North Korean ‘Laptop Farm’ Scheme Nets Prison Time for US Operatives
Posted: Monday, Apr 20
  • KBI.Media
  • $
  • North Korean ‘Laptop Farm’ Scheme Nets Prison Time for US Operatives
Karissa Breen, more commonly known as KB, is crowned a LinkedIn ‘Top Voice in Technology’, and widely recognised across the global cybersecurity industry. A serial entrepreneur, she is the co-founder of the TMFE Group, a portfolio of cybersecurity-focused businesses spanning an industry-leading media platform, a specialist marketing agency, a content production studio, and the executive headhunting firm, MercSec. Now based in the United States, KB oversees US editorial operations and leads the expansion of the group’s media footprint across North America, while maintaining a strong presence in Australia, and the broader global market. She is the former Producer and Host of the streaming show 2Fa.tv, and currently sits at the helm of journalism for the group’s flagship arm, KBI.Media, the independent cybersecurity media company. As a cybersecurity investigative journalist, KB hosts her globally-renowned podcast, KBKast, where she interviews leading cybersecurity practitioners, CISOs, government officials including heads-of-state, and industry pioneers from around the world. The podcast has been downloaded in over 65 countries with more than 400,000 global downloads, influencing billions of dollars in cybersecurity budgets. KB is known for asking the hard questions and extracting real, commercially relevant insights. Her approach provides an uncoloured, strategic lens on the evolving cybersecurity landscape, demystifying complex security issues and translating them into practical intelligence for executives navigating risk, regulation, and rapid technological change.

i 3 Table of Contents

North Korean ‘Laptop Farm’ Scheme Nets Prison Time for US Operatives

​Two US nationals have been sentenced years behind bars after federal prosecutors say they helped fuel a sophisticated North Korean scheme that infiltrated American companies, stole identitie,s and funnelled millions to a hostile regime.

The United States Department of Justice announced that Kejia Wang, 42, and Zhenxing Wang, 39, were sentenced for their roles in a multi year operation that enabled North Korean IT workers to pose as U.S.-based employees and secure remote jobs across more than 100 American companies.

Authorities say the scheme generated over $5 million in illicit revenue for the Democratic People’s Republic of Korea (DPRK), raising serious national security concerns over how easily foreign adversaries can exploit remote work environments.

At the centre of the operation were so called ‘laptop farms’ across physical locations in the United States where company issued devices were hosted to create the illusion that workers were operating domestically, but were in fact not.

Prosecutors say those machines were remotely accessed by North Korean operatives overseas, allowing them to bypass sanctions and gain employment under stolen American identities, which is starting to become a very common occurence.

The scheme relied on the identities of at least 80 US citizens, with the fraudulent workers embedding themselves into corporate environments and in some cases, including major enterprises and sensitive sectors.

Kejia Wang was sentenced to a whopping 108 months (9 years) in prison after pleading guilty to conspiracy charges that included wire fraud, money laundering, and identity theft. Zhenxing Wang received a lesser 92 month (7.5 years) sentence after pleading guilty to comparable fraud and money laundering charges.

In addition to their prison sentences, the two individuals were also ordered to forfeit hundreds of thousands of dollars as part of the court’s judgment. After completing their time in custody, they will be required to serve a term of supervised release, during which they must comply with specific conditions set by the court.

This case is an example of a broader crackdown by United States authorities targeting North Korea’s aggressive use of cyber fraud to obfuscate sanctions and generate revenue.

Officials warn the tactics used in this scheme, particularly the exploitation of remote hiring processes is the growing attack surface for organisations worldwide.

Share This