Article Details

Scrape Timestamp (UTC): 2025-01-17 10:09:12.167

Source: https://thehackernews.com/2025/01/us-sanctions-north-korean-it-worker.html

Original Article Text

Click to Toggle View

U.S. Sanctions North Korean IT Worker Network Supporting WMD Programs. The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) sanctioned two individuals and four entities for their alleged involvement in illicit revenue generation schemes for the Democratic People's Republic of Korea (DPRK) by dispatching IT workers around the world to obtain employment and draw a steady source of income for the regime in violation of international sanctions. "These IT workers obfuscate their identities and locations to fraudulently obtain freelance employment contracts from clients around the world for IT projects, such as software and mobile application development," the Treasury Department said. "The DPRK government withholds up to 90% of the wages earned by these overseas workers, thereby generating annual revenues of hundreds of millions of dollars for the Kim regime's weapons programs to include weapons of mass destruction (WMD) and ballistic missile programs." The action represents the latest salvo in the U.S. government's ongoing efforts to crack down on the various financially motivated streams that aim to further Pyongyang's strategic objectives. The individuals and companies that have been sanctioned by OFAC are listed below - Both the front companies are alleged to have used false identities and aliases to communicate with clients and undertake software development work for companies across the world. The fraudulent IT worker scheme attracted mainstream attention in 2023, although it's believed that such operations have been ongoing since at least 2018, when the Treasury sanctioned two companies Yanbian Silverstar and Volasys Silver Star for the "exportation of workers from North Korea, including exportation to generate revenue for the Government of North Korea or the Workers' Party of Korea." The activity cluster is tracked by the cybersecurity community under the monikers Famous Chollima, Nickel Tapestry, UNC5267, and Wagemole. Recent analyses have found that North Korean IT workers have been increasingly infiltrating cryptocurrency and Web3 companies and "compromising their networks, operations, and integrity." The insider threat operation has also identified people in the U.S. who are willing to support their schemes by running laptop farms in exchange for a monthly fee. Heightened public disclosures about these campaigns have further led to a surge in extortion attempts by stealing intellectual property from the companies they work for and demanding "more cryptocurrency than they ever have before" for not releasing it publicly or giving it away to rivals, Google-owned Mandiant told The Record. That having said, the IT worker operation is just one of the many methods North Korea employs to illegally generate revenue. DPRK state-sponsored hacking groups have a long history of targeting developers with job-themed lures to deliver various kinds of malware that are capable of facilitating data and cryptocurrency theft. "The DPRK continues to rely on its thousands of overseas IT workers to generate revenue for the regime, to finance its illegal weapons programs, and to enable its support of Russia's war in Ukraine," said Acting Under Secretary of the Treasury for Terrorism and Financial Intelligence Bradley T. Smith. "The United States remains resolved to disrupt these networks, wherever they operate, that facilitate the regime's destabilizing activities."

Daily Brief Summary

NATION STATE ACTIVITY // U.S. Sanctions Target North Korean IT Workers Funding WMD Programs

The U.S. Treasury Department sanctioned two individuals and four entities for generating illicit revenue for North Korea through global IT employment.

Sanctioned North Korean IT workers hide their identities to secure freelance IT contracts worldwide, violating international sanctions.

A significant portion of the wages earned by these workers, up to 90%, is appropriated by the North Korean government to fund its weapons of mass destruction and missile programs.

These schemes have been under scrutiny since at least 2018, and involve exporting workers to generate regime revenue, under aliases and fraudulent identities.

The operations, known under various monikers such as Famous Chollima and Nickel Tapestry, have recently targeted cryptocurrency and Web3 companies, leading to network compromises.

Increased public awareness of these activities has led to a rise in intellectual property theft and extortion, demanding substantial cryptocurrency ransoms.

The U.S. continues efforts to disrupt these networks which support not only North Korea's illegal weapons programs but also its involvement in global destabilizing activities.