U.S. Treasury Sanctions Network Linked to North Korean Crypto Fraud

TheNewsCryptoPublicado a 2026-03-13Actualizado a 2026-03-13

Resumen

The U.S. Treasury has sanctioned a network tied to North Korean IT workers involved in global cryptocurrency fraud schemes. These operatives used stolen identities and fake documents to secure remote IT jobs, then funneled their earnings to the North Korean government to fund weapons and ballistic missile programs. Many operated from countries like China and Russia while posing as legitimate employees, with companies unknowingly hiring them for software and crypto-related projects. Authorities linked the network to other cybercrimes, including hacking and identity fraud, which have generated billions in stolen crypto assets. Organizations are urged to strengthen identity checks to avoid inadvertently supporting sanctioned entities.

The United States Department of the Treasury sanctioned a network linked to North Korean IT workers. They were running cryptocurrency fraud schemes across the world. Reports indicate that the operatives secretly acquired remote IT jobs. Then, they redirected their earnings to the North Korean government through these networks. Investigators believe the program earned substantial revenues and used them to support Pyongyang’s weapons and ballistic missile programs worldwide. Reports indicate that North Korean operatives used stolen identities and fabricated documents to acquire remote IT jobs globally.

It is reported that many of these workers were operating in countries such as China and Russia. This was done while presenting themselves as legitimate workers worldwide. It is reported that many companies unknowingly recruited these workers to develop software, infrastructure, and cryptocurrency platforms globally. Michael Faulkender said that authorities will seek to block revenue channels that fund destabilizing activities in North Korea globally.

Cybercrime Network Raises Crypto Industry Security Concerns

Faulkender stated that the authorities remain committed to disrupting these cyber-enabled revenue operations in support of Pyongyang’s weapons development programs worldwide today. The investigators also associated the network with other worldwide cybercrime operations. Investigators recently revealed that operatives targeted cryptocurrency organizations and blockchain developers worldwide.

Security authorities have estimated that North Korea-sponsored cyberhackers stole billions from cryptocurrency organizations worldwide in recent years worldwide recently. Experts have revealed that these operations involve a combination of hacking activities, identity fraud schemes, and remote employment strategies. This was to raise revenue in cryptocurrencies worldwide.

Security authorities have urged organizations to heighten their identity verification when hiring remote technology workers worldwide in the global market. They have stated that this can help organizations avoid unknowingly remitting money to sanctioned networks associated with North Korea’s worldwide cyber operations and activities. The latest sanctions have revealed the ongoing efforts to restrict revenue streams associated with North Korea’s worldwide cyber activities and operations.

Highlighted Crypto News:

Kraken Announces Pi Network Listing Ahead of Pi Day, Boosting Interest in PI Coin

TagsBlockchainNorth KoreaU.SUS Treasury

Preguntas relacionadas

QWhat did the U.S. Treasury sanction in relation to North Korean IT workers?

AThe U.S. Treasury sanctioned a network linked to North Korean IT workers who were running cryptocurrency fraud schemes worldwide.

QHow did the North Korean operatives acquire remote IT jobs according to the report?

AThey used stolen identities and fabricated documents to secretly obtain remote IT jobs globally.

QWhat was the primary purpose of the revenue generated by this fraudulent program?

AThe substantial revenues earned were used to support Pyongyang's weapons and ballistic missile programs.

QWhich countries were mentioned as locations where many of these operatives were working?

AMany of these workers were operating in countries such as China and Russia.

QWhat did security authorities recommend to organizations hiring remote technology workers?

AThey urged organizations to heighten their identity verification processes to avoid unknowingly sending money to sanctioned networks.

Lecturas Relacionadas

a16z: AI's 'Amnesia', Can Continuous Learning Cure It?

The article "a16z: AI's 'Amnesia' – Can Continual Learning Cure It?" explores the limitations of current large language models (LLMs), which, like the protagonist in the film *Memento*, are trapped in a perpetual present—unable to form new memories after training. While methods like in-context learning (ICL), retrieval-augmented generation (RAG), and external scaffolding (e.g., chat history, prompts) provide temporary solutions, they fail to enable true internalization of new knowledge. The authors argue that compression—the core of learning during training—is halted at deployment, preventing models from generalizing, discovering novel solutions (e.g., mathematical proofs), or handling adversarial scenarios. The piece introduces *continual learning* as a critical research direction to address this, categorizing approaches into three paths: 1. **Context**: Scaling external memory via longer context windows, multi-agent systems, and smarter retrieval. 2. **Modules**: Using pluggable adapters or external memory layers for specialization without full retraining. 3. **Weights**: Enabling parameter updates through sparse training, test-time training, meta-learning, distillation, and reinforcement learning from feedback. Challenges include catastrophic forgetting, safety risks, and auditability, but overcoming these could unlock models that learn iteratively from experience. The conclusion emphasizes that while context-based methods are effective, true breakthroughs require models to compress new information into weights post-deployment, moving from mere retrieval to genuine learning.

marsbitHace 49 min(s)

a16z: AI's 'Amnesia', Can Continuous Learning Cure It?

marsbitHace 49 min(s)

Can a Hair Dryer Earn $34,000? Deciphering the Reflexivity Paradox in Prediction Markets

An individual manipulated a weather sensor at Paris Charles de Gaulle Airport with a portable heat source, causing a Polymarket weather market to settle at 22°C and earning $34,000. This incident highlights a fundamental issue in prediction markets: when a market aims to reflect reality, it also incentivizes participants to influence that reality. Prediction markets operate on two layers: platform rules (what outcome counts as a win) and data sources (what actually happened). While most focus on rules, the real vulnerability lies in the data source. If reality is recorded through a specific source, influencing that source directly affects market settlement. The article categorizes markets by their vulnerability: 1. **Single-point physical data sources** (e.g., weather stations): Easily manipulated through physical interference. 2. **Insider information markets** (e.g., MrBeast video details): Insiders like team members use non-public information to trade. Kalshi fined a剪辑师 $20,000 for insider trading. 3. **Actor-manipulated markets** (e.g., Andrew Tate’s tweet counts): The subject of the market can control the outcome. Evidence suggests Tate’sociated accounts coordinated to profit. 4. **Individual-action markets** (e.g., WNBA disruptions): A single person can execute an event to profit from their pre-placed bets. Kalshi and Polymarket handle these issues differently. Kalshi enforces strict KYC, publicly penalizes insider trading, and reports to regulators. Polymarket, with its anonymous wallet-based system, has historically been more permissive, arguing that insider information improves market accuracy. However, it cooperated with authorities in the "Van Dyke case," where a user traded on classified government information. The core paradox is reflexivity: prediction markets are designed to discover truth, but their financial incentives can distort reality. The more valuable a prediction becomes, the more likely participants are to influence the event itself. The market ceases to be a mirror of reality and instead shapes it.

marsbitHace 1 hora(s)

Can a Hair Dryer Earn $34,000? Deciphering the Reflexivity Paradox in Prediction Markets

marsbitHace 1 hora(s)

Trading

Spot
Futuros
活动图片