The US Department of Justice (DOJ) has charged four North Koreans for impersonating as remote IT workers and exploiting companies to steal crypto. The federal prosecutors noted that the operation could be a part of the DPRK strategy to fund its weapons program. In a “cyber-enabled revenue generation network”, perpetrators landed in remote IT jobs using fake and stolen identities. The group exploited their company’s trust to steal and launder over $900,000 in crypto, the DOJ announcement read. The federal prosecutors from the Northern District of Georgia have charged the defendants with a five-count wire fraud and money laundering indictment linked to the scheme. “This indictment highlights the unique threat North Korea poses to companies that hire remote IT workers and underscores our resolve to prosecute any actor, in the United States or abroad, who steals from Georgia businesses,” said U.S. Attorney Theodore S. Hertzberg on Monday. Fraudsters Target Georgia-Based Blockchain Firm, Serbian Crypto Company The case is being handled by the Federal Bureau of Investigation (FBI) and is part of the DOJ’s ‘DPRK RevGen’ plan that targets high-impact North Korea-linked illicit revenue generation rings. According to the investigation, the defendants initially operated as a team in the UAE in 2019. Between December 2020 and May 2021, these perpetrators joined a Georgia-based blockchain firm and a Siberian crypto company as developers. “Both defendants concealed their North Korean identities from their employers by providing false identification documents containing a mix of stolen and fraudulent identity information,” the DOJ revealed. In February 2022, two of the impersonated employers were assigned projects that provided them access to crypto. The defendants used that access to steal digital assets in two separate operations worth $175,000 and $740,000 at the time. They reportedly modified the source code of two employers’ smart contracts. DPRK Crypto Attacks Magnify North Korea has been developing novel and more sophisticated attacks on crypto firms in the recent past. In April, spies from the DPRK infiltrated the US corporate system to feed in a malware campaign targeting crypto developers. They used fake US firms and domains to post job interviews to trick developers into downloading malware. 🚨 North Korean cyber spies reportedly set up fake US firms to deploy malware targeting crypto developers, violating Treasury sanctions. #NorthKorea #CyberSecurity https://t.co/TvCmrspaep — Cryptonews.com (@cryptonews) April 25, 2025 Another sophisticated method to steal crypto is via Zoom meetings, and hiding malware in GitHub. According to Nick Bax of the Security Alliance, a threat group is working to steal data and funds through fake business calls on Zoom . The DPRK-linked players send messages in the chat saying they can’t hear audio, suggesting listeners click on a fake link. Last week, reports revealed that North Korea is targeting Indian crypto job applicants with malware to steal their data.The US Department of Justice (DOJ) has charged four North Koreans for impersonating as remote IT workers and exploiting companies to steal crypto. The federal prosecutors noted that the operation could be a part of the DPRK strategy to fund its weapons program. In a “cyber-enabled revenue generation network”, perpetrators landed in remote IT jobs using fake and stolen identities. The group exploited their company’s trust to steal and launder over $900,000 in crypto, the DOJ announcement read. The federal prosecutors from the Northern District of Georgia have charged the defendants with a five-count wire fraud and money laundering indictment linked to the scheme. “This indictment highlights the unique threat North Korea poses to companies that hire remote IT workers and underscores our resolve to prosecute any actor, in the United States or abroad, who steals from Georgia businesses,” said U.S. Attorney Theodore S. Hertzberg on Monday. Fraudsters Target Georgia-Based Blockchain Firm, Serbian Crypto Company The case is being handled by the Federal Bureau of Investigation (FBI) and is part of the DOJ’s ‘DPRK RevGen’ plan that targets high-impact North Korea-linked illicit revenue generation rings. According to the investigation, the defendants initially operated as a team in the UAE in 2019. Between December 2020 and May 2021, these perpetrators joined a Georgia-based blockchain firm and a Siberian crypto company as developers. “Both defendants concealed their North Korean identities from their employers by providing false identification documents containing a mix of stolen and fraudulent identity information,” the DOJ revealed. In February 2022, two of the impersonated employers were assigned projects that provided them access to crypto. The defendants used that access to steal digital assets in two separate operations worth $175,000 and $740,000 at the time. They reportedly modified the source code of two employers’ smart contracts. DPRK Crypto Attacks Magnify North Korea has been developing novel and more sophisticated attacks on crypto firms in the recent past. In April, spies from the DPRK infiltrated the US corporate system to feed in a malware campaign targeting crypto developers. They used fake US firms and domains to post job interviews to trick developers into downloading malware. 🚨 North Korean cyber spies reportedly set up fake US firms to deploy malware targeting crypto developers, violating Treasury sanctions. #NorthKorea #CyberSecurity https://t.co/TvCmrspaep — Cryptonews.com (@cryptonews) April 25, 2025 Another sophisticated method to steal crypto is via Zoom meetings, and hiding malware in GitHub. According to Nick Bax of the Security Alliance, a threat group is working to steal data and funds through fake business calls on Zoom . The DPRK-linked players send messages in the chat saying they can’t hear audio, suggesting listeners click on a fake link. Last week, reports revealed that North Korea is targeting Indian crypto job applicants with malware to steal their data.

DOJ Dismantles North Korea-Linked Crypto Theft Scheme, Defendants Stole Nearly $1M

The US Department of Justice (DOJ) has charged four North Koreans for impersonating as remote IT workers and exploiting companies to steal crypto. The federal prosecutors noted that the operation could be a part of the DPRK strategy to fund its weapons program.

