Threats

Two New Jersey Men Sentenced for Enabling North Korea's IT Worker Infiltration Scheme

April 17, 2026 00:00 · 6 min read
Two New Jersey Men Sentenced for Enabling North Korea's IT Worker Infiltration Scheme

Federal Sentences Handed Down in North Korea IT Worker Case

Two New Jersey residents were sentenced on Wednesday for their roles in facilitating North Korea's long-running scheme to embed operatives inside American businesses as salaried employees, the Justice Department announced. The conspiracy generated more than $5 million in illicit revenue for the regime and touched more than 100 U.S. companies, including numerous Fortune 500 firms, spread across 27 states and the District of Columbia.

The defendants — Kejia Wang, also known as Tony Wang, age 42, and Zhenxing Wang, also known as Danny Wang, age 39 — were U.S. nationals who served as critical enablers of the broader operation. Both had previously entered guilty pleas before Wednesday's sentencing hearing.

Prison Terms and Financial Penalties

Kejia Wang received a sentence of nine years in prison after being convicted of conspiracy to commit wire and mail fraud, money laundering, and identity theft. Zhenxing Wang was sentenced to 92 months in prison on related charges of conspiracy to commit wire and mail fraud and money laundering.

In addition to incarceration, the pair were ordered to forfeit a combined $600,000, with officials noting that two-thirds of that amount has already been paid. Together with co-conspirators, the two men collected at least $696,000 in fees. U.S. victim companies suffered additional damages — including legal fees, remediation costs, and other losses — exceeding $3 million.

How the Scheme Operated

The conspiracy ran from at least 2021 through October 2024 and relied on a sophisticated infrastructure of deception. Kejia Wang, Zhenxing Wang, and their co-conspirators stole the identities of at least 80 U.S. residents in order to pass employment verification checks on behalf of North Korean operatives seeking jobs inside American firms.

Central to the operation were three shell companies — Hopana Tech, Tony WKJ, and Independent Lab — which the men established to project the appearance of legitimate software development businesses. These front companies provided the cover necessary to make North Korean workers appear to be domestic, U.S.-based contractors.

"Pairing a U.S. person, a U.S. address, and a front company such as Independent Lab, the facilitators created the illusion of a legitimate domestic effort allowing the IT workers to present themselves as U.S.-based without triggering suspicion during onboarding or daily workflows," said Michael Barnhart, nation state investigator at DTEX, in comments to CyberScoop.

Barnhart further explained how the financial flows worked: "Front companies can act as that middle financial flow from victim companies back to DPRK units, which then pushes funds upward through the Workers' Party of Korea to support whichever program the unit was aligned with, whether weapons development or domestic priorities."

National Security Implications Beyond Revenue Generation

While the bulk of North Korea's IT worker program is oriented toward earning hard currency for the regime, officials and researchers warned that the operation carries serious national security risks that extend well beyond simple wage theft.

Operatives involved in this conspiracy were found to have stolen sensitive files from a California-based defense contractor related to U.S. military technology controlled under the International Traffic in Arms Regulations (ITAR), officials said.

"Democratic People's Republic of Korea (DPRK) IT workers are not limited to revenue generation. When tasked, they can operationalize their placement and access to support strategic intelligence requirements, including intellectual property theft, network disruption or extortion," Barnhart told CyberScoop.

Barnhart also described a dual-use dimension to some of these placements, noting that the operation sometimes assigns certain privileged IT workers to conduct malicious activity in support of other state-backed hacking groups. He offered a striking formulation of the threat:

"Not all IT workers can be hackers but every North Korean hacker can or has been an IT worker. This distinction matters for insider‑threat analysis because unlike typical fraudulent hires motivated by personal financial gain, IT workers can inflict national‑security‑level damage."

A Sophisticated Insider Threat

Security experts emphasized that the use of front companies represents an elevated level of tradecraft that exposes a significant gap in traditional insider-risk assessments. Most organizations focus on detecting individual bad actors attempting to breach networks, but this scheme demonstrated that an entire fabricated company can pass scrutiny on paper.

"Sometimes it looks like an entire company appearing clean on paper," Barnhart noted, underlining the difficulty defenders face when the threat arrives dressed as a legitimate vendor or staffing partner rather than a lone malicious hire.

Broader Law Enforcement Response

Authorities have pursued North Korea's scheme through several parallel tracks, including targeting U.S.-based facilitators who supply forged or stolen identities and operate so-called laptop farms for North Korean operatives, as well as seizing cryptocurrency connected to the theft of funds.

The sentencing of Kejia Wang and Zhenxing Wang comes fewer than 30 days after a separate trio of American men were sentenced for similar crimes — including the operation of laptop farms, wire fraud, and identity theft — underscoring the pace at which prosecutions are advancing.

The Justice Department and Treasury Department have also issued indictments and imposed sanctions against individuals and entities allegedly involved in North Korea's broader effort to dispatch thousands of specialized technical professionals abroad to obtain employment under false pretenses and route their wages back to Pyongyang.

Despite these enforcement wins, researchers caution that North Korea's operation remains vast and continuously evolving, adapting its methods in response to increased scrutiny from both law enforcement and private industry.

Key Facts at a Glance


Source: CyberScoop

Source: CyberScoop

Powered by ZeroBot

Protect your website from bots, scrapers, and automated threats.

Try ZeroBot Free