U.S. Treasury Targets North Korea’s Crypto Laundering Network

TheCryptoTimesPublished on 2025-11-04Last updated on 2025-11-04

The U.S. Department of the Treasury on Tuesday expanded sanctions against a network of North Korea–linked bankers, companies, and facilitators accused of laundering proceeds from cybercrime and illicit IT-worker schemes. 

The Office of Foreign Assets Control (OFAC) designated eight individuals and two entities, including identified bankers and the Korean firm KMCTC, for moving and hiding cryptocurrency and other revenue that the Treasury says funds Pyongyang’s weapons programs.

“North Korean state-sponsored hackers steal and launder money to fund the regime’s nuclear weapons program,” Under Secretary for Terrorism and Financial Intelligence John K. Hurley said in the announcement. OFAC stated that the designated actors managed both crypto and fiat flows, and updated the Specially Designated Nationals (SDN) List with relevant cryptocurrency addresses tied to First Credit Bank.

How money laundering works, and how crypto changes it

Money laundering traditionally follows three steps:

  • Placement: introduce illicit proceeds into the financial system;
  • Layering: obscure the trail through multiple transfers and intermediaries;
  • Integration: reintroduce cleaned funds as apparently legitimate assets.

With cryptocurrencies, exploiters follow the same objectives but change the mechanics. Accounts (addresses) can be created in seconds, funds move across chains at low cost, and swapping, tumblers/mixers, and unregulated venues enable complex layering that obfuscates provenance.

U.s. Treasury Targets North Korea’s Crypto Laundering Network
How crypto money laundering works. Source: UNODC


Unlike cash, crypto enables rapid, scriptable mass transfers that can be routed across dozens of services and jurisdictions, making traditional bank-centric tracking methods insufficient on their own.

The UN Office on Drugs and Crime estimates global money-laundering flows at 2–5% of GDP annually. Blockchain tracing firms and law enforcement increasingly warn that a large share of modern illicit proceeds now moves in crypto form, prompting new regulatory focus on exchange controls, on-chain analytics, and cross-border cooperation.

What OFAC targeted and why it matters

OFAC’s action names specific facilitators and entities tied to laundering networks:

  • North Korean bankers Jang Kuk Chol and Ho Jong Son managed $5.3 million in crypto tied to ransomware and IT-worker operations for First Credit Bank.
  • Korea Mangyongdae Computer Technology Company (KMCTC) and its president, U Yong Su, were sanctioned for running DPRK IT teams in China and laundering funds through proxy accounts.
  • Treasury also identified a wider network using shell firms, offshore reps, and foreign banks, including in China and Russia, to move North Korean money.

Treasury tied these networks to the DPRK’s broader playbook: state-directed cyber theft, sophisticated social-engineering hacks, and contract fraud using coerced or falsified identities among overseas IT workers. OFAC said North Korea-affiliated cybercriminals stole more than $3 billion in crypto over the past three years.

The designations invoke multiple executive orders aimed at countering cyber-enabled crimes and sanctions evasion and expand the SDN entries to include cryptocurrency addresses — a sign that Treasury is treating on-chain identifiers as actionable sanctions targets.

Methods cited in recent DPRK schemes

Treasury’s statement and related reporting highlight recurring DPRK tactics:

  • Fake IDs and proxies: DPRK IT workers hide nationality using false identities and local banking intermediaries.
  • Cross-border laundering: Funds move through shells, lax corridors, and unregulated exchanges to erase trails.
  • Crypto mixers and micro-transfers: Automated splits and merges obscure origins across countless wallets.
  • Remote-hire infiltration: Operatives pose as freelancers to access company systems and steal data or assets.

Past incidents reinforce these methods: law enforcement investigations have connected Lazarus-style groups to major heists and laundering channels that exploit lax controls at small exchanges or OTC desks. High-profile breaches and infiltration attempts have pushed some U.S. firms to tighten hiring and security policies.

Broader context: previous incidents and industry reaction

Treasury’s action comes amid a string of high-profile attacks and corporate responses this year. Exchanges and service providers have tightened onboarding and employee vetting after reported attempts by DPRK operatives to secure contractor roles inside crypto firms. Coinbase, for example, instituted stricter rules for personnel handling sensitive systems after reporting targeted approaches by DPRK IT operatives.

Internationally, incidents such as the Lykke breach and other Lazarus operations have shown how quickly platform failures can cascade into insolvency, regulatory scrutiny, and cross-border enforcement actions. The UK Treasury and EU authorities have repeatedly warned that unchecked stablecoin and crypto flows can pose systemic and cyber risks.

What comes next: enforcement and industry measures

The U.S. Treasury said it will continue to pursue the financial facilitators that enable DPRK schemes, emphasizing collaboration with law enforcement, financial-sector partners, and allied jurisdictions. 

The Treasury’s next steps include expanding the monitoring and designation of cryptocurrency addresses linked to sanctioned entities, increasing scrutiny of banking proxies and cross-border correspondent transactions, and intensifying pressure on exchanges, custodians, and over-the-counter (OTC) desks to strengthen KYC and AML screening while cooperating more closely on freezing and recovering illicit funds.

