Connect with us

CyberSecurity

Two Americans Sentenced for Helping North Korea Steal $5 Million in Fake IT Worker Scheme

Published

on

Two Americans Sentenced for Running Laptop Farms in North Korea’s $5 Million IT Worker Fraud

The North Korea fake IT worker scheme has resulted in significant prison sentences for two U.S. citizens who helped the isolated regime steal millions from American companies. On Wednesday, the U.S. Department of Justice announced that Kejia Wang and Zhenxing Wang, both residents of New Jersey, were sentenced to seven and a half years and nine years in prison, respectively.

These individuals played a critical role in enabling North Korean operatives to pose as remote IT employees for American firms. Their actions not only funneled money to Pyongyang but also exposed sensitive corporate data to foreign adversaries.

How the Laptop Farm Operation Worked

Between 2021 and 2024, the two men managed so-called “laptop farms” inside the United States. Kejia Wang oversaw a network of hundreds of computers, while Zhenxing Wang hosted laptops at his own home. This infrastructure allowed North Korean IT workers to connect remotely and appear as if they were living and working within the country.

In addition, the pair created shell companies with financial accounts linked to fake identities. These accounts received payments from unwitting U.S. employers, which were then transferred overseas. The scheme netted North Korea approximately $5 million, with the facilitators themselves receiving nearly $700,000 for their roles.

Identity Theft and National Security Risks

The North Korea fake IT worker scheme involved stealing the identities of more than 80 Americans. According to the DOJ, these fake workers secured jobs at over 100 U.S. corporations, including several Fortune 500 companies. Beyond collecting salaries, the operatives sometimes stole trade secrets and source code.

In one alarming case, the fake IT workers accessed data under export control from an unnamed California-based AI company. John A. Eisenberg, the DOJ’s assistant attorney general for National Security, stated: “The ruse placed North Korean IT workers on the payrolls of unwitting U.S. companies and in U.S. computer systems, thereby harming our national security.”

Rewards for Information

To combat similar threats, the U.S. government announced rewards of up to $5 million for information that could help counter these schemes. This includes data on nine individuals who allegedly collaborated with Kejia Wang and Zhenxing Wang. The DOJ encourages anyone with knowledge of such operations to come forward.

Broader Context of North Korean Cyber Crime

This sentencing is the latest legal action against a wide-ranging campaign by North Korea to infiltrate Western companies. Alongside major crypto thefts exceeding $2 billion last year alone, the regime uses such fraud to fund its weapons programs and bypass heavy international sanctions.

Companies and recruiters have developed creative countermeasures. For instance, some interviewers ask suspected North Korean applicants to insult Kim Jong Un—an act that is illegal in the country. In a recent viral video, a job applicant fumbled and eventually hung up when asked to say the leader is a “fat ugly pig.”

For more insights on cybersecurity threats, check out our guide on protecting your business from remote worker fraud. Additionally, learn about how North Korea uses cyber operations to evade sanctions.

What This Means for U.S. Companies

Businesses must remain vigilant when hiring remote IT workers. The North Korea fake IT worker scheme demonstrates how sophisticated these operations can be. Verifying identities through video calls, checking for inconsistencies in resumes, and using background screening services are essential steps.

Furthermore, companies should monitor for unusual network activity or attempts to access sensitive data without authorization. The DOJ’s action sends a clear message: facilitators of such schemes will face severe consequences.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

CyberSecurity

Page Not Found on Infosecurity Magazine? Here’s How to Get Back on Track

Published

on

Page Not Found on Infosecurity Magazine? Here’s How to Get Back on Track

Encountering an Infosecurity Magazine 404 error can be frustrating, especially when you’re in the middle of researching critical cybersecurity topics. This common issue means the page you requested has moved, been updated, or no longer exists. But don’t worry—there are simple steps you can take to locate the information you need.

Why Does an Infosecurity Magazine 404 Error Happen?

Websites frequently reorganize content, and Infosecurity Magazine is no exception. Articles may be archived under new URLs, or old links might break during site updates. This is a standard part of maintaining a large publication. However, you don’t have to hit a dead end.

Common Causes of Broken Links

Broken links can stem from outdated bookmarks, shared links from social media, or even mistyped URLs. The site’s structure evolves over time, so what worked yesterday might not work today. Recognizing this helps you take the right action.

Quick Fixes for the 404 Page Not Found

First, try the homepage. Return to the main site and use the navigation menu to browse recent articles. Most security publications feature their latest content prominently. Alternatively, use the site search bar—type a few keywords from the missing page’s topic. For example, if you were reading about ransomware, search “ransomware 2024 trends” to find related pieces.

Another effective method is to check the site map or category pages. Infosecurity Magazine organizes content by topics like cloud security, threat intelligence, and compliance. Browsing these sections often leads you to the article you need or similar valuable resources.

Contacting Support for Persistent Issues

If the above steps fail, contact the editorial team. Most reputable sites have a “Contact Us” page or a support email. Describe the broken link and the page you were looking for. The team can verify if the content was removed or moved, and they may provide the correct URL. This also helps them fix the issue for other readers.

Building on this, consider bookmarking key pages once you find them. Use your browser’s bookmark manager or a tool like Evernote to save important cybersecurity articles. This reduces future reliance on external links.

Preventing Future 404 Errors

To minimize disruptions, always verify links before sharing them. Use URL shorteners with care, as they can expire. For internal navigation, rely on the site’s own search and category features rather than saved links. Additionally, subscribe to the magazine’s newsletter—new content is delivered directly to your inbox, bypassing broken links altogether.

