Continuing its crackdown on North Korea’s efforts to infiltrate U.S. companies, the Treasury Department has sanctioned two individuals and four entities for aiding malicious IT workers in infiltrating crypto firms. A North Korean national, Song Kum Hyok, and a Russian…Continuing its crackdown on North Korea’s efforts to infiltrate U.S. companies, the Treasury Department has sanctioned two individuals and four entities for aiding malicious IT workers in infiltrating crypto firms. A North Korean national, Song Kum Hyok, and a Russian…

US sanctions network aiding North Korean IT workers in targeting crypto companies

Continuing its crackdown on North Korea’s efforts to infiltrate U.S. companies, the Treasury Department has sanctioned two individuals and four entities for aiding malicious IT workers in infiltrating crypto firms.

A North Korean national, Song Kum Hyok, and a Russian national, Gayk Asatryan, have been sanctioned by the Treasury’s Office of Foreign Assets Control for their roles in supporting North Korean IT worker operations targeting the crypto sector.

According to OFAC, Song Kum Hyok has ties to North Korea’s Reconnaissance General Bureau (RGB) and its subordinate hacking unit Andariel. He has been accused of creating fake identities using stolen U.S. citizen information to help foreign-based DPRK IT workers secure remote jobs, primarily in crypto-related firms.

These workers would then split earnings with Song, generating revenue for North Korea’s sanctioned weapons programs.

Meanwhile, Asatryan is accused of using his Russia-based firms, Asatryan LLC and Fortuna LLC, to employ dozens of DPRK IT workers under contracts with North Korean state trading companies. 

These entities, namely, Korea Songkwang Trading Corporation and Korea Saenal Trading Corporation, have also been sanctioned for their role in dispatching workers abroad to fund the regime.

OFAC said these actions were a part of a strategic initiative to thwart North Korea’s efforts to deploy thousands of skilled IT workers, mainly based in China and Russia, who use falsified documents and fake profiles to gain employment in crypto and tech firms.

Once embedded, these malicious actors allegedly use freelance platforms and crypto exchanges to receive and launder funds back to the regime. 

“These workers are instructed to deliberately obfuscate their identities, locations, and nationalities, typically using false personas, proxy accounts, stolen identities, and falsified or forged documentation,” the Treasury said, adding that they often exploit freelance platforms and crypto exchanges to launder earnings back to North Korea.

Investigators have warned that North Korea’s cyber infiltration strategy has evolved significantly in recent years. While early efforts focused on direct hacks by groups like Lazarus, the regime now increasingly relies on deception-based methods to quietly embed operatives in legitimate firms.

Crypto investigator ZachXBT estimates that as many as 920 North Korean IT workers may have infiltrated roles in the digital asset sector, generating over $16 million in payroll from unsuspecting employers.

Recognising the scale of the threat, U.S. authorities are now striking at the infrastructure sustaining North Korea’s IT infiltration schemes. The Department of Justice has led recent efforts, bringing criminal charges against DPRK-linked operatives, pursuing asset forfeiture cases targeting millions in laundered crypto.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Octav Integrates Chainlink to Deliver Independent Onchain NAV for DeFi

Octav Integrates Chainlink to Deliver Independent Onchain NAV for DeFi

Octav integrates Chainlink oracles to deliver neutral on-chain NAV, restoring trust during volatile DeFi markets. October shocks exposed DeFi operating without
Share
Crypto News Flash2025/12/21 17:51
SEC Final Judgments on FTX Executives Filed

SEC Final Judgments on FTX Executives Filed

The SEC has filed proposed final consent judgments against former FTX executives. Key figures involved include Caroline Ellison, Gary Wang, and Nishad Singh.
Share
CoinLive2025/12/21 18:06
SHIB Price Drops as Leadership Concerns Grow

SHIB Price Drops as Leadership Concerns Grow

The post SHIB Price Drops as Leadership Concerns Grow appeared on BitcoinEthereumNews.com. Shiba Inu investors uneasy as Kusama’s silence fuels leadership concerns. SHIB slid 13% in three days, retracing from $0.00001484 to $0.00001305. Shibarium exploit and Kusama’s absence have weighed on investor trust. Shiba Inu investors are voicing concerns about the project’s long-term direction as leadership uncertainty and slow ecosystem progress erode confidence.  The token, which rallied from its meme-coin origins to become the second-largest meme asset by market cap, counts more than 1.5 million holders worldwide. But as SHIB matures, the gap between early hype and current delivery has widened.  The project’s transition into an “ecosystem coin” with spin-off projects and Shibarium, its layer-2 network, once raised expectations. Analysts now point to internal challenges as the main factor holding SHIB back from fulfilling that potential. Kusama’s Silence Adds to Instability Central to the debate is the role of Shytoshi Kusama, Shiba Inu’s pseudonymous lead developer. Investors are concerned about the intermittent disappearance of the project’s lead developer, who repeatedly takes unannounced social media breaks.  For instance, Kusama went silent on X for over a month before resurfacing this week amid growing speculation that he had abandoned the Shiba Inu project.  Kusama returned shortly after the Shibarium bridge suffered an exploit worth around $3 million. However, he did not directly address the issue but only reassured Shiba Inu community members of his commitment to advancing the project.  Although most community members didn’t complain about Kusama’s anonymity in the project’s initial stages, his recent behavior has raised concerns. Many are beginning to develop trust issues, particularly because nobody could reveal the SHIB developer’s identity for the past five years. He has conducted all communications under pseudonyms. SHIB Price Action Reflects Sentiment Shift Market reaction has mirrored the doubts. SHIB, which spiked 26% at the start of September, has since reversed. Over the last…
Share
BitcoinEthereumNews2025/09/18 04:13