registered to US addresses were set up and maintained by the defendants; North Korean workers connected remotely, appearing to employers as US-based employees
  4. Payroll interception — wages paid by US employers were collected by the defendants and forwarded, minus a cut, to DPRK-controlled accounts through layered financial transfers

Broader Context

The sentencing follows a years-long FBI and DOJ enforcement campaign targeting DPRK IT worker networks. In 2023, the US government issued a joint advisory with allies warning that thousands of North Korean nationals were embedded as remote workers at technology companies globally. The FBI has estimated these operations collectively generate hundreds of millions of dollars annually for Pyongyang.

Prior prosecutions have named facilitators in the US, Europe, and Asia. The Wang case is notable for the severity of the sentences — reflecting prosecutors' intent to deter others from operating domestic infrastructure in support of sanctions evasion schemes.

Indicators and Detection Guidance

Organizations hiring remote IT workers should watch for:

  • Unusual login patterns — workers logging in via VPN, KVM-over-IP, or remote desktop from unexpected IP ranges
  • Multiple identities on shared hardware — MAC address or device fingerprint inconsistencies
  • Reluctance to appear on video — North Korean workers frequently avoid live video calls or use AI-generated faces
  • Requests to redirect paychecks — rapid changes to payment accounts shortly after onboarding
  • Inconsistencies in credentials — certifications or work history that cannot be independently verified

CISA and the FBI maintain guidance on detecting and reporting suspected North Korean IT worker fraud.

References

  • The Record — NJ Men Sentenced for North Korean Laptop Farms
  • DOJ Press Release
  • FBI / CISA Advisory on DPRK IT Workers
#APT#North Korea#Nation-State#DOJ#Cybercrime#Insider Threat

Related Articles

Iran Deploys 'Pseudo-Ransomware,' Revives Pay2Key Operations

Iranian APT groups are increasingly blurring the lines between state-sponsored cyber espionage and financially motivated cybercrime, deploying destructive...

6 min read

'It Reads Like a Spy Novel': $280M Drift Theft Linked to North Korean Fake Companies

A post-mortem of the $280 million Drift Protocol crypto theft reveals a sophisticated six-month North Korean social engineering operation involving fake...

4 min read

Russia's Forest Blizzard Harvests Logins via SOHO Router DNS Poisoning

Russia's APT28 (Forest Blizzard) is conducting a malwareless espionage campaign by modifying a single DNS setting in vulnerable SOHO routers to silently...

6 min read
Back to all News