In conclusion, an Infosecurity Magazine 404 error is a minor hurdle, not a dead end. By using the homepage, search, and contact options, you can quickly recover the content you need. For more tips on navigating cybersecurity resources, check out our guide on effective online research for security professionals or how to manage bookmarks for tech sites.

Continue Reading

CyberSecurity

Bluesky Experiences Service Disruption: What Users Need to Know

Published

on

Bluesky Experiences Service Disruption: What Users Need to Know

If you’ve been struggling to access Bluesky today, you’re not alone. The social network is currently grappling with a significant service disruption that has left many users unable to load feeds, view profiles, or post updates. According to Bluesky’s COO, Rose Wang, the root cause is a denial-of-service attack targeting the platform.

What Caused the Bluesky Service Disruption?

The issues first surfaced around 2:42 a.m. ET on Thursday, as noted on the platform’s official status page. Bluesky’s infrastructure has been under heavy strain ever since, with intermittent outages and slow load times persisting into the afternoon. Wang confirmed that the disruption stems from a coordinated denial-of-service attack, though the company has not yet provided a timeline for full recovery.

Impact on User Experience

Users are encountering a range of errors. Switching to popular feeds like Discover or the official Bluesky Team feed often triggers a message stating, “This feed is currently receiving high traffic and is temporarily unavailable. Please try again later. Message from server: Rate Limit Exceeded.” Personal feeds may still load, but attempting to visit user profiles frequently results in error messages, forcing repeated refreshes.

Bluesky protocol engineer Bryan Newbold acknowledged the severity around 3:46 a.m. ET, posting, “oof, our services are getting pretty hard tonight.” The company has directed users to status.bsky.app and the @status.bsky.app account for updates but has not commented on the attack’s specifics or an estimated time for resolution.

Are Other Decentralized Networks Affected?

Interestingly, the Bluesky service disruption has not spread to other communities running their own infrastructure on the underlying AT Protocol. These independent servers appear to be functioning normally, highlighting the resilience of decentralized architecture even when one major node faces trouble.

This separation is a key advantage of decentralized social networks. While Bluesky’s main servers are under fire, users on self-hosted instances can still communicate and share content without interruption. For those interested in exploring alternatives, setting up your own instance might be a worthwhile consideration during such outages.

Current Status and What’s Next

As of Thursday afternoon, Bluesky’s status page still reads: “investigating an incident with service in one of our reginos” (a typo in the original). The company has not yet resolved the issue, and users should expect continued instability until further notice.

For real-time updates, monitoring the status page is your best bet. In the meantime, consider checking tips for coping with social network downtime to stay connected while Bluesky works on a fix.

This incident serves as a reminder that even modern, decentralized platforms are not immune to attacks. However, the underlying protocol’s design ensures that the broader ecosystem remains operational, offering a silver lining in an otherwise frustrating day for Bluesky users.

Continue Reading

CyberSecurity

Page Not Found: What to Do When You Hit a 404 Error on Infosecurity Magazine

Published

on

Page Not Found: What to Do When You Hit a 404 Error on Infosecurity Magazine

Did you just land on a Page Not Found message while browsing Infosecurity Magazine? Don’t worry—this is a common hiccup on many websites, including ours. A 404 error simply means the specific page you requested cannot be located on our server. The page may have been moved to a new URL, updated with fresh content, or removed entirely. Whatever the reason, you have several straightforward options to get back on track.

Why Does a Page Not Found Error Happen?

There are a few typical causes for a Page Not Found error. First, the URL might be mistyped or contain a broken link. Second, the page could have been restructured during a site redesign, and the old link no longer works. Third, the content may have been archived or deleted. In rare cases, a temporary server glitch triggers the error. Regardless, the solution is usually quick and simple.

Check the URL and Try Again

Start by double-checking the web address in your browser’s address bar. Look for typos, extra characters, or missing slashes. Correct any mistakes and reload the page. This often resolves the issue instantly.

How to Find What You Need After a 404 Error

If the URL is correct but the page still doesn’t load, your next step is to use the site’s navigation tools. Return to the homepage to browse our latest articles on cybersecurity, data breaches, and industry insights. Alternatively, use the site search function—located at the top of every page—to locate the content by keyword or topic. For example, searching for “ransomware” or “phishing” will bring up relevant posts.

Another effective approach is to explore our top stories section for trending news. Many articles are also listed in our archive, organized by date and category. This way, you can discover similar content even if the original page is gone.

Contact Our Team for Assistance

When all else fails, we’re here to help. If you believe the Page Not Found error is a mistake—for instance, if a link from another site or our own newsletter led you here—please contact our support team. Provide the URL you tried to access, and we’ll investigate promptly. Our team monitors these reports regularly to improve the user experience.

Preventing Future 404 Errors

To minimize disruptions, we recommend bookmarking our homepage and subscribing to our newsletter for direct links to new articles. Additionally, keep your browser updated to avoid compatibility issues. For publishers and webmasters, using 301 redirects for moved pages is a best practice that we follow, but occasional errors can still slip through.

In conclusion, a Page Not Found message on Infosecurity Magazine is nothing to panic about. With a quick URL check, site search, or a message to our team, you’ll be back to reading top cybersecurity news in no time. Remember, we’re continuously improving our site to make your visit seamless.

Continue Reading

Trending