Inside the North Korean scheme to funnel US wages into weapons funding


This recording was made using enhanced software.

Summary

Foiled scheme

Federal prosecutors have charged multiple individuals in a scheme to divert U.S. wages to North Korea by posing as remote IT workers for American companies.

Key information compromised

The operation involved fake identities, shell companies and “laptop farms,” allowing North Korean workers to access company systems.

Operation spanned several states

The Justice Department seized financial accounts, laptops and websites tied to the scheme.


Full story

Federal prosecutors have charged multiple people in a nationwide scheme to secretly funnel U.S. wages to North Korea’s government, allegedly to support its nuclear weapons program. The Department of Justice announced the charges Monday, June 30, describing a growing effort by North Korean operatives to bypass U.S. sanctions by posing as remote tech workers for American companies. 

What investigators uncovered

The United States has long sanctioned North Korea over national security concerns. But investigators say the country has adapted its tactics, using false identities and overseas locations to gain access to U.S.-based jobs and send the earnings back home.

QR code for SAN app download

Download the SAN app today to stay up-to-date with Unbiased. Straight Facts™.

Point phone camera here

The investigation led to two indictments, one arrest and searches at 29 suspected “laptop farms” in 16 states. Authorities also seized 29 financial accounts tied to money laundering and shut down 21 fake websites allegedly used in the scheme. 

“North Korean IT workers defraud American companies and steal the identities of private citizens, all in support of the North Korean regime,” said Brett Leatherman, assistant director of the FBI’s cyber division.

How US companies were targeted

North Korean nationals used fake or stolen identities to get hired as remote IT workers by more than 100 U.S. companies, according to court documents. They weren’t acting alone. Officials say they had help from people in the United States, China, the United Arab Emirates and Taiwan.

The DOJ has charged at least nine people with conspiracy to commit wire fraud, money laundering and identity theft, among other offenses.

Accomplices allegedly set up fake businesses and websites to make the workers seem legitimate. They also ran laptop farms, where North Korean workers could remotely log into company-issued computers from overseas and conceal their true locations.

Once hired, the workers collected paychecks and, in some cases, accessed sensitive information. Prosecutors say that included U.S. military technology protected under export controls, as well as virtual currency.

One of those breaches happened at a California-based defense contractor. Between January and April 2024, an overseas co-conspirator accessed the company’s systems without permission and obtained files marked as “controlled” under U.S. export regulations.

Cases in Georgia and Massachusetts surface

In a separate case, four North Korean nationals were indicted in Georgia for stealing more than $900,000 in cryptocurrency from blockchain and virtual token companies. They used false identities to secure employment, gained access to internal systems, and manipulated smart contracts to transfer the funds. Smart contracts are automated programs on blockchain platforms that manage transactions, and in this case, North Korean hackers altered the code to redirect the currency.

The group then used “crypto mixers” like Tornado Cash to launder the money and routed it through exchange accounts opened with fake Malaysian documents.

As part of the investigation, the FBI searched 21 laptop farm locations across 14 states in June, seizing more than 130 laptops tied to the operation. 

As the investigation continues, federal officials are offering rewards of as much as $5 million for information exposing North Korea’s illegal money operations.

Alan Judd (Content Editor) and Drew Pittock (Digital Producer) contributed to this report.
Tags: , , , , , , , , ,

Why this story matters

The Department of Justice says this scheme is a part of a growing national security threat as North Korea allegedly exploits U.S. businesses to fund its weapons program, bypass sanctions and gain access to sensitive data through cyber fraud.

Get the big picture

Synthesized coverage insights across 171 media outlets

Context corner

The North Korean regime’s use of overseas IT workers is seen as a method of evading international sanctions imposed for its weapons programs. This tactic has evolved due to stricter financial controls and advances in digital hiring. Historically, North Korea has relied on cyber operations, including hacking and fraud, to generate foreign currency and support its government priorities.

Global impact

The infiltration of remote North Korean IT workers is not just a U.S. issue — it highlights vulnerabilities in global remote hiring practices. According to the DOJ and other sources, similar scams target companies worldwide, especially in the crypto sector, and generate hundreds of millions for North Korea. The schemes also raise international concerns about cybercrime and sanction evasion.

Policy impact

The crackdown has led to calls for stricter identity verification in remote hiring, especially in high-sensitivity industries like defense and blockchain. Affected companies have adapted by improving onboarding procedures and vetting practices. The DOJ's actions are expected to prompt further legislative and regulatory steps to enhance workforce security domestically and globally.

Bias comparison

  • Media outlets on the left depict the North Korean IT worker scheme as a persistent, adaptive threat exploiting “laptop farms” and stolen identities, emphasizing operational nuances to highlight systemic vulnerabilities and ethical concerns, often using terms like “crackdown” to imply potentially heavy-handed law enforcement.
  • Media outlets in the center remain measured, focusing on factual legal actions and official warnings without emotive framing.
  • Media outlets on the right employ more forceful language — “infiltrated" and “massive fraud scheme” — to frame the story as a direct national security and ideological assault by an “authoritarian regime,” stressing law-and-order enforcement and the geopolitical threat.

Media landscape

Click on bars to see headlines

171 total sources

Key points from the Left

  • Federal investigators revealed that North Koreans obtained remote IT jobs at over 100 U.S. companies, aided by individuals in the U.S., according to the Justice Department.
  • Two U.S.-based individuals, Zhenxing Wang and Kejia Wang, were charged for facilitating North Korean workers to secure these jobs using stolen identities.
  • Federal agents searched 29 "laptop farms" in 16 states and seized around 200 computers linked to the scheme, which provided North Koreans remote access to confidential corporate data.
  • The scheme aimed to generate funds for the North Korean regime, which continues to face international sanctions.

Report an issue with this summary

Key points from the Center

  • The U.S. Department of Justice announced criminal charges and asset seizures against a North Korean scheme to fund its weapons program through fraudulently obtained remote IT jobs with U.S. companies from 2021 to 2024.
  • Prosecutors claimed that thousands of North Korean IT specialists disguised as U.S. or third-country nationals obtained remote work assignments with U.S. businesses during this period.
  • The salaries from these fraudulent jobs were funneled through U.S.-based intermediaries into accounts controlled by North Korean agents, supporting the regime.
  • Leah B. Foley stated that the threat from North Korean operatives is real and immediate, and emphasized the DOJ's commitment to protect U.S. businesses.

Report an issue with this summary

Key points from the Right

  • Federal authorities indicted Zhenxing Wang for allegedly helping North Korean remote IT workers gain jobs with U.S. companies, generating over $5 million in revenue.
  • The North Korean scheme involved compromising the identities of over 80 people in the U.S. to obtain remote jobs, causing victims at least $3 million in damages.
  • The FBI seized 137 laptops, 17 web domains and multiple financial accounts linked to the scheme, as stated by the Department of Justice.
  • Federal authorities revealed schemes involving North Korean actors that used remote IT work for U.S. companies to fund the regime, resulting in financial seizures and an arrest.

Report an issue with this summary

Other (sources without bias rating):

Powered by Ground News™