Market Cap: $3.6315T -1.300%
Volume(24h): $133.5557B -36.440%
  • Market Cap: $3.6315T -1.300%
  • Volume(24h): $133.5557B -36.440%
  • Fear & Greed Index:
  • Market Cap: $3.6315T -1.300%
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
Top News
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
bitcoin
bitcoin

$113631.479686 USD

-2.00%

ethereum
ethereum

$3520.743224 USD

-5.26%

xrp
xrp

$2.975668 USD

-1.41%

tether
tether

$0.999590 USD

-0.04%

bnb
bnb

$765.480635 USD

-2.81%

solana
solana

$164.408416 USD

-4.17%

usd-coin
usd-coin

$0.999790 USD

-0.03%

tron
tron

$0.326752 USD

-0.10%

dogecoin
dogecoin

$0.201954 USD

-3.61%

cardano
cardano

$0.722537 USD

-2.09%

hyperliquid
hyperliquid

$38.070603 USD

-8.41%

sui
sui

$3.486261 USD

-3.77%

stellar
stellar

$0.386280 USD

-3.08%

chainlink
chainlink

$16.205186 USD

-4.34%

bitcoin-cash
bitcoin-cash

$540.533382 USD

-4.15%

Cryptocurrency News Articles

DOJ vs. North Korea: The Crypto Crime Spree That's Got Everyone Talking

Jul 01, 2025 at 03:05 pm

North Korea's crypto heists are funding illicit programs, and the DOJ is cracking down. From fake IT workers to seized accounts, here's the lowdown.

Hold on to your hats, folks, because the world of crypto crime just got a whole lot more interesting. The DOJ is hot on the trail of North Korean operatives who are using cunning schemes to steal crypto and fund their, shall we say, *less-than-legal* activities.

The Remote IT Ruse: North Korea's High-Tech Heist

Imagine this: you're a blockchain company, hiring remote IT workers. Sounds normal, right? But what if those workers were actually North Korean nationals, using fake IDs and stolen identities? That's exactly what the DOJ says happened in a recent case. Four North Koreans allegedly posed as remote IT developers, infiltrating US and Serbian companies and making off with nearly $1 million in crypto. Talk about a tech-savvy crime wave!

Kim Kwang Jin, Kang Tae Bok, Jong Pong Ju, and Chang Nam Il are the names to remember. These guys allegedly operated from the UAE before landing gigs at an Atlanta-based blockchain startup and a Serbian virtual token company. They used fraudulent documents to secure their positions, a tactic the US Attorney called a “unique threat.”

Once inside, they allegedly siphoned off substantial sums. Jong reportedly stole $175,000 in crypto in February 2022, while Kim allegedly exploited smart contract source code to grab $740,000 the following month. The stolen funds were then laundered through mixers and sent to exchange accounts controlled by Kang and Chang, all set up with fake Malaysian IDs.

DOJ's DPRK RevGen: Domestic Enabler Initiative

But fear not, the DOJ isn't sitting idly by. They've launched the DPRK RevGen: Domestic Enabler Initiative, a program targeting North Korea's illicit revenue streams and US-based enablers. As part of this initiative, federal agents conducted raids across 16 states, seizing financial accounts, fraudulent websites, and computers from “laptop farms” used by North Korean operatives to appear as if they were working from the US.

The schemes involved North Korean IT workers posing as US citizens, using stolen identities to gain jobs at over 100 American companies, funneling millions to Pyongyang, and even accessing sensitive military data. It's like a real-life spy movie, but with more Bitcoin.

Circle's USDC Under Scrutiny

And it's not just about catching the bad guys; it's also about the tools they're using. Blockchain investigator ZachXBT has raised concerns that North Korea is using Circle's USDC stablecoin to process illicit payments. ZachXBT claims that Circle is doing “NOTHING” to freeze the activity, even though they claim to have strict compliance protocols. Millions of dollars have allegedly flowed through the network unchecked.

Crypto Theft on the Rise: A Wake-Up Call?

The bigger picture here is that crypto-related cyberattacks are soaring. In the first half of 2025, losses hit a staggering $2.1 billion. A $1.5 billion hack on the Dubai-based exchange Bybit, linked to North Korean state actors, was the largest single incident, accounting for nearly 70% of total losses. Geopolitical tensions are also playing a role, with groups like the pro-Israel hacker collective Predatory Sparrow targeting Iranian exchanges.

What Does It All Mean?

So, what's the takeaway? North Korea is using sophisticated methods to steal crypto and fund its activities, and the DOJ is stepping up its efforts to stop them. But it's not just about law enforcement; it's also about the crypto industry itself. Stricter security measures, better compliance protocols, and international cooperation are needed to combat this growing threat. TRM Labs called for a comprehensive overhaul of crypto security practices including implementing multifactor authentication, using cold storage for funds, conducting regular audits, and enhancing detection of insider threats and social engineering attempts.

It's a complex situation, but one thing is clear: the DOJ is playing a high-stakes game of cat and mouse with North Korea, and the future of crypto security may depend on who wins.

If you ask me, this is a great reminder to double-check those security settings and maybe avoid any remote IT workers who ask for your social security number. Stay safe out there, crypto enthusiasts!

Original source:cointelegraph

Disclaimer:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

Other articles published on Aug 03, 2025