
US DOJ announces arrest, indictments in North Korean IT worker scheme, World News
The North Korean workers used compromised identities of more than 80 US citizens to obtain remote jobs at more than 100 US companies and caused more than US$3 million (S$3.8 million) in legal fees, remediation and other costs, according to the DOJ.
The North Koreans also allegedly stole at least US$900,000 worth of cryptocurrency from one Georgia-based company with their access, along with employer data and source code, including International Traffic in Arms Regulations (ITAR) data, from a California-based defence contractor, the DOJ said.
Monday's announcement included one arrest, two indictments, searches of more than two dozen US locations hosting multiple laptops used by remote North Korean workers, and the seizure of financial accounts and websites used by the participants as part of the alleged scheme, according to a DOJ statement.
The Permanent Mission of North Korea to the United Nations did not immediately respond to a request for comment.
Zhenxing "Danny" Wang and Kejia Wang, both US citizens, were indicted as part of the operation, according to the DOJ. Zhenxing Wang was arrested in New Jersey, while Kejia Wang remains free, a DOJ spokesperson said in an email. An attorney for Zhenxing Wang could not be immediately located.
The two men, along with four other unnamed US "facilitators," assisted the North Koreans by procuring and operating laptops used by the overseas workers, created financial accounts to receive money earned by the workers to be sent back to North Korea, and created shell companies to make the workers appear more authentic, according to the DOJ, earning nearly US$700,000 from the scheme for themselves.
Federal prosecutors also indicted four Chinese nationals and two Taiwanese nationals for alleged roles in the operation.
[[nid:693655]]
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles

Straits Times
11 hours ago
- Straits Times
US Christian televangelist Jimmy Swaggart dies aged 90
Sign up now: Get ST's newsletters delivered to your inbox Televangelist Jimmy Swaggart was known worldwide for his fiery Christian sermons. WASHINGTON - US televangelist Jimmy Swaggart, who developed a worldwide following for his fiery Christian sermons before being felled in a prostitution scandal, died on July 1 at the age of 90. Mr Swaggart's death from a heart attack at a hospital in Baton Rouge, Louisiana, was announced on the official Facebook page of his Jimmy Swaggart Ministries. 'Brother Swaggart has finished his earthly race and entered into the presence of His Savior, Jesus Christ,' it said. 'For over seven decades, Brother Swaggart poured out his life preaching the gospel, singing songs of the faith, and pointing millions to the saving power of Jesus Christ,' it added. Mr Swaggart, whose first cousins were rock and roll legend Jerry Lee Lewis and country singer Mickey Gilley, rose to prominence in the 1980s at the head of his Louisiana-based Pentecostal church the Assemblies of God. His televised sermons featuring fire and brimstone rhetoric and gospel music were watched by millions around the world and raised hundreds of millions of dollars in donations annually. At his height, Mr Swaggart joined the ranks of other leading Christian televangelists such as Oral Roberts, Pat Robertson, Jerry Falwell, and Jim Bakker, who was also disgraced in a sex scandal. Top stories Swipe. Select. Stay informed. Singapore Seniors can claim $800 SG60 vouchers from July 1; adults to get $600 in vouchers from July 22 Singapore NSman, 30, dies in hospital after collapsing outside Maju Camp Asia Thai PM's suspension could spell end of Shinawatra clan's era of political dominance Singapore Judge rejects woman's claim that she owns 99% of Bukit Timah condo mostly paid for by ex-boyfriend Singapore 'He fought till the end': Man who survived acid attack as a baby dies of cancer at 26 Singapore Trial opens for 3 women who allegedly organised procession outside Istana Business Do not overcommit to a single solution in a multi-polar world, says ex-foreign minister George Yeo Singapore 1MDB saga: Standard Chartered Bank disputes $3.4 billion claim by liquidators in Singapore Mr Swaggart's downfall came in 1987 after he was photographed at a motel in New Orleans with a prostitute. He made a tearful televised confession the next year. 'I have sinned against you, my Lord,' Mr Swaggart said, without providing details. 'I beg you forgive me.' Mr Swaggart was defrocked by the elders of his church, and while he continued to preach over the next decades his following and his influence had diminished. AFP


