crypto.news
2025-07-09 06:40:23

US sanctions network aiding North Korean IT workers in targeting crypto companies

Continuing its crackdown on North Korea’s efforts to infiltrate U.S. companies, the Treasury Department has sanctioned two individuals and four entities for aiding malicious IT workers in infiltrating crypto firms. A North Korean national, Song Kum Hyok, and a Russian national, Gayk Asatryan, have been sanctioned by the Treasury’s Office of Foreign Assets Control for their roles in supporting North Korean IT worker operations targeting the crypto sector. According to OFAC, Song Kum Hyok has ties to North Korea’s Reconnaissance General Bureau (RGB) and its subordinate hacking unit Andariel. He has been accused of creating fake identities using stolen U.S. citizen information to help foreign-based DPRK IT workers secure remote jobs, primarily in crypto-related firms. These workers would then split earnings with Song, generating revenue for North Korea’s sanctioned weapons programs. Meanwhile, Asatryan is accused of using his Russia-based firms, Asatryan LLC and Fortuna LLC, to employ dozens of DPRK IT workers under contracts with North Korean state trading companies. These entities, namely, Korea Songkwang Trading Corporation and Korea Saenal Trading Corporation, have also been sanctioned for their role in dispatching workers abroad to fund the regime. You might also like: North Korean hackers target macOS in latest malware campaign targeting crypto firms OFAC said these actions were a part of a strategic initiative to thwart North Korea’s efforts to deploy thousands of skilled IT workers, mainly based in China and Russia, who use falsified documents and fake profiles to gain employment in crypto and tech firms. Once embedded, these malicious actors allegedly use freelance platforms and crypto exchanges to receive and launder funds back to the regime. “These workers are instructed to deliberately obfuscate their identities, locations, and nationalities, typically using false personas, proxy accounts, stolen identities, and falsified or forged documentation,” the Treasury said, adding that they often exploit freelance platforms and crypto exchanges to launder earnings back to North Korea. Investigators have warned that North Korea’s cyber infiltration strategy has evolved significantly in recent years. While early efforts focused on direct hacks by groups like Lazarus , the regime now increasingly relies on deception-based methods to quietly embed operatives in legitimate firms. Crypto investigator ZachXBT estimates that as many as 920 North Korean IT workers may have infiltrated roles in the digital asset sector, generating over $16 million in payroll from unsuspecting employers. Recognising the scale of the threat, U.S. authorities are now striking at the infrastructure sustaining North Korea’s IT infiltration schemes. The Department of Justice has led recent efforts, bringing criminal charges against DPRK-linked operatives, pursuing asset forfeiture cases targeting millions in laundered crypto. Read more: North Korean hackers may hold 900+ crypto jobs, ZachXBT warns

获取加密通讯
阅读免责声明 : 此处提供的所有内容我们的网站,超链接网站,相关应用程序,论坛,博客,社交媒体帐户和其他平台(“网站”)仅供您提供一般信息,从第三方采购。 我们不对与我们的内容有任何形式的保证,包括但不限于准确性和更新性。 我们提供的内容中没有任何内容构成财务建议,法律建议或任何其他形式的建议,以满足您对任何目的的特定依赖。 任何使用或依赖我们的内容完全由您自行承担风险和自由裁量权。 在依赖它们之前,您应该进行自己的研究,审查,分析和验证我们的内容。 交易是一项高风险的活动,可能导致重大损失,因此请在做出任何决定之前咨询您的财务顾问。 我们网站上的任何内容均不构成招揽或要约