Crypto Investigator Exposes North Korea’s Secret $1 Million A Month Scheme

bitcoinistОпубликовано 2026-04-09Обновлено 2026-04-09

Введение

Cryptocurrency investigator ZachXBT exposed a North Korean state-sponsored IT worker scheme generating over $1 million per month. An infostealer malware breach revealed an internal payment server (luckyguys[.]site) used by DPRK operatives to manage crypto payments and fake identities. The data included chat logs, transaction histories, and organizational details, showing over $3.5 million flowed through linked wallets since late 2025. Workers posed as freelancers, used fabricated identities, and targeted DeFi projects. The operation, though less sophisticated than other DPRK hacking groups, highlights the regime's use of crypto for revenue generation and sanctions evasion. The site was taken down after the report.

Crypto detective ZachXBT uncovered an internal North Korean payment server tied to 390+ accounts, chat logs, and transaction histories.

The DPRK Crypto-Infiltration Saga, Part III (From This Week Only)

The North Korean secret crypto-agents saga continues. The hidden network of North Korea–aligned crypto hackers have been slowly exposed on the social network X these past days, following the attribution of the April 1st $285 million attack on Drift Protocol to UNC4736, a North Korea–aligned, state‐sponsored hacking group.

On Sunday, security researcher Taylor Monahan claimed that North Korean IT workers have quietly worked inside more than 40 DeFi projects over roughly seven years. Also on Sunday and Monday, multiple crypto industry actors shared videos and stories of North Korean IT workers failing the “Kim Jong-Un Test”.

Now, it was ZachXBT turn to publish his findings, which he did yesterday on a thread on the social network X. The exfiltrated data, that hadn’t been publicly released before, was shared with him by an anonymous source.

The extraction of the data was possible because one of this IT workers workers from the Democratic People’s Republic of Korea (DPRK) had his device infected with an infostealer (malware designed specifically to steal sensitive information). The malware exposed IPMsg chat logs, fabricated identities, and detailed browser activity.

The thread walks through how DPRK IT agents, often posing as freelancers abroad, are allegedly getting paid in crypto and funneled back into regime‐linked channels.

A Breakdown Of The Findings

The website that surfaced from the data extraction was called luckyguys.site. According to the crypto detective, it appeared to function as an internal payment remittance hub: a Discord‐like messaging platform where DPRK IT operatives reported and reconciled their crypto payments with superiors.

Believe it or not, the site’s default login password was set to “123456”. At the moment of the data extraction, ten accounts were still using it unchanged.

The 123456 password. Source. ZachXBT on X.

The account roster showed roles, Korean names, locations, and internal group codes that align with known North Korean IT worker structures. ZachXBT highlighted that three of the companies referenced in the data, Sobaeksu, Saenal, and Songkwang, are already subject to OFAC sanctions.

The crypto investigator shared a video showing direct messages from one WebMsg account, “Rascal”, with PC‐1234 (the server admin account) that spell out payment transfers and the use of fake identities from December 2025 to April 2026. Every payment in these chats is routed and finalized via PC‐1234. The logs also reference Hong Kong addresses for billing and delivery of goods, although whether those details are genuine still needs to be confirmed.

The findings only grow more interesting as the thread advances. Since late November 2025, more than $3.5 million has flowed into the payment wallets. The same remittance pattern shows up again and again: users either send crypto in directly from an exchange or service, or off‐ramp into fiat via Chinese bank accounts using platforms such as Payoneer.

After that, PC‐1234 acknowledges the incoming funds and hands over login credentials, which can be for different crypto exchanges or fintech payment apps, depending on the specific user.

A Reconstruction Of The Network’s Hierarchy

The crypto detective reconstructed the network’s entire organizational hierarchy using the full dataset and made an interactive version of this org chart.

DPRK IT Workers - Organizational Structure. Source: ZachXBT on X.

When the investigator followed the internal payment wallets on‐chain, he found connections to several already‐attributed DPRK IT worker clusters. The Tron‐based wallet was frozen by Tether in December 2025.

Other interesting findings show that the compromised device, which belonged to someone called “Jerry”, still had Astrill VPN in use, along with multiple fabricated identities being used to apply for jobs. Inside an internal Slack workspace, a user named “Nami” shared a blog post about a deepfake job applicant linked to DPRK IT workers. One colleague asked if the story was about them, while another reminded the group they weren’t allowed to post external links.

Jerry exchanged messages with another North Korean IT worker about plans to steal from a project, using a Nigerian proxy to target Arcano, a GalaChain game. If that attack was ever carried out or not is unclear.

The admin also distributed 43 Hex-Rays/IDA Pro training materials to the group between November 2025 and February 2026. These sessions focused on disassembly, decompilation, both local and remote debugging, and a range of cybersecurity techniques. One link shared on November 20 was explicitly titled: “using-ida-debugger-to-unpack-an-hostile-pe-executable”.

Final Thoughts

ZachXBT closing image for the thread. Source: ZachXBT on X.