AsiaOne
a day ago
- AsiaOne
Iran-linked hackers threaten to release Trump aides' emails, World News
WASHINGTON — Iran-linked hackers have threatened to disclose more emails stolen from US President Donald Trump's circle, after distributing a prior batch to the media ahead of the 2024 US election. In online chats with Reuters on Sunday (June 29) and Monday, the hackers, who go by the pseudonym Robert, said they had roughly 100 gigabytes of emails from the accounts of White House Chief of Staff Susie Wiles, Trump lawyer Lindsey Halligan, Trump adviser Roger Stone and porn star-turned-Trump antagonist Stormy Daniels. Robert raised the possibility of selling the material but otherwise did not provide details of their plans. The hackers did not describe the content of the emails. US Attorney General Pam Bondi described the intrusion as "an unconscionable cyber-attack". The White House and the FBI responded with a statement from FBI Director Kash Patel, who said: "Anyone associated with any kind of breach of national security will be fully investigated and prosecuted to the fullest extent of the law." Halligan, Stone, a representative for Daniels and the US cyberdefence agency CISA did not respond to requests for comment. Iran's mission to the United Nations did not return a message seeking comment. Tehran has in the past denied committing cyberespionage. Robert materialized in the final months of the 2024 presidential campaign, when they claimed to have breached the email accounts of several Trump allies, including Wiles. The hackers then distributed emails to journalists. Reuters previously authenticated some of the leaked material, including an email that appeared to document a financial arrangement between Trump and lawyers representing former presidential candidate Robert F. Kennedy Jr. — now Trump's health secretary. Other material included Trump campaign communication about Republican office-seekers and discussion of settlement negotiations with Daniels. Although the leaked documents did garner some coverage last year, they did not fundamentally alter the presidential race, which Trump won. The US Justice Department in a September 2024 indictment alleged that Iran's Revolutionary Guards ran the Robert hacking operation. In conversations with Reuters, the hackers declined to address the allegation. After Trump's election, Robert told Reuters that no more leaks were planned. As recently as May, the hackers told Reuters, "I am retired, man." But the group resumed communication after this month's 12-day air war between Israel and Iran, which was capped by US bombing of Iran's nuclear sites. In messages this week, Robert said they were organising a sale of stolen emails and wanted Reuters to "broadcast this matter". American Enterprise Institute scholar Frederick Kagan, who has written about Iranian cyberespionage, said Tehran suffered serious damage in the conflict and its spies were likely trying to retaliate in ways that did not draw more US or Israeli action. "A default explanation is that everyone's been ordered to use all the asymmetric stuff that they can that's not likely to trigger a resumption of major Israeli/US military activity," he said. "Leaking a bunch more emails is not likely to do that." Despite worries that Tehran could unleash digital havoc, Iran's hackers took a low profile during the conflict. US cyber officials warned on Monday that American companies and critical infrastructure operators might still be in Tehran's crosshairs. [[nid:707007]]


AsiaOne
a day ago
- AsiaOne
US DOJ announces arrest, indictments in North Korean IT worker scheme, World News
The US Department of Justice and FBI on Monday (June 30) announced an arrest and indictments targeting North Korea's so-called "IT worker" programme, where North Koreans obtain remote IT-related positions at more than 100 US companies, and use that access to steal money and information from a host of companies around the world. The North Korean workers used compromised identities of more than 80 US citizens to obtain remote jobs at more than 100 US companies and caused more than US$3 million (S$3.8 million) in legal fees, remediation and other costs, according to the DOJ. The North Koreans also allegedly stole at least US$900,000 worth of cryptocurrency from one Georgia-based company with their access, along with employer data and source code, including International Traffic in Arms Regulations (ITAR) data, from a California-based defence contractor, the DOJ said. Monday's announcement included one arrest, two indictments, searches of more than two dozen US locations hosting multiple laptops used by remote North Korean workers, and the seizure of financial accounts and websites used by the participants as part of the alleged scheme, according to a DOJ statement. The Permanent Mission of North Korea to the United Nations did not immediately respond to a request for comment. Zhenxing "Danny" Wang and Kejia Wang, both US citizens, were indicted as part of the operation, according to the DOJ. Zhenxing Wang was arrested in New Jersey, while Kejia Wang remains free, a DOJ spokesperson said in an email. An attorney for Zhenxing Wang could not be immediately located. The two men, along with four other unnamed US "facilitators," assisted the North Koreans by procuring and operating laptops used by the overseas workers, created financial accounts to receive money earned by the workers to be sent back to North Korea, and created shell companies to make the workers appear more authentic, according to the DOJ, earning nearly US$700,000 from the scheme for themselves. Federal prosecutors also indicted four Chinese nationals and two Taiwanese nationals for alleged roles in the operation. [[nid:693655]]