US Authorities’ Actions Result in Arrest, Indictments in IT Worker Scheme Funding North Korea 

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer

Nine individuals were indicted in Boston, Massachusetts, with one of them arrested, for cyber schemes tied to the Democratic People's Republic of Korea (DPRK), aiming to thwart illicit activities funding the regime's programs, including its weapons initiatives.

One New Jersey man and eight overseas actors from China and Taiwan were connected to an alleged scheme to generate revenue for the DPRK's weapons of mass destruction (WMD) programs, the U.S. Department of Justice (DOJ) announced.

Authorities revealed that North Korean individuals fraudulently obtained employment as remote IT workers for over 100 U.S. companies, using stolen or falsified identities. Investigations uncovered the use of shell companies, fraudulent websites, and financial networks to launder funds back to the DPRK regime.

Kim Kwang Jin. Kang Tae Bok, Jong Pong Ju, and Chang Nam Il on FBI wanted poster
Kim Kwang Jin. Kang Tae Bok, Jong Pong Ju, and Chang Nam Il on FBI wanted poster | Source: FBI/Handout via REUTERS

Simultaneously, U.S. officials seized 29 financial accounts, dismantled 21 fraudulent websites, and executed searches at suspected "laptop farm" locations across 16 states. Over 70 laptops, remote access devices, and critical evidence were recovered.

The following defendants have been indicted for their roles in the scheme, which generated at least $5 million in revenue for North Korea:  

Zhenxing "Danny" Wang was arrested for involvement in facilitating these schemes. Wang and co-conspirators allegedly funneled millions through fake companies, disguising remote workers as legitimate employees. 

North Korean nationals Kim Kwang Jin, Kang Tae Bok, Jong Pong Ju, and Chang Nam Il have been charged in a five-count wire fraud and money laundering indictment.

These individuals, supported by collaborators in the U.S, China, the UAE, and Taiwan, orchestrated sophisticated schemes that included hosting "laptop farms" to bypass geolocation restrictions. 

North Korean IT workers not only collected millions in salary payments but also accessed sensitive employer data, including export-controlled military technology and cryptocurrency theft amounting to $900,000 from a blockchain company.

The FBI, Defense Criminal Investigative Service (DCIS), and Homeland Security Investigations (HSI) played key roles in unraveling these networks.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: