{"id":751,"date":"2025-07-01T16:33:34","date_gmt":"2025-07-01T16:33:34","guid":{"rendered":"https:\/\/chaotic-bits.com\/?p=751"},"modified":"2025-07-01T16:40:26","modified_gmt":"2025-07-01T16:40:26","slug":"u-s-arrests-facilitator-in-north-korean-it-worker-scheme-seizes-29-domains-and-raids-21-laptop-farms","status":"publish","type":"post","link":"https:\/\/chaotic-bits.com\/index.php\/2025\/07\/01\/u-s-arrests-facilitator-in-north-korean-it-worker-scheme-seizes-29-domains-and-raids-21-laptop-farms\/","title":{"rendered":"U.S. Arrests Facilitator in North Korean IT Worker Scheme; Seizes 29 Domains and Raids 21 Laptop Farms"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"751\" class=\"elementor elementor-751\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6f1f0f1 elementor-section-full_width elementor-section-height-min-height elementor-section-height-default elementor-section-items-middle wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"6f1f0f1\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bb9d7c9\" data-id=\"bb9d7c9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4083980 elementor-widget elementor-widget-post-info\" data-id=\"4083980\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-53ece0a\" itemprop=\"datePublished\">\n\t\t\t\t\t\t<a href=\"https:\/\/chaotic-bits.com\/index.php\/2025\/07\/01\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>julio 1, 2025<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-deec4d9 elementor-widget elementor-widget-image\" data-id=\"deec4d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/chaotic-bits.com\/wp-content\/uploads\/2025\/01\/curso-online-ciberseguridad-empresas-1024x576.jpg\" class=\"attachment-large size-large wp-image-172\" alt=\"\" srcset=\"https:\/\/chaotic-bits.com\/wp-content\/uploads\/2025\/01\/curso-online-ciberseguridad-empresas-1024x576.jpg 1024w, https:\/\/chaotic-bits.com\/wp-content\/uploads\/2025\/01\/curso-online-ciberseguridad-empresas-300x169.jpg 300w, https:\/\/chaotic-bits.com\/wp-content\/uploads\/2025\/01\/curso-online-ciberseguridad-empresas-768x432.jpg 768w, https:\/\/chaotic-bits.com\/wp-content\/uploads\/2025\/01\/curso-online-ciberseguridad-empresas-1536x864.jpg 1536w, https:\/\/chaotic-bits.com\/wp-content\/uploads\/2025\/01\/curso-online-ciberseguridad-empresas.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d9ac88 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"9d9ac88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">U.S. Arrests Facilitator in North Korean IT Worker Scheme; Seizes 29 Domains and Raids 21 Laptop Farms<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b532689 elementor-widget elementor-widget-text-editor\" data-id=\"2b532689\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"101\" data-end=\"267\">The U.S. Department of Justice (DoJ) has taken major action against a scheme involving North Korean IT workers infiltrating U.S. companies. The operation resulted in:<\/p>\n<ul data-start=\"269\" data-end=\"412\">\n<li data-start=\"269\" data-end=\"288\">\n<p data-start=\"271\" data-end=\"288\"><strong data-start=\"271\" data-end=\"285\">One arrest<\/strong>,<\/p>\n<\/li>\n<li data-start=\"289\" data-end=\"326\">\n<p data-start=\"291\" data-end=\"326\"><strong data-start=\"291\" data-end=\"323\">29 financial accounts seized<\/strong>,<\/p>\n<\/li>\n<li data-start=\"327\" data-end=\"372\">\n<p data-start=\"329\" data-end=\"372\"><strong data-start=\"329\" data-end=\"365\">21 fraudulent websites shut down<\/strong>, and<\/p>\n<\/li>\n<li data-start=\"373\" data-end=\"412\">\n<p data-start=\"375\" data-end=\"412\"><strong data-start=\"375\" data-end=\"411\">Nearly 200 computers confiscated<\/strong>.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"414\" data-end=\"607\">Between June 10\u201317, 2025, authorities searched 21 \u201claptop farms\u201d across 14 states. These facilities enabled North Korean IT workers to remotely access company systems using U.S.-issued laptops.<\/p>\n<p data-start=\"609\" data-end=\"791\">With help from collaborators in the U.S., China, the UAE, and Taiwan, the North Koreans secured jobs at over 100 U.S. companies using stolen or fake identities. This allowed them to:<\/p>\n<ul data-start=\"793\" data-end=\"1013\">\n<li data-start=\"793\" data-end=\"825\">\n<p data-start=\"795\" data-end=\"825\">Receive legitimate salaries,<\/p>\n<\/li>\n<li data-start=\"826\" data-end=\"890\">\n<p data-start=\"828\" data-end=\"890\">Access sensitive information (including U.S. military tech),<\/p>\n<\/li>\n<li data-start=\"891\" data-end=\"1013\">\n<p data-start=\"893\" data-end=\"1013\">And in some cases, <strong data-start=\"912\" data-end=\"953\">steal large amounts of cryptocurrency<\/strong>, like the $900,000 taken from a blockchain firm in Atlanta.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1015\" data-end=\"1304\">The main suspect, <strong data-start=\"1033\" data-end=\"1058\">Zhenxing \u00abDanny\u00bb Wang<\/strong> of New Jersey, is accused of earning over <strong data-start=\"1101\" data-end=\"1115\">$5 million<\/strong> by facilitating this fraud. He and others created fake companies to route payments and used remote access tools (KVM switches) to let North Korean workers control U.S. laptops from abroad.<\/p>\n<p data-start=\"1306\" data-end=\"1497\">Additionally, four North Korean nationals were charged with wire fraud and money laundering after stealing crypto assets and laundering them through <strong data-start=\"1455\" data-end=\"1471\">Tornado Cash<\/strong> using fake Malaysian IDs.<\/p>\n<p data-start=\"1499\" data-end=\"1702\">The DoJ warns that beyond revenue, these operations pose <strong data-start=\"1556\" data-end=\"1594\">a serious national security threat<\/strong>, as insiders can steal data, extort employers, and bypass sanctions to fund North Korea\u2019s weapons programs.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05c63b8 elementor-widget elementor-widget-wpr-post-navigation\" data-id=\"05c63b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-post-navigation.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"wpr-post-navigation-wrap elementor-clearfix wpr-post-nav-static-wrap\"><div class=\"wpr-post-nav-prev wpr-post-navigation wpr-post-nav-static\"><\/div><div class=\"wpr-post-nav-next wpr-post-navigation wpr-post-nav-static\"><a href=\"https:\/\/chaotic-bits.com\/index.php\/2025\/07\/01\/el-departamento-de-justicia-de-ee-uu-doj-realizo-una-gran-operacion-contra-un-esquema-de-trabajadores-de-tecnologia-de-la-informacion-ti-de-corea-del-nortenota-1\/\" class=\"elementor-clearfix\"><div class=\"wpr-post-nav-labels\"><span>Siguiente<\/span><\/div><div class=\"wpr-posts-navigation-svg-wrapper\"><svg style=\"transform: rotate(180deg); -webkit-transform: rotate(180deg);\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\" viewBox=\"0 0 303.3 512\" style=\"enable-background:new 0 0 303.3 512;\" xml:space=\"preserve\"><g><polygon class=\"st0\" points=\"94.7,256 303.3,464.6 256,512 47.3,303.4 0,256 47.3,208.6 256,0 303.3,47.4 \"\/><\/g><\/svg><\/div><\/a><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The U.S. Department of Justice (DoJ) has taken major action against a scheme involving North Korean IT workers infiltrating U.S. companies. The operation resulted in: One arrest, 29 financial accounts seized, 21 fraudulent websites shut down, and Nearly 200 computers confiscated. Between June 10\u201317, 2025, authorities searched 21 \u201claptop farms\u201d across 14 states. These facilities enabled North Korean IT workers to remotely access company systems using U.S.-issued laptops. With help from collaborators in the U.S., China, the UAE, and Taiwan, the North Koreans secured jobs at over 100 U.S. companies using stolen or fake identities. This allowed them to: Receive legitimate salaries, Access sensitive information (including U.S. military tech), And in some cases, steal large amounts of cryptocurrency, like the $900,000 taken from a blockchain firm in Atlanta. The main suspect, Zhenxing \u00abDanny\u00bb Wang of New Jersey, is accused of earning over $5 million by facilitating this fraud. He and others created fake companies to route payments and used remote access tools (KVM switches) to let North Korean workers control U.S. laptops from abroad. Additionally, four North Korean nationals were charged with wire fraud and money laundering after stealing crypto assets and laundering them through Tornado Cash using fake Malaysian IDs. The DoJ warns that beyond revenue, these operations pose a serious national security threat, as insiders can steal data, extort employers, and bypass sanctions to fund North Korea\u2019s weapons programs. Anterior<\/p>\n","protected":false},"author":1,"featured_media":172,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[5],"tags":[],"class_list":["post-751","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ingles"],"_links":{"self":[{"href":"https:\/\/chaotic-bits.com\/index.php\/wp-json\/wp\/v2\/posts\/751","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chaotic-bits.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/chaotic-bits.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/chaotic-bits.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/chaotic-bits.com\/index.php\/wp-json\/wp\/v2\/comments?post=751"}],"version-history":[{"count":5,"href":"https:\/\/chaotic-bits.com\/index.php\/wp-json\/wp\/v2\/posts\/751\/revisions"}],"predecessor-version":[{"id":756,"href":"https:\/\/chaotic-bits.com\/index.php\/wp-json\/wp\/v2\/posts\/751\/revisions\/756"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/chaotic-bits.com\/index.php\/wp-json\/wp\/v2\/media\/172"}],"wp:attachment":[{"href":"https:\/\/chaotic-bits.com\/index.php\/wp-json\/wp\/v2\/media?parent=751"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/chaotic-bits.com\/index.php\/wp-json\/wp\/v2\/categories?post=751"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/chaotic-bits.com\/index.php\/wp-json\/wp\/v2\/tags?post=751"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}