Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    A Surprise Pokémon Game Just Dropped for Switch and Mobile

    July 24, 2025

    Google rethinks search results with its new AI-curated ‘Web Guide’

    July 24, 2025

    Intel reveals it will shed 24,000 employees this year and retreat in Germany, Poland, and Costa Rica

    July 24, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Identities of More Than 80 Americans Stolen for North Korean IT Worker Scams
    Security

    Identities of More Than 80 Americans Stolen for North Korean IT Worker Scams

    News RoomBy News RoomJuly 3, 20253 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    For years, the North Korean government has found a burgeoning source of sanctions-evading revenue by tasking its citizens with secretly applying for remote tech jobs in the West. A newly revealed takedown operation by American law enforcement makes clear just how much of the infrastructure used to pull off those schemes has been based in the United States—and just how many Americans’ identities were stolen by the North Korean impersonators to carry them out.

    On Monday, the Department of Justice announced a sweeping operation to crack down on US-based elements of the North Korean remote IT workers scheme, including indictments against two Americans who the government says were involved in the operations—one of whom the FBI has arrested. Authorities also searched 29 “laptop farms” across 16 states allegedly used to receive and host the PCs the North Korean workers remotely access, and seized around 200 of those computers as well as 21 web domains and 29 financial accounts that had received the revenue the operation generated. The DOJ’s announcement and indictments also reveal how the North Koreans didn’t merely create fake IDs to insinuate themselves into Western tech firms, according to authorities, but allegedly stole the identities of “more than 80 US persons” to impersonate them in jobs at more than a hundred US companies and funnel money to the Kim regime.

    “It’s huge,” says Michael Barnhart, an investigator focused on North Korean hacking and espionage at DTEX, a security firm focused on insider threats. “Whenever you have a laptop farm like this, that’s the soft underbelly of these operations. Shutting them down across so many states, that’s massive.”

    In total, the DOJ says it’s identified six Americans it believes were involved in a scheme to enable the North Korean tech worker impersonators, though only two have been named and criminally charged—Kejia Wang and Zhenxing Wang, both based in New Jersey—and only Zhenxing Wang has been arrested. Prosecutors accuse the two men of helping to steal the identities of scores of Americans for the North Koreans to assume, receiving laptops sent to them by their employers, setting up remote access for North Koreans to control those machines from across the world—often enabling that remote access using a hardware device called a “keyboard-video-mouse switch” or KVM—and creating shell companies and bank accounts that allowed the North Korean government to receive the salaries they allegedly earned. The DOJ says the two American men also worked with six named Chinese coconspirators, according to the charging documents, as well as two Taiwanese nationals.

    To create the cover identities for the North Korean workers, prosecutors say the two Wangs accessed the personal details of more than 700 Americans in searches of private records. But for the individuals the North Koreans impersonated, they allegedly went far further, using scans of the identity theft victims’ drivers’ licenses and Social Security cards to enable the North Koreans to apply for jobs under their names, according to the DOJ.

    It’s not clear from the charging documents just how those personal documents were allegedly obtained. But DTEX’s Barnhart says North Korean impersonation operations typically obtain Americans’ identifying documents from dark web cybercriminal forums or data leak sites. In fact, he says the 80-plus stolen identities cited by the DOJ represent a tiny sample of thousands of US IDs he’s seen pulled in some cases from North Korean hacking operations’ infrastructure.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleHere are the letters that convinced Google and Apple to keep TikTok online
    Next Article Meet Soham Parekh, the engineer burning through tech by working at three to four startups simultaneously

    Related Posts

    At Least 750 US Hospitals Faced Disruptions During Last Year’s CrowdStrike Outage, Study Finds

    July 24, 2025

    China’s Salt Typhoon Hackers Breached the US National Guard for Nearly a Year

    July 23, 2025

    How China’s Patriotic ‘Honkers’ Became the Nation’s Elite Cyberspies

    July 21, 2025

    Hackers Are Finding New Ways to Hide Malware in DNS Records

    July 19, 2025

    Adoption Agency Data Exposure Revealed Information About Children and Parents

    July 19, 2025

    AI ‘Nudify’ Websites Are Raking in Millions of Dollars

    July 18, 2025
    Our Picks

    Google rethinks search results with its new AI-curated ‘Web Guide’

    July 24, 2025

    Intel reveals it will shed 24,000 employees this year and retreat in Germany, Poland, and Costa Rica

    July 24, 2025

    No, Instagram didn’t suspend Zohran Mamdani’s account for being ‘too socialist’

    July 24, 2025

    VTuber agency VShojo shuts down after talent exodus

    July 24, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    News

    How can Tesla make a cheaper Model Y?

    By News RoomJuly 24, 2025

    In an earnings call Wednesday, Tesla CEO Elon Musk “let the cat out of the…

    watchOS 26 preview: a subtler take on AI

    July 24, 2025

    How to install the iOS 26 public beta

    July 24, 2025

    A Top NASA Official Is Among Thousands of Staff Leaving the Agency

    July 24, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.