DOJ Charge Fake North Korean Devs 'Embedding' In Crypto Startups

CN
Decrypt
Follow
8 hours ago

Four North Korean nationals infiltrated an Atlanta-based blockchain startup and stole nearly $1 million in crypto by posing as remote developers, federal prosecutors from the Northern District of Georgia announced Monday, detailing charges from a five-count wire fraud and money laundering indictment.


The defendants first operated as a team in the UAE before infiltrating U.S. and Serbian crypto firms as remote IT workers. After gaining trust, they stole $175,000 and $740,000 in two separate 2022 incidents, laundering the funds through mixers and exchanges using fake identification documents.


Ostensibly dubbed as "North Korean IT workers," the alleged individuals operate by "embedding themselves within these organizations" to "gather intelligence, manipulate security protocols, and even facilitate insider breaches," Andrew Fierman, head of national security at blockchain analytics firm Chainalysis, told Decrypt.


The stolen crypto vanished through a maze of transactions designed to obscure its origin—a sophisticated playbook North Korea has refined over years of cybercriminal operations.


The DOJ did not immediately return Decrypt’s request for comment.


Standard operating procedure


These tactics form "a pattern that has increasingly become standard operating procedure," Fierman told Decrypt.


The threat actors get hired by using "falsified documentation" and "masking their North Korean nexus," Fierman explained.



Aside from sending their compensation "back to the regime," the workers also "patiently wait for the opportunity to access funds of the Web3 company they've infiltrated" to steal more, Fierman said.





The scheme exposes a vulnerability in crypto's remote-first culture, where firms hiring globally may skip background checks, allowing state-sponsored actors with fake identities to exploit gaps.


"Unfortunately, many teams avoid in-person meetings and prefer hiring more 'cheap' developers than hiring well-known guys in our sector," Vladimir Sobolev, threat researcher at blockchain security firm Hexens, told Decrypt. "This is a fundamental issue. "


Describing North Korea's cyber operations as a "long-term endeavor," Sobolev notes that the country has been engaged in these activities for a long time, even "before the popularity of blockchain and Web3."


Broader scheme


Earlier this month, the federal prosecutors detailed in a civil action lawsuit how "tens of millions were exploited in a larger North Korean IT worker crypto scheme," Fierman said, sharing documents reviewed by Decrypt.


In a separate press release, the DOJ stated that it conducted coordinated raids across 16 states, seizing 29 financial accounts, 21 fraudulent websites, and approximately 200 computers from "laptop farms" supporting North Korean IT schemes, including the four aforementioned.


The enforcement actions revealed how North Korean agents used these laptop farms as remote access points, allowing operatives to modify smart contracts and drain crypto funds while appearing to work from U.S. locations.


"The ability for organizations to recognize these threats and protect their firm against them will be critical," Fierman warned.


Edited by Sebastian Sinclair


免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。

ad
追热点必备!注册HTX领1500U
Ad
Share To
APP

X

Telegram

Facebook

Reddit

CopyLink