The Hoover HF3 DynamicClean is a feather-light budget cordless stick vacuum that gets the basics right
Two New Jersey men were sentenced Wednesday for facilitating North Koreaβs long-running scheme to plant operatives inside U.S. businesses as employees, generating more than $5 million in illicit revenue for the regime, the Justice Department said.Β
The U.S. nationals β Kejia Wang, also known as Tony Wang, and Zhenxing Wang, also known as Danny Wang β were part of a years-long conspiracy that placed operatives in jobs at more than 100 U.S. companies, including many Fortune 500 companies, based in 27 states and the District of Columbia.
The elaborate scheme involved shell companies posing as software development firms, money laundering, and espionage with national security implications. Operatives involved in the conspiracy stole sensitive files from a California-based defense contractor related to U.S. military technology controlled under International Traffic in Arms Regulations (ITAR), officials said.
βDemocratic Peopleβs Republic of Korea (DPRK) IT workers are not limited to revenue generation. When tasked, they can operationalize their placement and access to support strategic intelligence requirements, including intellectual property theft, network disruption or extortion,β Michael Barnhart, nation state investigator at DTEX, told CyberScoop.
While most of North Koreaβs scheme is focused on revenue, it sometimes applies a dual-use approach, tasking certain privileged IT workers with malicious activity aiding other state-backed hacking groups, Barnhart added.
βNot all IT workers can be hackers but every North Korean hacker can or has been an IT worker,β he said. βThis distinction matters for insiderβthreat analysis because unlike typical fraudulent hires motivated by personal financial gain, IT workers can inflict nationalβsecurityβlevel damage.β
Kejia Wang, 42, Zhenzing Wang, 39, and their co-conspirators stole the identities of at least 80 U.S. residents to facilitate the hiring of North Korean operatives and collected at least $696,000 in fees combined, officials said. U.S. victim companies also incurred legal fees, remediation costs and other damages and losses exceeding $3 million.Β
Both men previously pleaded guilty to an assortment of crimes. Kejia Wang was sentenced to nine years in prison for conspiracy to commit wire and mail fraud, money laundering and identity theft. Zhenxing Wang was sentenced to 92 months in prison for conspiracy to commit wire and mail fraud and money laundering.Β
The pair were also ordered to forfeit a combined $600,000, of which two-thirds has already been paid, officials said.
The conspiracy, which ran from at least 2021 through October 2024, relied in part on shell companies β Hopana Tech, Tony WKJ and Independent Lab β the men set up to create the appearance of legitimate businesses.Β
βPairing a U.S. person, a U.S. address, and a front company such as Independent Lab, the facilitators created the illusion of a legitimate domestic effort allowing the IT workers to present themselves as U.S.-based without triggering suspicion during onboarding or daily workflows,β Barnhart said.Β
βFront companies can act as that middle financial flow from victim companies back to DPRK units, which then pushes funds upward through the Workersβ Party of Korea to support whichever program the unit was aligned with, whether weapons development or domestic priorities,β he added.Β
These front companies reflect a higher level of tradecraft that exploits a weak spot in insider risk assessments because threats arenβt always a malicious person trying to break into a network, Barnhart said. βSometimes it looks like an entire company appearing clean on paper.β
Authorities have responded to North Koreaβs scheme by targeting U.S.-based facilitators who provide forged or stolen identities and laptop farms for North Korean operatives, and seizing cryptocurrency linked to theft.Β
Law enforcement wins are stacking up, but researchers warn that North Koreaβs operation is massive and consistently evolving.Β
The sentencing of Kejia Wang and Zhenxing Wang comes less than a month after a trio of American men were sentenced for similar crimes, including the operation of laptop farms, wire fraud and identity theft.Β
The Justice and Treasury Departments have also issued indictments and sanctioned people and entities allegedly involved in North Koreaβs effort to send thousands of specialized technical professionals outside of the country to secure jobs under false pretenses and funnel their wages back to Pyongyang.