In a “cyber-enabled revenue generation network”, perpetrators landed in remote IT jobs using fake and stolen identities. The group exploited their company’s trust to steal and launder over $900,000 in crypto, the DOJ announcement read.

The federal prosecutors from the Northern District of Georgia have charged the defendants with a five-count wire fraud and money laundering indictment linked to the scheme.

“This indictment highlights the unique threat North Korea poses to companies that hire remote IT workers and underscores our resolve to prosecute any actor, in the United States or abroad, who steals from Georgia businesses,” said U.S. Attorney Theodore S. Hertzberg on Monday.

Fraudsters Target Georgia-Based Blockchain Firm, Serbian Crypto Company

The case is being handled by the Federal Bureau of Investigation (FBI) and is part of the DOJ’s ‘DPRK RevGen’ plan that targets high-impact North Korea-linked illicit revenue generation rings.

According to the investigation, the defendants initially operated as a team in the UAE in 2019. Between December 2020 and May 2021, these perpetrators joined a Georgia-based blockchain firm and a Siberian crypto company as developers.

“Both defendants concealed their North Korean identities from their employers by providing false identification documents containing a mix of stolen and fraudulent identity information,” the DOJ revealed.

In February 2022, two of the impersonated employers were assigned projects that provided them access to crypto. The defendants used that access to steal digital assets in two separate operations worth $175,000 and $740,000 at the time. They reportedly modified the source code of two employers’ smart contracts.

DPRK Crypto Attacks Magnify

North Korea has been developing novel and more sophisticated attacks on crypto firms in the recent past. In April, spies from the DPRK infiltrated the US corporate system to feed in a malware campaign targeting crypto developers.

They used fake US firms and domains to post job interviews to trick developers into downloading malware.

Another sophisticated method to steal crypto is via Zoom meetings, and hiding malware in GitHub. According to Nick Bax of the Security Alliance, a threat group is working to steal data and funds through fake business calls on Zoom.

The DPRK-linked players send messages in the chat saying they can’t hear audio, suggesting listeners click on a fake link.

Last week, reports revealed that North Korea is targeting Indian crypto job applicants with malware to steal their data.

Market Opportunity
Threshold Logo
Threshold Price(T)
$0.009205
$0.009205$0.009205
-1.83%
USD
Threshold (T) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Will XRP Price Increase In September 2025?

Will XRP Price Increase In September 2025?

Ripple XRP is a cryptocurrency that primarily focuses on building a decentralised payments network to facilitate low-cost and cross-border transactions. It’s a native digital currency of the Ripple network, which works as a blockchain called the XRP Ledger (XRPL). It utilised a shared, distributed ledger to track account balances and transactions. What Do XRP Charts Reveal? […]
Share
Tronweekly2025/09/18 00:00
Why The Green Bay Packers Must Take The Cleveland Browns Seriously — As Hard As That Might Be

Why The Green Bay Packers Must Take The Cleveland Browns Seriously — As Hard As That Might Be

The post Why The Green Bay Packers Must Take The Cleveland Browns Seriously — As Hard As That Might Be appeared on BitcoinEthereumNews.com. Jordan Love and the Green Bay Packers are off to a 2-0 start. Getty Images The Green Bay Packers are, once again, one of the NFL’s better teams. The Cleveland Browns are, once again, one of the league’s doormats. It’s why unbeaten Green Bay (2-0) is a 8-point favorite at winless Cleveland (0-2) Sunday according to betmgm.com. The money line is also Green Bay -500. Most expect this to be a Packers’ rout, and it very well could be. But Green Bay knows taking anyone in this league for granted can prove costly. “I think if you look at their roster, the paper, who they have on that team, what they can do, they got a lot of talent and things can turn around quickly for them,” Packers safety Xavier McKinney said. “We just got to kind of keep that in mind and know we not just walking into something and they just going to lay down. That’s not what they going to do.” The Browns certainly haven’t laid down on defense. Far from. Cleveland is allowing an NFL-best 191.5 yards per game. The Browns gave up 141 yards to Cincinnati in Week 1, including just seven in the second half, but still lost, 17-16. Cleveland has given up an NFL-best 45.5 rushing yards per game and just 2.1 rushing yards per attempt. “The biggest thing is our defensive line is much, much improved over last year and I think we’ve got back to our personality,” defensive coordinator Jim Schwartz said recently. “When we play our best, our D-line leads us there as our engine.” The Browns rank third in the league in passing defense, allowing just 146.0 yards per game. Cleveland has also gone 30 straight games without allowing a 300-yard passer, the longest active streak in the NFL.…
Share
BitcoinEthereumNews2025/09/18 00:41
Bank of Canada cuts rate to 2.5% as tariffs and weak hiring hit economy

Bank of Canada cuts rate to 2.5% as tariffs and weak hiring hit economy

The Bank of Canada lowered its overnight rate to 2.5% on Wednesday, responding to mounting economic damage from US tariffs and a slowdown in hiring. The quarter-point cut was the first since March and met predictions from markets and economists. Governor Tiff Macklem, speaking in Ottawa, said the decision was unanimous. “With a weaker economy […]
Share
Cryptopolitan2025/09/17 23:09