TRENDING

Home » North Korean IT Workers Launder $7.7M in Crypto

North Korean IT Workers Launder $7.7M in Crypto

DOJ Seizes Millions as North Korean IT Operatives Use Stolen U.S. Identities to Infiltrate Blockchain Firms and Fund Weapons Program

by Oscar phile phile
0 comment
north korea

In a striking revelation, the United States Department of Justice (DOJ) has seized over $7.74 million allegedly laundered by North Korean IT operatives using stolen American identities. The operatives reportedly secured remote jobs at U.S.-based blockchain and tech firms and channelled their earnings back to North Korea. This elaborate crypto laundering scheme highlights the evolving cyber-financial tactics of the heavily sanctioned regime.

IT Workers Impersonate Americans to Infiltrate U.S. Firms

According to a civil forfeiture complaint filed in the U.S. District Court for the District of Columbia, North Korean IT workers posed as U.S. citizens to obtain remote positions at blockchain and tech companies. To bypass Know Your Customer (KYC) checks and secure employment, they used forged or stolen identification documents—often gaining access via freelance platforms or intermediaries based in the U.S.

Their salaries, frequently paid in stablecoins such as USDC and USDT, were laundered through various methods before being routed back to the North Korean regime. The ultimate objective: to finance Pyongyang’s weapons programs while evading international sanctions.

Advanced Laundering Techniques and Crypto Obfuscation

The FBI’s investigation uncovered a network of laundering tactics used to obscure the origin and destination of the stolen funds. These included “chain hopping” (moving crypto between multiple blockchains), token swapping, and even the purchase of non-fungible tokens (NFTs) to throw investigators off the trail. Shell accounts played a key role in concealing the final recipients—senior North Korean officials, including Kim Sang Man and Sim Hyon Sop, both of whom are already under U.S. Treasury sanctions.

North Korea

The funds were reportedly channelled through the Chinyong IT Cooperation Company, which operates out of China, Russia, and Laos. This organisation is believed to function under the authority of North Korea’s Ministry of Defence. Kim Sang Man, the CEO of Chinyong, allegedly acted as a central link between the IT workers and the Foreign Trade Bank of North Korea.

Real-World Cases Underscore Ongoing Risk

Recent incidents demonstrate the continued reach of North Korea’s cyber units. Kraken’s security team reportedly detected a job applicant attempting to infiltrate the company using falsified credentials. Similarly, major breaches at Bybit and DMM Bitcoin were traced back to North Korea-linked hacker groups, including the Lazarus Group and TraderTraitor.

In May alone, the crypto world witnessed $244 million in losses, much of which has been attributed to North Korean actors. These activities highlight a broader strategy by the DPRK to exploit decentralised finance (DeFi) platforms and remote work structures to sustain its illicit programs.

International Pushback and DOJ Crackdown

This operation falls under the broader “DPRK RevGen” initiative launched in 2024 by the DOJ. The initiative aims to dismantle North Korea’s global cyber-financial network by targeting operatives, intermediaries, and financial flows. It has already led to several asset seizures, indictments, and the enforcement of international sanctions.

Officials from the U.S., South Korea, and Japan have jointly condemned the regime’s abuse of crypto to fund weapons development and undermine global financial systems. The DOJ reaffirmed its commitment to cut off the financial lifelines of the regime.

“Crime may pay in other countries, but that’s not how it works here,” stated U.S. Attorney Jeanine Ferris Pirro. “We will halt your progress, strike back, and seize any illegally obtained proceeds.”

Related Posts :

footer logo

@2023 – All Right Reserved.

Incubated bydesi crypto logo