ZachXBT concluded that this DPRK IT worker cluster appears relatively unsophisticated compared with outfits like AppleJeus and TraderTraitor, which run much tighter operations and pose a far greater systemic threat to the crypto industry. His earlier estimated that North Korean IT workers collectively pull in several million dollars a month is reinforced by this dataset.

Today, the investigator posted an update explaining that the internal DPRK payment portal has been pulled offline following the publication of his findings. All of the data was fully captured and archived beforehand.

Crypto is now deeply embedded in geopolitical shadow economies. On‐chain transparency cuts both ways for users and adversaries.

It wouldn’t be surprising if markets start to price higher compliance costs for CEXs and OTC desks, or if there is more friction for stablecoin flows in sanctioned regions. The North Korean saga surely raises the odds of more aggressive enforcement against cross‐border flows, privacy tools, and high‐risk venues.

Yesterday, Bitcoin bounced back and reclaimed $72k. At the moment of writing, BTC trades for around $71k on the daily chart. Source: BTCUSDT on Tradingview.

Cover image from Perplexity. BTCUSDT chart from Tradingview.

Связанные с этим вопросы

QWhat did crypto detective ZachXBT uncover about North Korea's crypto operations?

AZachXBT uncovered an internal North Korean payment server tied to over 390 accounts, chat logs, and transaction histories, revealing a scheme where DPRK IT workers pose as freelancers to earn and funnel crypto back to regime-linked channels.

QHow was the data about the DPRK IT worker network obtained?

AThe data was obtained because a DPRK IT worker's device was infected with an infostealer malware, which exposed IPMsg chat logs, fabricated identities, and detailed browser activity.

QWhat was the purpose of the website 'luckyguys.site' discovered in the investigation?

AThe website 'luckyguys.site' functioned as an internal payment remittance hub where DPRK IT operatives reported and reconciled their crypto payments with superiors, using a Discord-like messaging platform.

QHow much money was received by the payment wallets linked to the DPRK network since late November 2025?

ASince late November 2025, over $3.5 million was received across the payment wallet addresses linked to the DPRK IT worker network.

QWhat happened to the internal DPRK payment portal after ZachXBT published his findings?

AThe internal DPRK payment portal was taken offline following the publication of ZachXBT's findings, though all data had been fully captured and archived beforehand.

Похожее

From Survival to Accelerated Growth: The Journey of Zcash's Three-Year Rise as Told by the Founder of ZODL

**From Survival to Accelerated Growth: Zcash Founder Details the 3-Year Rise** Three years ago, Zcash (ZEC) was a struggling pioneer in privacy technology, with a price near $30, low shielded supply (11%), and a community mired in governance disputes. Today, ZEC trades around $600, with over 31% of its supply (~$3B) in user-controlled shielded pools. This transformation resulted from breaking key constraints. First, **governance shackles were removed**. The old model guaranteed funding to two entities (ECC and ZF) regardless of performance, creating a monopoly. In 2024, ECC rejected further direct funding, forcing a change. The NU6 upgrade ended direct funding, allocating 8% to community grants and 12% to a protocol-controlled treasury for retroactive rewards, expiring in 2028 unless renewed by overwhelming consensus. The entities also relinquished their trademark-based veto power, freeing community governance. Second, the **product focus shifted** from pure cryptography to user growth. Previously, engineering excelled at privacy tech but failed to attract users. In early 2024, the team (later ZODL) pivoted to building products users wanted, like the Zodl wallet (default privacy, hardware support, cross-asset swaps). This drove shielded supply to grow over 400% in ZEC terms, with 86.5% of recent transactions being shielded, representing real user adoption. Third, the **narrative evolved** from the limiting "privacy coin" label to "unstoppable private money." This clarified Zcash's value proposition: a Bitcoin-like monetary policy with verifiable private payments via advanced cryptography. This structural narrative—protocol (Zcash), asset (ZEC), gateway (Zodl)—enabled broader exchange listings, institutional interest, and ETF filings. Finally, **organizational constraints were broken**. In early 2026, the ECC team left its non-profit structure after disputes over control, forming Zcash Open Development Lab (ZODL). ZODL raised $25M from top VCs (Paradigm, a16z, etc.), gaining the capital and agility of a startup to scale consumer products. Current metrics show strong momentum: social discussion volume for ZEC surged 15,245% in a year, with 81% positive sentiment. The focus is now on enhancing user experience (Zodl wallet), scalability (Tachyon project targeting Visa-level throughput with 25-second blocks), and post-quantum security (quantum-recoverable wallets coming soon). Zcash is positioned to become faster, more usable, scalable, and quantum-resistant.

marsbit7 мин. назад

From Survival to Accelerated Growth: The Journey of Zcash's Three-Year Rise as Told by the Founder of ZODL

marsbit7 мин. назад

Five Counterparty Risk Architectures: A Settlement-Layer Methodology for Classifying TradFi Models in Crypto Exchanges

**Summary:** This companion piece reframes the five TradFi-on-crypto exchange architectures, previously classified by "architectural fingerprint," through the lens of counterparty risk. The core question is: whose balance sheet bears the loss first in a stress scenario, and has it historically done so? Each of the five models corresponds to a distinct risk holder with its own documented failure modes. * **Model 1 (Stablecoin-Settled CEX Perpetuals):** Risk is held by the stablecoin issuer (e.g., reserve composition, bank connectivity) and the CEX's own book. History includes Tether's banking disconnections (2017) and reserve misrepresentations (CFTC 2021 Order). * **Model 2 (CFD Brokers):** Risk resides on the broker's balance sheet (B-book model). Regulatory differences (e.g., ESMA's mandatory negative balance protection vs. Mauritius FSC's lack thereof) define loss allocation rules, as seen in the 2015 SNB event (Alpari UK insolvency). * **Model 3 (Off-Chain Custody & Transfer Agent Chain):** Risk lies with the off-chain custodian/platform. User asset recovery depends on Terms of Use and corporate structure, exemplified by the Celsius bankruptcy ruling (2023) where Earn Account assets were deemed property of the estate. * **Model 4 (DEX Perpetual Protocols):** No single balance sheet bears risk. Loss absorption relies on a protocol's insurance fund and Auto-Deleveraging (ADL) mechanism, as demonstrated in the GMX V1 (2022) and dYdX v3 YFI (2023) incidents. * **Model 5 (Regulated CCP - DCM-DCO-FCM):** The most institutionalized model concentrates risk in the Central Counterparty (CCP). However, history shows CCPs can employ non-standard tools under extreme stress, such as mass trade cancellation (LME Nickel, 2022) or enabling negative price settlements (CME WTI, 2020). The report argues that regulatory choices and counterparty risk structures are co-extensive, not in an upstream-downstream relationship. It concludes with five separate observation checklists (not predictions) for monitoring the structural vulnerabilities of each risk model.

marsbit24 мин. назад

Five Counterparty Risk Architectures: A Settlement-Layer Methodology for Classifying TradFi Models in Crypto Exchanges

marsbit24 мин. назад

Торговля

Спот
Фьючерсы

Популярные статьи

Как купить S

Добро пожаловать на HTX.com! Мы сделали приобретение Sonic (S) простым и удобным. Следуйте нашему пошаговому руководству и отправляйтесь в свое крипто-путешествие.Шаг 1: Создайте аккаунт на HTXИспользуйте свой адрес электронной почты или номер телефона, чтобы зарегистрироваться и бесплатно создать аккаунт на HTX. Пройдите удобную регистрацию и откройте для себя весь функционал.Создать аккаунтШаг 2: Перейдите в Купить криптовалюту и выберите свой способ оплатыКредитная/Дебетовая Карта: Используйте свою карту Visa или Mastercard для мгновенной покупки Sonic (S).Баланс: Используйте средства с баланса вашего аккаунта HTX для простой торговли.Третьи Лица: Мы добавили популярные способы оплаты, такие как Google Pay и Apple Pay, для повышения удобства.P2P: Торгуйте напрямую с другими пользователями на HTX.Внебиржевая Торговля (OTC): Мы предлагаем индивидуальные услуги и конкурентоспособные обменные курсы для трейдеров.Шаг 3: Хранение Sonic (S)После приобретения вами Sonic (S) храните их в своем аккаунте на HTX. В качестве альтернативы вы можете отправить их куда-либо с помощью перевода в блокчейне или использовать для торговли с другими криптовалютами.Шаг 4: Торговля Sonic (S)С легкостью торгуйте Sonic (S) на спотовом рынке HTX. Просто зайдите в свой аккаунт, выберите торговую пару, совершайте сделки и следите за ними в режиме реального времени. Мы предлагаем удобный интерфейс как для начинающих, так и для опытных трейдеров.

1.3k просмотров всегоОпубликовано 2025.01.15Обновлено 2025.03.21

Как купить S

Sonic: Обновления под руководством Андре Кронье – новая звезда Layer-1 на фоне спада рынка

Он решает проблемы масштабируемости, совместимости между блокчейнами и стимулов для разработчиков с помощью технологических инноваций.

2.2k просмотров всегоОпубликовано 2025.04.09Обновлено 2025.04.09

Sonic: Обновления под руководством Андре Кронье – новая звезда Layer-1 на фоне спада рынка

HTX Learn: Пройдите обучение по "Sonic" и разделите 1000 USDT

HTX Learn — ваш проводник в мир перспективных проектов, и мы запускаем специальное мероприятие "Учитесь и Зарабатывайте", посвящённое этим проектам. Наше новое направление .

1.8k просмотров всегоОпубликовано 2025.04.10Обновлено 2025.04.10

HTX Learn: Пройдите обучение по "Sonic" и разделите 1000 USDT

Обсуждения

Добро пожаловать в Сообщество HTX. Здесь вы сможете быть в курсе последних новостей о развитии платформы и получить доступ к профессиональной аналитической информации о рынке. Мнения пользователей о цене на S (S) представлены ниже.

活动图片