For crypto firms, the sanctions are a warning shot: tighten identity checks, strengthen on-chain tracking, and lock down fiat gateways, or risk becoming part of the laundering chain.

Bottom line

Treasury’s action signals a hardening stance: sanctions will target not only operational hackers but also the financial pipelines that let state-backed schemes convert stolen crypto into usable revenue.

As OFAC moves to tie on-chain identifiers to enforcement, both crypto firms and traditional banks face growing pressure to shore up controls or risk becoming conduits for illicit state financing. The enforcement push is likely to accelerate cross-border collaboration and, for the industry, force faster adoption of stronger compliance and operational defenses.

Also read: Curve Finance Warns DeFi Developers After $116M Balancer Hack


Mobile Only Image

Related Reads

The Veil of Mythos Becomes Anthropic's Lever to Move Trillions

The article discusses Anthropic's reported upcoming $30 billion funding round, which would value the company at over $900 billion. It analyzes how the company has leveraged strategic narratives around its unreleased "Mythos" model, rather than just its publicly available products, to drive this massive valuation. Key points include Google's surprising $40 billion investment in a competitor, suggesting it is buying strategic positioning. Anthropic's "Glasswing" cybersecurity project and the unreleased Mythos model are portrayed not through direct proof, but through carefully crafted narratives of being "too powerful for public release," creating an aura of exclusive, high-level capability. This is bolstered by reports of the White House and NSA seeking access to Claude/Mythos despite previous security concerns, implying indispensable technology. Furthermore, Anthropic's reported rapid revenue growth—from a $1 billion annual run-rate in late 2024 to over $30 billion by April 2026, largely driven by enterprise API and Claude Code—provides a financial story for investors. The article concludes that Anthropic's core business model is effectively converting unverifiable technical potential, government interest, and future revenue projections into a compelling narrative that secures immense capital, using the actions of wealthy investors and powerful institutions as the ultimate validation of its worth.

marsbit1h ago

The Veil of Mythos Becomes Anthropic's Lever to Move Trillions

marsbit1h ago

Google CEO Admits Lagging Behind in Coding

Google CEO Sundar Pichai acknowledged in a recent interview that Google's Gemini AI models are currently "lagging behind" in coding capabilities, particularly for complex, long-horizon tasks requiring advanced developer expertise. He noted the field is advancing at an "unprecedented" pace, where 30-60 days now brings changes equivalent to five years in the past. Pichai expressed that achieving Artificial General Intelligence (AGI) now seems closer than previously imagined due to rapid progress. While highlighting strengths in text, multimodal, and reasoning tasks, Pichai admitted competitors like Anthropic and OpenAI have focused more intently on coding. He emphasized Google's commitment to catching up, citing internal tools like Antigravity 2.0 and the newly released Gemini 3.5 Flash, which aims to address previous shortcomings. Regarding Google Search's AI-driven overhaul, Pichai stated changes will be gradual to align with user needs, not disrupt the core search experience or its advertising model. He addressed public AI anxiety as understandable, given the technology's potential to reshape jobs and society, but remained optimistic about AI augmenting human capabilities and creating new opportunities. Pichai stressed the need for broad societal dialogue and responsible development as AI approaches more advanced, potentially recursive self-improvement stages. He affirmed Google's long-term commitment to leading in AI while navigating its profound implications responsibly.

marsbit3h ago

Google CEO Admits Lagging Behind in Coding

marsbit3h ago

The Paradox of Automation: The Stronger the AI, the Busier Humans Become

The Paradox of Automation: The more powerful AI becomes, the more work humans have to do. This article, based on observations from AI-heavy company Every, argues that while AI agents automate tasks like coding, writing, and customer service, they don't eliminate human jobs. Instead, they transform work and create *more* demand for human expertise. AI commoditizes "yesterday's human capabilities" by cheaply generating code, text, and images from past data. This leads to an abundance of similar, generic outputs. Consequently, what becomes scarce and valuable is human judgment in the present moment: knowing *what* is worth doing, *why*, and *how* to do it well. The article identifies two collaboration models: "Agent employees" for delegated tasks and "human-AI collaboration" within tools like Claude Code for complex work. In both cases, humans are essential to set direction, judge quality, and maintain systems. As AI makes execution cheap, human roles shift from executors to designers, reviewers, and meaning-makers. The author addresses "benchmark anxiety" by explaining that AI excels within specific, human-defined problem "frames." As AI masters one frame (e.g., code rewriting), new, more complex frames emerge (e.g., deciding *when* to rewrite). This creates an ongoing cycle where AI chases the frames, but humans remain the "framers." Even with advanced AGI, this dynamic may persist as long as AI lacks true human-like agency and self-directed purpose. The core paradox holds: automation amplifies the need for the very human judgment it seems to replace.

marsbit4h ago

The Paradox of Automation: The Stronger the AI, the Busier Humans Become

marsbit4h ago

Trading

Spot
Futures

Hot Articles

Discussions

Welcome to the HTX Community. Here, you can stay informed about the latest platform developments and gain access to professional market insights. Users' opinions on the price of S (S) are presented below.

活动图片