North Korea Crypto Theft: US Imposes Critical Sanctions on IT Worker Network

Alarming news from the US Treasury reveals a significant crackdown on North Korea’s efforts to fund its illicit programs through digital asset theft. The focus isn’t just on direct hacks anymore; a growing concern is the infiltration of companies, including those in the crypto space, by skilled North Korean IT workers posing as legitimate contractors.
US Sanctions Target North Korea’s Crypto Scheme
The US Treasury Department’s Office of Foreign Assets Control (OFAC) has taken decisive action, sanctioning two individuals and four entities allegedly part of a North Korea-run IT worker operation. This network is accused of infiltrating various companies, specifically targeting the crypto industry, with the intent to exploit them for financial gain.
Key individuals sanctioned include:
- Song Kum Hyok (North Korea-based): Accused of stealing US citizens’ information to create fake identities used by hired foreign IT workers seeking employment at US firms.
- Gayk Asatryan (Russian national): Sanctioned for allegedly using his companies to employ dozens of North Korean IT workers under long-term agreements signed with North Korean trading firms.
Additionally, four Russian entities linked to Asatryan’s operations were also sanctioned. These actions mean all US assets connected to these individuals and entities are frozen, and US persons are prohibited from engaging in transactions or business dealings with them, facing potential civil and criminal penalties.
How Do North Korean IT Workers Infiltrate Companies?
According to OFAC and previous reports, the method involves a sophisticated deception strategy. North Korean operatives allegedly use stolen identities to create convincing aliases. These aliases are then provided to highly skilled North Korean IT workers. These workers seek remote employment, often targeting companies in wealthier countries, including those involved in blockchain and crypto, through various online networking and job platforms.
A report from Google earlier this year highlighted the expanding global infrastructure supporting these fraudulent tech worker schemes, indicating the widespread nature of the threat.
Why is North Korea Engaging in Crypto Cybercrime? Funding Illicit Programs
The primary motivation behind North Korea’s extensive deployment of IT workers globally is to generate revenue for its ballistic missile and weapons programs. OFAC estimates that North Korea maintains a workforce of thousands of skilled IT professionals operating worldwide, with a significant concentration in China and Russia. These workers are tasked with earning foreign currency through their disguised employment, effectively circumventing international sanctions.
Shifting Tactics: From Direct Hacks to Deception-Based Crypto Cybercrime
While North Korea, notoriously linked to groups like the Lazarus Group, has been responsible for some of the largest direct crypto hacks on record (like the $1.5 billion Bybit exploit mentioned in the original text, although the date might be an error, likely referring to past large exploits), blockchain intelligence firm TRM Labs notes a strategic shift.
TRM Labs stated, “While exchange breaches remain significant, DPRK-linked operations are increasingly shifting toward deception-based revenue generation, including IT worker infiltration.”
This shift towards deception complements direct hacking efforts. TRM Labs estimates that North Korea-aligned actors were responsible for a substantial portion of stolen funds in the first half of a recent year, accounting for $1.6 billion out of $2.1 billion across numerous crypto hacks and exploits.
Recent Crackdowns on North Korea Crypto Theft Operations
US authorities have been intensifying efforts to counter these fraudulent North Korean IT worker schemes throughout the year. Examples include:
- June 30: Four North Korean nationals were charged with wire fraud and money laundering for allegedly posing as remote workers at US and Serbian blockchain companies.
- June 5: The US Department of Justice announced efforts to seize $7.74 million in frozen crypto. These funds were allegedly earned by North Korean IT workers using fake identities while working as remote contractors for blockchain firms.
These actions underscore the US government’s commitment to disrupting North Korea’s ability to fund its weapons programs through illicit crypto activities and the exploitation of legitimate businesses.
Summary
The US Treasury’s latest sanctions highlight the evolving threat posed by North Korea’s attempts to circumvent sanctions and fund its missile programs. Beyond direct cyberattacks, the infiltration of companies by disguised North Korean IT workers is a significant and growing concern. The US government is actively using sanctions and legal action to disrupt these networks, signaling a strong stance against this form of crypto cybercrime and deception-based revenue generation by the Kim regime. Businesses, particularly in the crypto sector, must remain vigilant against sophisticated infiltration attempts by North Korean operatives.