Log In

US Cracks Down on North Korean Crypto Fraud Ring

Published 1 day ago3 minute read
US Cracks Down on North Korean Crypto Fraud Ring

The United States government has launched a significant crackdown on an international fraud ring with direct ties to North Korea, leading to the indictment of over a dozen individuals. This sophisticated scheme involved North Korean IT workers, often operating under stolen American identities, securing remote jobs at more than 100 U.S. companies, including numerous Fortune 500 firms. The primary objective of this illicit operation was to funnel millions of dollars in stolen funds and cryptocurrency back to North Korea, thereby financing its weapons and missile development programs.

The fraud ring, which illegally netted over $5 million in cash and substantial cryptocurrency, evolved in its complexity. Initially, North Korean IT workers used fake IDs to pose as remote employees. Over time, the scheme progressed to include the creation of American front companies, designed to obscure the true identities of the North Korean operatives and lend an air of legitimacy to their activities. These front companies, such as "Independent Lab" founded by Zhenxing “Danny” Wang from New Jersey, played a crucial role in receiving company-issued laptops. These laptops were then hosted at clandestine "laptop farms" across 16 U.S. states, allowing the North Korean workers to access company networks remotely from overseas.

Authorities conducted searches at 29 "laptop farms" and seized 29 financial accounts used for laundering the illicit gains. The identities of more than 80 Americans were stolen as part of this extensive network. Four North Korean nationals were specifically charged in a separate indictment for stealing nearly $1 million in cryptocurrency. Notable instances include Kim Kwang Jim, who allegedly stole millions in crypto tokens by altering a company's smart contract code, and Jong Pong Ju, who used the alias "Bryan Cho" to secure a job and steal approximately $175,000 in cryptocurrency. These individuals employed elaborate cover-up tactics, such as fabricating stories about "accidentally dropping private keys" or blaming "github refactors." The stolen cryptocurrency was frequently laundered using mixers like Tornado Cash to obscure its origins before being funneled to North Korea.

The scope of this fraud extended beyond financial theft, posing significant national security risks. One instance involved a California defense contractor from which sensitive military technology documents were stolen, highlighting the potential for intelligence gathering by these state-sponsored cybercriminals. The illicit earnings from such schemes are substantial; the United Nations estimates that North Korea earns between $200 million and $600 million annually from its IT worker operations, with crypto theft potentially adding billions to this figure.

U.S. Attorney Theodore Hertzberg emphasized the danger posed by state-sponsored cybercriminals and urged companies to exercise extreme caution when hiring remote workers, advocating for thorough verification, preferably in-person. Assistant Attorney General John Eisenberg reaffirmed the Justice Department's commitment to dismantling these cyber-enabled networks that fund North Korea's illicit programs. The FBI is actively pursuing the indicted individuals and plans to release new "Wanted" posters for the defendants involved in this far-reaching international fraud ring.

From Zeal News Studio(Terms and Conditions)
Loading...
Loading...
Loading...

You may also like...