You can read the full indictments against Kejia Wang and Zhenxing Wang below.
The post US nationals sentenced for aiding North Koreaβs tech worker scheme appeared first on CyberScoop.
The vulnerability allows hackers to upload arbitrary files to a siteβs server and achieve remote code execution.
The post Hackers Targeting Ninja Forms Vulnerability That Exposes WordPress Sites to Takeover appeared first on SecurityWeek.
Cybercrime remains a booming business.Β
Annual cybercrime losses amounted to almost $20.9 billion last year, reflecting a 26% increase from 2024, the FBIβs Internet Crime Complaint Center (IC3) said in its annual report Tuesday.
The comprehensive study exposes a worsening digital crime environment that is driving financial losses, with momentum moving in the wrong direction and compounding at an alarming rate. Annual cybercrime losses have jumped almost 400% from $4.2 billion in 2020, and cumulative losses in that five-year period surpassed $71.3 billion.
The FBIβs IC3, which formed as the countryβs central hub for cybercrime reporting in 2000, is busier than ever. βWe now average almost 3,000 complaints per day,β Jose Perez, the FBIβs operations director for its criminal and cyber branch, wrote in the report.Β
The annual internet crime report highlights growing and sustaining trends. Yet, the scope of the study is limited and relies entirely on cybercrime incidents submitted to the FBI.Β
The full impact of cybercrime remains murky, as an unknown number of victims suffer in the shadows and never report the crimes they endure.
The FBI received more than 1 million complaints last year, with victims aged over 60 reporting the largest amount of crimes that also resulted in the greatest amount of total losses by age group. Victims at least 60 years old filed 201,000 complaints with losses totaling nearly $7.75 billion, or about 37% of all cybercrime-related losses last year.
Investment-related fraud remained the largest component of cybercrime losses in 2025, reaching almost $8.65 billion. Business email compromise took the No. 2 spot with almost $3.05 billion in losses, followed by tech support scams at more than $2.1 billion.Β
Cryptocurrency was the primary conduit for fraud linked to investment and tech support scams last year, while wire transfers composed the bulk of fraud resulting from business email compromise, according to the report.
Phishing was the most commonly reported type of cybercrime last year, followed by extortion, investment scams and personal data breaches. The FBI tallied losses amounting to $122.5 million from extortion and $32.3 million from ransomware last year.
The FBI also received more than 75,000 reports of sextortion last year, including more than 5,700 submissions that were referred to the National Center for Missing and Exploited Children.
The top five cyber threats reported to IC3 in 2025 included data breaches at 39%, ransomware at 36%, SIM swapping at 10%, malware at 9% and botnets at 7%.Β
The FBI received more than 3,600 complaints reporting ransomware last year. The five most reported variants included Akira, Qilin, INC, BianLian and Play.
Each of the 16 critical infrastructure sectors reported ransomware attacks last year, and the most heavily targeted included health care, manufacturing, financial services, government and IT.
The IC3 primarily receives complaints from U.S. residents and businesses, but it also received complaints from more than 200 countries last year, which accounted for nearly $1.6 billion in total losses.Β
While losses and the sheer amount of cybercrime continued to climb last year, βthe FBI continues to disrupt and deter malicious cyber actors β and shift the cost from victims to our adversaries,β Perez wrote in the report.
βIt has never been more important to be diligent with your cybersecurity, social media footprint, and electronic interactions,β he added. βCyber threats and cyber-enabled crime will continue to evolve as the world embraces emerging technologies such as artificial intelligence.β
The post Cybercrime losses jumped 26% to $20.9 billion in 2025 appeared first on CyberScoop.
The state-sponsored threat actor deployed kernel implants and passive backdoors enabling long-term, high-level espionage.
The post Chinese Hackers Caught Deep Within Telecom Backbone Infrastructure appeared first on SecurityWeek.