Fake IT workers allegedly sending crypto to North Korea
“For years, North Korea has exploited global remote IT contracting and cryptocurrency ecosystems to evade U.S. sanctions and bankroll its weapons programs,” Sue J. Bai, head of the DOJ’s National Security Division, is quoted as saying in the government press release. According to the DOJ, an FBI investigation is said to have revealed a “massive campaign” involving remote IT workers infiltrating U.S. businesses with fraudulent identities, or identities stolen from American citizens. “These tactics hid the North Koreans’ true location and identities, causing unwitting employers to hire them and pay them a salary, often in stablecoins, such as USDC and USDT,” the release notes. To obfuscate the money and send funds back to North Korea, workers allegedly used the following tactics:- Fake accounts
- Micro-transactions
- Chain-hopping/Token-swapping
- Hiding value in NFTs (non-fungible tokens)
- Using U.S.-based accounts to “legitimize” activity
- Crypto mixing
US government use of crypto, fiat also criticized
U.S. Attorney Jeanine Ferris Pirro said of the forfeiture action: “Crime may pay in other countries but that’s not how it works here,” noting that “We will halt your progress, strike back, and take hold of any proceeds you obtained illegally.” Some might take issue with Pirro about that. And with Sue J. Bai about the bankrolling of weapons programs. In recent years, hundreds of millions of dollars in cryptocurrency have been funneled to “socially acceptable” U.S.-backed military initiatives in Ukraine, including for “lethal equipment.”Cryptopolitan Academy: Tired of market swings? Learn how DeFi can help you build steady passive income. Register Now