The US Department of Justice (DOJ) has charged four North Koreans for impersonating as remote IT workers and exploiting companies to steal crypto. The federal prosecutors noted that the operation could be a part of the DPRK strategy to fund its weapons program. In a “cyber-enabled revenue generation network”, perpetrators landed in remote IT jobs using fake and stolen identities. The group exploited their company’s trust to steal and launder over $900,000 in crypto, the DOJ announcement read. The federal prosecutors from the Northern District of Georgia have charged the defendants with a five-count wire fraud and money laundering indictment linked to the scheme. “This indictment highlights the unique threat North Korea poses to companies that hire remote IT workers and underscores our resolve to prosecute any actor, in the United States or abroad, who steals from Georgia businesses,” said U.S. Attorney Theodore S. Hertzberg on Monday. Fraudsters Target Georgia-Based Blockchain Firm, Serbian Crypto Company The case is being handled by the Federal Bureau of Investigation (FBI) and is part of the DOJ’s ‘DPRK RevGen’ plan that targets high-impact North Korea-linked illicit revenue generation rings. According to the investigation, the defendants initially operated as a team in the UAE in 2019. Between December 2020 and May 2021, these perpetrators joined a Georgia-based blockchain firm and a Siberian crypto company as developers. “Both defendants concealed their North Korean identities from their employers by providing false identification documents containing a mix of stolen and fraudulent identity information,” the DOJ revealed. In February 2022, two of the impersonated employers were assigned projects that provided them access to crypto. The defendants used that access to steal digital assets in two separate operations worth $175,000 and $740,000 at the time. They reportedly modified the source code of two employers’ smart contracts. DPRK Crypto Attacks Magnify North Korea has been developing novel and more sophisticated attacks on crypto firms in the recent past. In April, spies from the DPRK infiltrated the US corporate system to feed in a malware campaign targeting crypto developers. They used fake US firms and domains to post job interviews to trick developers into downloading malware. 🚨 North Korean cyber spies reportedly set up fake US firms to deploy malware targeting crypto developers, violating Treasury sanctions. #NorthKorea #CyberSecurity https://t.co/TvCmrspaep — Cryptonews.com (@cryptonews) April 25, 2025 Another sophisticated method to steal crypto is via Zoom meetings, and hiding malware in GitHub. According to Nick Bax of the Security Alliance, a threat group is working to steal data and funds through fake business calls on Zoom . The DPRK-linked players send messages in the chat saying they can’t hear audio, suggesting listeners click on a fake link. Last week, reports revealed that North Korea is targeting Indian crypto job applicants with malware to steal their data.The US Department of Justice (DOJ) has charged four North Koreans for impersonating as remote IT workers and exploiting companies to steal crypto. The federal prosecutors noted that the operation could be a part of the DPRK strategy to fund its weapons program. In a “cyber-enabled revenue generation network”, perpetrators landed in remote IT jobs using fake and stolen identities. The group exploited their company’s trust to steal and launder over $900,000 in crypto, the DOJ announcement read. The federal prosecutors from the Northern District of Georgia have charged the defendants with a five-count wire fraud and money laundering indictment linked to the scheme. “This indictment highlights the unique threat North Korea poses to companies that hire remote IT workers and underscores our resolve to prosecute any actor, in the United States or abroad, who steals from Georgia businesses,” said U.S. Attorney Theodore S. Hertzberg on Monday. Fraudsters Target Georgia-Based Blockchain Firm, Serbian Crypto Company The case is being handled by the Federal Bureau of Investigation (FBI) and is part of the DOJ’s ‘DPRK RevGen’ plan that targets high-impact North Korea-linked illicit revenue generation rings. According to the investigation, the defendants initially operated as a team in the UAE in 2019. Between December 2020 and May 2021, these perpetrators joined a Georgia-based blockchain firm and a Siberian crypto company as developers. “Both defendants concealed their North Korean identities from their employers by providing false identification documents containing a mix of stolen and fraudulent identity information,” the DOJ revealed. In February 2022, two of the impersonated employers were assigned projects that provided them access to crypto. The defendants used that access to steal digital assets in two separate operations worth $175,000 and $740,000 at the time. They reportedly modified the source code of two employers’ smart contracts. DPRK Crypto Attacks Magnify North Korea has been developing novel and more sophisticated attacks on crypto firms in the recent past. In April, spies from the DPRK infiltrated the US corporate system to feed in a malware campaign targeting crypto developers. They used fake US firms and domains to post job interviews to trick developers into downloading malware. 🚨 North Korean cyber spies reportedly set up fake US firms to deploy malware targeting crypto developers, violating Treasury sanctions. #NorthKorea #CyberSecurity https://t.co/TvCmrspaep — Cryptonews.com (@cryptonews) April 25, 2025 Another sophisticated method to steal crypto is via Zoom meetings, and hiding malware in GitHub. According to Nick Bax of the Security Alliance, a threat group is working to steal data and funds through fake business calls on Zoom . The DPRK-linked players send messages in the chat saying they can’t hear audio, suggesting listeners click on a fake link. Last week, reports revealed that North Korea is targeting Indian crypto job applicants with malware to steal their data.

DOJ Dismantles North Korea-Linked Crypto Theft Scheme, Defendants Stole Nearly $1M

The US Department of Justice (DOJ) has charged four North Koreans for impersonating as remote IT workers and exploiting companies to steal crypto. The federal prosecutors noted that the operation could be a part of the DPRK strategy to fund its weapons program.

In a “cyber-enabled revenue generation network”, perpetrators landed in remote IT jobs using fake and stolen identities. The group exploited their company’s trust to steal and launder over $900,000 in crypto, the DOJ announcement read.

The federal prosecutors from the Northern District of Georgia have charged the defendants with a five-count wire fraud and money laundering indictment linked to the scheme.

