Crypto Investigator Exposes North Korea’s Secret $1 Million A Month Scheme

bitcoinistОпубликовано 2026-04-09Обновлено 2026-04-09

Введение

Cryptocurrency investigator ZachXBT exposed a North Korean state-sponsored IT worker scheme generating over $1 million per month. An infostealer malware breach revealed an internal payment server (luckyguys[.]site) used by DPRK operatives to manage crypto payments and fake identities. The data included chat logs, transaction histories, and organizational details, showing over $3.5 million flowed through linked wallets since late 2025. Workers posed as freelancers, used fabricated identities, and targeted DeFi projects. The operation, though less sophisticated than other DPRK hacking groups, highlights the regime's use of crypto for revenue generation and sanctions evasion. The site was taken down after the report.

Crypto detective ZachXBT uncovered an internal North Korean payment server tied to 390+ accounts, chat logs, and transaction histories.

The DPRK Crypto-Infiltration Saga, Part III (From This Week Only)

The North Korean secret crypto-agents saga continues. The hidden network of North Korea–aligned crypto hackers have been slowly exposed on the social network X these past days, following the attribution of the April 1st $285 million attack on Drift Protocol to UNC4736, a North Korea–aligned, state‐sponsored hacking group.

On Sunday, security researcher Taylor Monahan claimed that North Korean IT workers have quietly worked inside more than 40 DeFi projects over roughly seven years. Also on Sunday and Monday, multiple crypto industry actors shared videos and stories of North Korean IT workers failing the “Kim Jong-Un Test”.

Now, it was ZachXBT turn to publish his findings, which he did yesterday on a thread on the social network X. The exfiltrated data, that hadn’t been publicly released before, was shared with him by an anonymous source.

The extraction of the data was possible because one of this IT workers workers from the Democratic People’s Republic of Korea (DPRK) had his device infected with an infostealer (malware designed specifically to steal sensitive information). The malware exposed IPMsg chat logs, fabricated identities, and detailed browser activity.

The thread walks through how DPRK IT agents, often posing as freelancers abroad, are allegedly getting paid in crypto and funneled back into regime‐linked channels.

A Breakdown Of The Findings

The website that surfaced from the data extraction was called luckyguys.site. According to the crypto detective, it appeared to function as an internal payment remittance hub: a Discord‐like messaging platform where DPRK IT operatives reported and reconciled their crypto payments with superiors.

Believe it or not, the site’s default login password was set to “123456”. At the moment of the data extraction, ten accounts were still using it unchanged.

The 123456 password. Source. ZachXBT on X.

The account roster showed roles, Korean names, locations, and internal group codes that align with known North Korean IT worker structures. ZachXBT highlighted that three of the companies referenced in the data, Sobaeksu, Saenal, and Songkwang, are already subject to OFAC sanctions.

The crypto investigator shared a video showing direct messages from one WebMsg account, “Rascal”, with PC‐1234 (the server admin account) that spell out payment transfers and the use of fake identities from December 2025 to April 2026. Every payment in these chats is routed and finalized via PC‐1234. The logs also reference Hong Kong addresses for billing and delivery of goods, although whether those details are genuine still needs to be confirmed.

The findings only grow more interesting as the thread advances. Since late November 2025, more than $3.5 million has flowed into the payment wallets. The same remittance pattern shows up again and again: users either send crypto in directly from an exchange or service, or off‐ramp into fiat via Chinese bank accounts using platforms such as Payoneer.

After that, PC‐1234 acknowledges the incoming funds and hands over login credentials, which can be for different crypto exchanges or fintech payment apps, depending on the specific user.

A Reconstruction Of The Network’s Hierarchy

The crypto detective reconstructed the network’s entire organizational hierarchy using the full dataset and made an interactive version of this org chart.

DPRK IT Workers - Organizational Structure. Source: ZachXBT on X.

When the investigator followed the internal payment wallets on‐chain, he found connections to several already‐attributed DPRK IT worker clusters. The Tron‐based wallet was frozen by Tether in December 2025.

Other interesting findings show that the compromised device, which belonged to someone called “Jerry”, still had Astrill VPN in use, along with multiple fabricated identities being used to apply for jobs. Inside an internal Slack workspace, a user named “Nami” shared a blog post about a deepfake job applicant linked to DPRK IT workers. One colleague asked if the story was about them, while another reminded the group they weren’t allowed to post external links.

Jerry exchanged messages with another North Korean IT worker about plans to steal from a project, using a Nigerian proxy to target Arcano, a GalaChain game. If that attack was ever carried out or not is unclear.

The admin also distributed 43 Hex-Rays/IDA Pro training materials to the group between November 2025 and February 2026. These sessions focused on disassembly, decompilation, both local and remote debugging, and a range of cybersecurity techniques. One link shared on November 20 was explicitly titled: “using-ida-debugger-to-unpack-an-hostile-pe-executable”.

Final Thoughts

ZachXBT closing image for the thread. Source: ZachXBT on X.

ZachXBT concluded that this DPRK IT worker cluster appears relatively unsophisticated compared with outfits like AppleJeus and TraderTraitor, which run much tighter operations and pose a far greater systemic threat to the crypto industry. His earlier estimated that North Korean IT workers collectively pull in several million dollars a month is reinforced by this dataset.

Today, the investigator posted an update explaining that the internal DPRK payment portal has been pulled offline following the publication of his findings. All of the data was fully captured and archived beforehand.

Crypto is now deeply embedded in geopolitical shadow economies. On‐chain transparency cuts both ways for users and adversaries.

It wouldn’t be surprising if markets start to price higher compliance costs for CEXs and OTC desks, or if there is more friction for stablecoin flows in sanctioned regions. The North Korean saga surely raises the odds of more aggressive enforcement against cross‐border flows, privacy tools, and high‐risk venues.

Yesterday, Bitcoin bounced back and reclaimed $72k. At the moment of writing, BTC trades for around $71k on the daily chart. Source: BTCUSDT on Tradingview.

Cover image from Perplexity. BTCUSDT chart from Tradingview.

Связанные с этим вопросы

QWhat did crypto detective ZachXBT uncover about North Korea's crypto operations?

AZachXBT uncovered an internal North Korean payment server tied to over 390 accounts, chat logs, and transaction histories, revealing a scheme where DPRK IT workers pose as freelancers to earn and funnel crypto back to regime-linked channels.

QHow was the data about the DPRK IT worker network obtained?

AThe data was obtained because a DPRK IT worker's device was infected with an infostealer malware, which exposed IPMsg chat logs, fabricated identities, and detailed browser activity.

QWhat was the purpose of the website 'luckyguys.site' discovered in the investigation?

AThe website 'luckyguys.site' functioned as an internal payment remittance hub where DPRK IT operatives reported and reconciled their crypto payments with superiors, using a Discord-like messaging platform.

QHow much money was received by the payment wallets linked to the DPRK network since late November 2025?

ASince late November 2025, over $3.5 million was received across the payment wallet addresses linked to the DPRK IT worker network.

QWhat happened to the internal DPRK payment portal after ZachXBT published his findings?

AThe internal DPRK payment portal was taken offline following the publication of ZachXBT's findings, though all data had been fully captured and archived beforehand.

Похожее

AI Giants Enter the Dark Forest

In the AI industry's "dark forest," major players like Anthropic, OpenAI, and DeepSeek are strategically withholding their most advanced models to avoid becoming targets in a high-stakes competitive landscape. Anthropic released Claude Opus 4.7 but admitted it underperforms compared to their unreleased model Mythos, citing safety concerns. They delayed addressing user complaints about performance regression until OpenAI’s GPT-5.5 launch, highlighting a tactic of controlled disclosure aligned with competitors’ moves. OpenAI’s GPT-5.5, though a full retrain since GPT-4.5, was seen as incremental rather than revolutionary. Leaks revealed internal models like Glacier and Heisenberg, indicating significant unreleased capabilities. OpenAI acknowledges a "capability overhang," where real model power exceeds what users experience, often due to infrastructure-driven throttling. DeepSeek launched V4 Preview, a cost-efficient model, but its full potential (V4 Pro Max) awaits Huawei’s Ascend 950 super-nodes量产 in late 2026. Their strategy focuses on affordability and scalability, aiming to democratize AI access globally, a move noted even by NVIDIA’s CEO as a disruptive threat. Together, these actions reflect a broader trend: leading AI labs are deliberately pacing releases, hiding strengths, and aligning disclosures with competitive dynamics—each avoiding the risk of exposure in a forest where first movers become targets.

marsbit1 ч. назад

AI Giants Enter the Dark Forest

marsbit1 ч. назад

Торговля

Спот
Фьючерсы

Популярные статьи

Как купить S

Добро пожаловать на HTX.com! Мы сделали приобретение Sonic (S) простым и удобным. Следуйте нашему пошаговому руководству и отправляйтесь в свое крипто-путешествие.Шаг 1: Создайте аккаунт на HTXИспользуйте свой адрес электронной почты или номер телефона, чтобы зарегистрироваться и бесплатно создать аккаунт на HTX. Пройдите удобную регистрацию и откройте для себя весь функционал.Создать аккаунтШаг 2: Перейдите в Купить криптовалюту и выберите свой способ оплатыКредитная/Дебетовая Карта: Используйте свою карту Visa или Mastercard для мгновенной покупки Sonic (S).Баланс: Используйте средства с баланса вашего аккаунта HTX для простой торговли.Третьи Лица: Мы добавили популярные способы оплаты, такие как Google Pay и Apple Pay, для повышения удобства.P2P: Торгуйте напрямую с другими пользователями на HTX.Внебиржевая Торговля (OTC): Мы предлагаем индивидуальные услуги и конкурентоспособные обменные курсы для трейдеров.Шаг 3: Хранение Sonic (S)После приобретения вами Sonic (S) храните их в своем аккаунте на HTX. В качестве альтернативы вы можете отправить их куда-либо с помощью перевода в блокчейне или использовать для торговли с другими криптовалютами.Шаг 4: Торговля Sonic (S)С легкостью торгуйте Sonic (S) на спотовом рынке HTX. Просто зайдите в свой аккаунт, выберите торговую пару, совершайте сделки и следите за ними в режиме реального времени. Мы предлагаем удобный интерфейс как для начинающих, так и для опытных трейдеров.

1.2k просмотров всегоОпубликовано 2025.01.15Обновлено 2025.03.21

Как купить S

Sonic: Обновления под руководством Андре Кронье – новая звезда Layer-1 на фоне спада рынка

Он решает проблемы масштабируемости, совместимости между блокчейнами и стимулов для разработчиков с помощью технологических инноваций.

2.2k просмотров всегоОпубликовано 2025.04.09Обновлено 2025.04.09

Sonic: Обновления под руководством Андре Кронье – новая звезда Layer-1 на фоне спада рынка

HTX Learn: Пройдите обучение по "Sonic" и разделите 1000 USDT

HTX Learn — ваш проводник в мир перспективных проектов, и мы запускаем специальное мероприятие "Учитесь и Зарабатывайте", посвящённое этим проектам. Наше новое направление .

1.8k просмотров всегоОпубликовано 2025.04.10Обновлено 2025.04.10

HTX Learn: Пройдите обучение по "Sonic" и разделите 1000 USDT

Обсуждения

Добро пожаловать в Сообщество HTX. Здесь вы сможете быть в курсе последних новостей о развитии платформы и получить доступ к профессиональной аналитической информации о рынке. Мнения пользователей о цене на S (S) представлены ниже.

活动图片