CoinInsight360.com logo CoinInsight360.com logo
America's Social Casino

coinpedia 2025-06-06 06:11:44

North Korea Laundered $7.7M in Crypto: DOJ Reveals

The post North Korea Laundered $7.7M in Crypto: DOJ Reveals appeared first on Coinpedia Fintech News The U.S. Department of Justice (DOJ) has seized over $7.74 million in cryptocurrency allegedly laundered by North Korean IT workers posing as remote employees at U.S. and international companies. This operation, exposed through a civil forfeiture complaint filed in the District of Columbia, reveals how North Korea has been exploiting the crypto and AI boom to bypass U.S. sanctions and fund its weapons programs. Department Files Civil Forfeiture Complaint Against Over $7.74M Laundered on Behalf of the North Korean Government : https://t.co/T6nh2ETMYY pic.twitter.com/o23HY6C6Zw — U.S. Department of Justice (@TheJusticeDept) June 5, 2025 Fake Resumes, AI Tools, and NFT Laundering According to the DOJ , the operatives used stolen or fake IDs to bypass KYC checks and secure work under assumed identities. They often received their payments in U.S. dollar-pegged stablecoins. The laundering strategy involved sophisticated crypto techniques, mixing funds, converting between tokens, buying NFTs, and transferring assets in small amounts to avoid detection. The operatives routed the funds through known intermediaries, including Sim Hyon Sop of the sanctioned Foreign Trade Bank and Kim Sang Man of Chinyong IT Cooperation Company. AI’s Alarming Role in the Scheme OpenAI confirmed that several accounts linked to North Korean clusters were banned for using AI tools like ChatGPT to automate job applications, craft fake employment histories, and even research targets. Some operatives ran “laptop farms,” simulating normal work behavior from countries like Russia and Laos. Google had previously taken similar steps, removing North Korea-linked accounts. Meanwhile, tech firms like Google and OpenAI have shut down multiple accounts linked to North Korean deception campaigns. Part of Ongoing Crackdown on DPRK’s Digital Networks This seizure follows the DOJ’s broader DPRK RevGen initiative launched in March 2024, aimed at disrupting North Korea’s growing cyber-financial operations. “ US Sanctions are in place for a reason,” said U.S. Attorney Jeanine Pirro. “We will continue to investigate and prosecute anyone helping North Korea fund its illegal weapons programs.” Despite a slower pace under the Trump administration, Thursday’s action signals the U.S. is far from easing up on North Korea’s crypto-powered sanctions evasion. FAQ Who is the Lazarus Group and how are they connected to crypto hacks? The Lazarus Group is a North Korean state-sponsored hacking unit. They’ve carried out major crypto thefts, including the $620 million Ronin Bridge hack in 2022 , one of the largest in history. Has the DOJ successfully recovered any stolen crypto from North Korea? Yes. The DOJ has seized millions in stolen and laundered cryptocurrency , including the recent $7.74 million from fake IT workers tied to North Korea. How do North Korean operatives earn crypto through fake jobs? They pose as remote developers or IT workers using fake or stolen identities. Once hired, they get paid in **cryptocurrency—mainly stablecoins—**which they later launder.

면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.