“This indictment highlights the unique threat North Korea poses to companies that hire remote IT workers and underscores our resolve to prosecute any actor, in the United States or abroad, who steals from Georgia businesses,” said U.S. Attorney Theodore S. Hertzberg on Monday.

Fraudsters Target Georgia-Based Blockchain Firm, Serbian Crypto Company

The case is being handled by the Federal Bureau of Investigation (FBI) and is part of the DOJ’s ‘DPRK RevGen’ plan that targets high-impact North Korea-linked illicit revenue generation rings.

According to the investigation, the defendants initially operated as a team in the UAE in 2019. Between December 2020 and May 2021, these perpetrators joined a Georgia-based blockchain firm and a Siberian crypto company as developers.

“Both defendants concealed their North Korean identities from their employers by providing false identification documents containing a mix of stolen and fraudulent identity information,” the DOJ revealed.

In February 2022, two of the impersonated employers were assigned projects that provided them access to crypto. The defendants used that access to steal digital assets in two separate operations worth $175,000 and $740,000 at the time. They reportedly modified the source code of two employers’ smart contracts.

DPRK Crypto Attacks Magnify

North Korea has been developing novel and more sophisticated attacks on crypto firms in the recent past. In April, spies from the DPRK infiltrated the US corporate system to feed in a malware campaign targeting crypto developers.

They used fake US firms and domains to post job interviews to trick developers into downloading malware.

Another sophisticated method to steal crypto is via Zoom meetings, and hiding malware in GitHub. According to Nick Bax of the Security Alliance, a threat group is working to steal data and funds through fake business calls on Zoom.

The DPRK-linked players send messages in the chat saying they can’t hear audio, suggesting listeners click on a fake link.

Last week, reports revealed that North Korea is targeting Indian crypto job applicants with malware to steal their data.

Piyasa Fırsatı
Threshold Logosu
Threshold Fiyatı(T)
$0.009221
$0.009221$0.009221
+0.19%
USD
Threshold (T) Canlı Fiyat Grafiği
Sorumluluk Reddi: Bu sitede yeniden yayınlanan makaleler, halka açık platformlardan alınmıştır ve yalnızca bilgilendirme amaçlıdır. MEXC'nin görüşlerini yansıtmayabilir. Tüm hakları telif sahiplerine aittir. Herhangi bir içeriğin üçüncü taraf haklarını ihlal ettiğini düşünüyorsanız, kaldırılması için lütfen [email protected] ile iletişime geçin. MEXC, içeriğin doğruluğu, eksiksizliği veya güncelliği konusunda hiçbir garanti vermez ve sağlanan bilgilere dayalı olarak alınan herhangi bir eylemden sorumlu değildir. İçerik, finansal, yasal veya diğer profesyonel tavsiye niteliğinde değildir ve MEXC tarafından bir tavsiye veya onay olarak değerlendirilmemelidir.

Ayrıca Şunları da Beğenebilirsiniz

BlackRock boosts AI and US equity exposure in $185 billion models

BlackRock boosts AI and US equity exposure in $185 billion models

The post BlackRock boosts AI and US equity exposure in $185 billion models appeared on BitcoinEthereumNews.com. BlackRock is steering $185 billion worth of model portfolios deeper into US stocks and artificial intelligence. The decision came this week as the asset manager adjusted its entire model suite, increasing its equity allocation and dumping exposure to international developed markets. The firm now sits 2% overweight on stocks, after money moved between several of its biggest exchange-traded funds. This wasn’t a slow shuffle. Billions flowed across multiple ETFs on Tuesday as BlackRock executed the realignment. The iShares S&P 100 ETF (OEF) alone brought in $3.4 billion, the largest single-day haul in its history. The iShares Core S&P 500 ETF (IVV) collected $2.3 billion, while the iShares US Equity Factor Rotation Active ETF (DYNF) added nearly $2 billion. The rebalancing triggered swift inflows and outflows that realigned investor exposure on the back of performance data and macroeconomic outlooks. BlackRock raises equities on strong US earnings The model updates come as BlackRock backs the rally in American stocks, fueled by strong earnings and optimism around rate cuts. In an investment letter obtained by Bloomberg, the firm said US companies have delivered 11% earnings growth since the third quarter of 2024. Meanwhile, earnings across other developed markets barely touched 2%. That gap helped push the decision to drop international holdings in favor of American ones. Michael Gates, lead portfolio manager for BlackRock’s Target Allocation ETF model portfolio suite, said the US market is the only one showing consistency in sales growth, profit delivery, and revisions in analyst forecasts. “The US equity market continues to stand alone in terms of earnings delivery, sales growth and sustainable trends in analyst estimates and revisions,” Michael wrote. He added that non-US developed markets lagged far behind, especially when it came to sales. This week’s changes reflect that position. The move was made ahead of the Federal…
Paylaş
BitcoinEthereumNews2025/09/18 01:44
SICAK GELİŞME: Binance, Üç Altcoini Vadeli İşlemlerde Listeliyor!

SICAK GELİŞME: Binance, Üç Altcoini Vadeli İşlemlerde Listeliyor!

Kripto para borsası Binance, ZKP, GUA ve IR tokenlerini vadeli işlemler platformunda listeleyeceğini açıkladı. *Yatırım tavsiyesi değildir. Kaynak: Bitcoinsistemi
Paylaş
Coinstats2025/12/21 16:41
USDC Treasury mints 250 million new USDC on Solana

USDC Treasury mints 250 million new USDC on Solana

PANews reported on September 17 that according to Whale Alert , at 23:48 Beijing time, USDC Treasury minted 250 million new USDC (approximately US$250 million) on the Solana blockchain .
Paylaş
PANews2025/09/17 23:51