Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
US Sentences Two for North Korean IT Scheme Involvement

US Sentences Two for North Korean IT Scheme Involvement

Posted on April 17, 2026 By CWS

This week, two US citizens received prison sentences for their involvement in an elaborate scheme employing North Korean IT workers, leading to significant financial harm to American businesses. The scheme allowed North Korea to illegally generate millions of dollars.

Background of the Case

In June 2025, US authorities charged Kejia Wang, 42, from Edison, New Jersey, and Zhenxing Wang, 39, from New Brunswick, New Jersey. This followed a large operation involving 29 laptop farms across 16 states. The investigation revealed that between 2021 and 2024, these individuals, along with their accomplices, misused the identities of over 80 US residents to secure employment at more than 100 companies.

These fraudulent activities resulted in over $5 million being funneled to the North Korean government, while US companies suffered losses exceeding $3 million. The court documents indicated that Kejia Wang played a key supervisory role, managing several US-based facilitators, including Zhenxing Wang, who operated these deceptive networks.

Details of the Scheme

The facilitators housed numerous laptops at their homes, connecting them to devices that allowed North Korean operatives to masquerade as US IT professionals. This setup was further bolstered by the creation of fictitious companies, ostensibly US-based, but with no real employees. Payments amounting to millions were funneled through these shell companies, ultimately benefiting the conspirators abroad.

In total, the six involved US facilitators, including the Wangs, earned approximately $700,000 for their participation. As part of their sentencing, Kejia Wang received a 108-month prison term, while Zhenxing Wang was sentenced to 92 months. They were also required to forfeit $600,000 and pay restitution.

Ongoing Efforts and Future Outlook

While the sentencing marks a significant step in the case, nine other individuals implicated in the scheme remain at large. The US government has issued a reward of up to $5 million for information leading to their capture. These individuals include Xu Yongzhe, Huang Jingbin, Tong Yuze, Zhou Baoyu, Yuan Ziyou (known as Samuel Yuan), Zhou Zhenbang, Liu Menting, Liu Enchia, and Song Min Kim (also known as Chengmin Jin).

This case highlights the ongoing threat of international cybercrime and the importance of robust cybersecurity measures. As authorities continue their search for the remaining conspirators, the case serves as a stark reminder of the complexities involved in tackling global cyber threats.

Security Week News Tags:Cybercrime, Cybersecurity, financial crime, Fraud, identity theft, international crime, IT schemes, IT security, IT workers, judicial news, laptop farms, North Korea, shell companies, US justice, US legal system

Post navigation

Previous Post: Microsoft Defender Zero-Day Exploits Unpatched
Next Post: CVE-2026-39987 Exploited to Deploy Blockchain Backdoor

Related Posts

Chinese APT ‘LongNosedGoblin’ Targeting Asian Governments Chinese APT ‘LongNosedGoblin’ Targeting Asian Governments Security Week News
Researchers Expose WHILL Wheelchair Safety Risks via Remote Hacking Researchers Expose WHILL Wheelchair Safety Risks via Remote Hacking Security Week News
Organizations Warned of Exploited Linux Vulnerabilities Organizations Warned of Exploited Linux Vulnerabilities Security Week News
Google Rolls Out Emergency Chrome Update to Patch Zero-Days Google Rolls Out Emergency Chrome Update to Patch Zero-Days Security Week News
ChatGPT’s Calendar Integration Can Be Exploited to Steal Emails ChatGPT’s Calendar Integration Can Be Exploited to Steal Emails Security Week News
CISA Alerts on Active Exploitation of Major Software Vulnerabilities CISA Alerts on Active Exploitation of Major Software Vulnerabilities Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • North Korean Malware Targets macOS via Fake Zoom SDK Update
  • CoChat Introduces Platform to Manage Shadow AI Risks
  • CVE-2026-39987 Exploited to Deploy Blockchain Backdoor
  • US Sentences Two for North Korean IT Scheme Involvement
  • Microsoft Defender Zero-Day Exploits Unpatched

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • North Korean Malware Targets macOS via Fake Zoom SDK Update
  • CoChat Introduces Platform to Manage Shadow AI Risks
  • CVE-2026-39987 Exploited to Deploy Blockchain Backdoor
  • US Sentences Two for North Korean IT Scheme Involvement
  • Microsoft Defender Zero-Day Exploits Unpatched

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark