In an era where remote work has become commonplace, cybercrime has also adapted its game. Recently, the US government launched a "massive crackdown operation" to counter a North Korean IT worker scheme that embedded itself within American companies, carrying out clandestine activities that threaten national security.
"Laptop Farms": The State Hackers' Hiding Mechanism

This group, identified as Sarcoma, is not new. They've been actively operating since late 2024, employing sophisticated and alarming strategies. At the core of their plan are "Laptop Farms," physical locations in the US housing computers. These computers are connected to North Korean IT workers via remote control devices like PiKVM or TinyPilot.
These North Korean IT workers would use fake or stolen identities from US citizens to deceive companies into believing they were working from within the country. They'd apply for jobs in US companies, especially in the tech sector, creating fake profiles on LinkedIn, GitHub, and other recruitment platforms. They even leveraged Artificial Intelligence (AI) to enhance images and alter voices, making their job profiles incredibly convincing. This level of deception allowed them to infiltrate leading organizations, including Fortune 500 companies.
From Top Employees to Hackers
The role of these IT workers wasn't just typical job duties; it was an infiltration to steal critical data. This past June 2025, the US Department of Justice (DOJ) and the FBI raided over 21 suspected locations across 14 states, seizing nearly 200 computers, 29 financial accounts, and 21 fraudulent websites. The operation also led to the arrest of collaborators in the US, China, Taiwan, and four North Koreans involved in data and cryptocurrency theft.
One key suspect is Zhenxing “Danny” Wang, who is accused of managing over 80 fake identities for North Korean IT workers, enabling them to secure jobs at over 100 American companies and generating more than $5 million in revenue for the Pyongyang regime over several years.
Microsoft and Experts State: "This is an Epidemic"
Tech giant Microsoft has been tracking this group's activities under the moniker Jasper Sleet (formerly Storm-0287) since 2020, and has already suspended over 3,000 associated user accounts. John Hultquist, Principal Analyst at Google Threat Intelligence Group, put it bluntly: "There are very few major companies in the US that haven’t been touched by this scam at this point. It’s an epidemic."
How Should Organizations Respond to This Silent Threat?
This incident underscores that seemingly convenient remote work can become a significant vulnerability for organizations if strict vetting procedures aren't in place. Here's what organizations should do:
- Thoroughly verify the identity of job applicants: Don't rely solely on online profiles; conduct comprehensive document checks and identity verification.
- Avoid hiring through untrustworthy channels: Utilize recognized recruitment platforms and processes with established security measures.
- Implement systems to detect unusual usage patterns: Monitor for suspicious activities within the network, such as accessing unrelated data or large-volume data transfers.
- Internally educate teams about new threat models: Raise awareness among all employees about these schemes and how to protect themselves.
Conclusion: IT Workers or Cyber Spies?
This isn't merely an employment scam for financial gain; it's a state-sponsored infiltration aimed at funding weapons programs and stealing critical technology from within US organizations.
The crucial question is: Is your organization ready to face the silent threat from "employees" who might not be who they seem?