Netcrook Logo
👤 AGONY
🗓️ 16 Apr 2026   🌍 North America

Inside the North Korean Laptop Farm: How U.S. Citizens Powered a $5 Million Cyber Espionage Engine

A pair of New Jersey facilitators helped covert DPRK operatives infiltrate over 100 American companies, exposing critical data in a sprawling remote work fraud.

When a quiet New Jersey suburb became the unlikely command center for a North Korean cyber plot, few could have guessed the global consequences. Kejia Wang and Zhenxing Wang, trusted American residents, didn’t just break the law - they unwittingly opened the digital doors of corporate America to one of the world’s most sanctioned regimes. Their “laptop farm” operation, hidden in plain sight, would siphon millions and breach sensitive data at the highest levels of U.S. industry.

The Anatomy of a Global Cyber Ruse

The Justice Department’s latest cybercrime bust reads like a spy novel: two U.S. nationals, a web of shell companies, and a high-tech deception that funneled millions directly into the coffers of the Democratic People’s Republic of Korea. For years, Kejia and Zhenxing Wang orchestrated a sophisticated employment fraud, using the stolen identities of over 80 Americans to help North Korean IT operatives land remote jobs at more than 100 U.S. firms - from household tech giants to a defense contractor specializing in AI-powered equipment.

The technical backbone of the scheme was the “laptop farm” - dozens of employer-issued laptops physically hosted in the U.S., but remotely commandeered from Pyongyang and beyond. The key enabler: keyboard-video-mouse (KVM) switches, hardware that allowed North Korean users to seamlessly control each machine, bypassing employer geolocation checks and creating the illusion of a domestic workforce.

The Wangs’ shell companies, including Hopana Tech LLC and Independent Lab LLC, laundered the illicit profits, shuffling millions through U.S. banks before transferring funds abroad. But the deception went far beyond payroll: North Korean operatives gained deep access to corporate IT networks, exfiltrating proprietary source code and, most alarmingly, technical data protected under U.S. arms control laws. Between January and April 2024, a defense contractor in California was breached, with sensitive AI-related data spirited out to unknown hands.

The fallout has been severe. Victim organizations have spent more than $3 million on legal fees and emergency network overhauls. The federal crackdown, part of the “DPRK RevGen: Domestic Enabler Initiative,” has seized dozens of web domains and financial accounts, but eight key conspirators remain fugitives. The State Department is offering up to $5 million for tips leading to their capture.

Lessons for a Remote-First World

This case is a wake-up call for any company relying on remote IT talent. The FBI urges businesses to tighten identity checks, monitor for suspicious remote access, and audit connections for unauthorized hardware like KVM switches. As the boundaries between home offices and hostile actors blur, the new frontline of cyber defense may be closer than we think - sometimes just a neighbor’s basement away.

WIKICROOK

  • Laptop farm: A laptop farm is a collection of laptops managed remotely from one location, often used to simulate employee presence or conduct coordinated activities.
  • KVM switch: A KVM switch enables control of multiple computers with one keyboard, monitor, and mouse, improving security and efficiency in IT environments.
  • Shell company: A shell company is a business entity with no real operations or assets, often used to hide money flows or obscure the true owners of assets.
  • Identity theft: Identity theft is a crime where someone uses another person's personal data without consent, often to commit fraud or financial theft.
  • Exfiltration: Exfiltration is the unauthorized transfer of sensitive data from a victim’s network to an external system controlled by attackers.
North Korea Cyber Espionage Identity Theft

AGONY AGONY
Elite Offensive Security Commander
← Back to news