Netcrook Logo
👤 AGONY
🗓️ 16 Apr 2026   🌍 Asia

Keyboard Warriors for Hire: The North Korean Laptop Farm That Infiltrated Corporate America

Two New Jersey men sentenced for orchestrating a covert scheme that funneled millions to North Korea by planting IT workers inside U.S. firms.

On an unremarkable street in New Jersey, hundreds of laptops hummed quietly - each a portal for North Korean operatives to slip into the heart of American business. Behind this digital masquerade were Kejia Wang and Zhenxing Wang, now facing lengthy prison sentences for their roles in a scheme that enabled North Korean IT workers to pose as U.S. employees and siphon sensitive data from Fortune 500 firms.

From 2021 to 2024, the Wangs ran a sophisticated operation that combined old-school con artistry with modern cyber tactics. The plot began with stolen identities - roughly 80 U.S. citizens had their personal information hijacked and handed to North Korean IT specialists. These operatives, masquerading as Americans, landed jobs at more than 100 U.S. companies, including a major defense contractor developing artificial intelligence technology.

The core of the operation was the so-called “laptop farms.” Hundreds of laptops, managed and hosted in suburban homes, were connected to keyboard-video-mouse (KVM) switches, allowing North Korean workers to control them remotely from abroad. This setup fooled even the most robust onboarding checks, giving the North Koreans direct access to corporate networks and sensitive intellectual property.

Kejia Wang, the alleged ringleader, traveled to China’s border cities to coordinate with North Korean contacts, while Zhenxing Wang and a handful of U.S.-based associates received and hosted the laptops. They also set up a web of shell companies and U.S. bank accounts to launder millions in illicit payments back to North Korea. For their services, the Wangs pocketed $600,000 - now ordered forfeited by the court.

The impact was severe: U.S. companies lost millions in legal fees and remediation costs. Sensitive data, including source code and AI research, was exfiltrated - some of it covered by strict arms regulations. The Justice Department and FBI have since dismantled dozens of websites linked to the scheme and are pursuing additional suspects, many still believed to be in North Korea or China.

This case is part of a larger, ongoing pattern. In recent months, several Americans - including an active-duty Army member - have been convicted for facilitating North Korean IT worker schemes. Investigators warn that such operations not only enrich a sanctioned regime but also threaten national security by opening doors to espionage and cyberattacks.

The sentencing of Kejia and Zhenxing Wang sends a clear message to would-be facilitators: the price of helping foreign adversaries infiltrate American tech is steep. But as long as cyber borders remain porous and profits tempting, the digital underground will keep searching for new ways in.

WIKICROOK

  • Laptop farm: A laptop farm is a collection of laptops managed remotely from one location, often used to simulate employee presence or conduct coordinated activities.
  • KVM switch: A KVM switch enables control of multiple computers with one keyboard, monitor, and mouse, improving security and efficiency in IT environments.
  • Shell company: A shell company is a business entity with no real operations or assets, often used to hide money flows or obscure the true owners of assets.
  • Identity theft: Identity theft is a crime where someone uses another person's personal data without consent, often to commit fraud or financial theft.
  • ITAR (International Traffic in Arms Regulations): ITAR governs the export and handling of U.S. defense-related technology, requiring strict controls to protect sensitive military data and information.
North Korea Cyber Infiltration Identity Theft

AGONY AGONY
Elite Offensive Security Commander
← Back to news