• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
u.s. sanctions north korean it worker network supporting wmd programs

U.S. Sanctions North Korean IT Worker Network Supporting WMD Programs

You are here: Home / General Cyber Security News / U.S. Sanctions North Korean IT Worker Network Supporting WMD Programs
January 17, 2025

The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) sanctioned two individuals and four entities for their alleged involvement in illicit revenue generation schemes for the Democratic People’s Republic of Korea (DPRK) by dispatching IT workers around the world to obtain employment and draw a steady source of income for the regime in violation of international sanctions.

“These IT workers obfuscate their identities and locations to fraudulently obtain freelance employment contracts from clients around the world for IT projects, such as software and mobile application development,” the Treasury Department said.

“The DPRK government withholds up to 90% of the wages earned by these overseas workers, thereby generating annual revenues of hundreds of millions of dollars for the Kim regime’s weapons programs to include weapons of mass destruction (WMD) and ballistic missile programs.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

The action represents the latest salvo in the U.S. government’s ongoing efforts to crack down on the various financially motivated streams that aim to further Pyongyang’s strategic objectives. The individuals and companies that have been sanctioned by OFAC are listed below –

  • Department 53 of The Ministry of the People’s Armed Forces, which is said to generate revenue using front companies related to IT and software development
  • Korea Osong Shipping Co, a Department 53 front company that maintained DPRK IT workers in Laos since at least 2022
  • Chonsurim Trading Corporation, a Department 53 front company that has maintained another group of DPRK IT workers in Laos
  • Liaoning China Trade Industry Co., Ltd, a China-based company that has shipped Department 53 equipment, viz. notebook and desktop computers, graphics cards, HDMI cables, and network equipment, to facilitate IT worker activity abroad
  • Jong In Chol, the president of Chonsurim’s DPRK IT worker delegation in Laos
  • Son Kyong Sik, a China-based chief representative of Korea Osong Shipping Co

Both the front companies are alleged to have used false identities and aliases to communicate with clients and undertake software development work for companies across the world.

The fraudulent IT worker scheme attracted mainstream attention in 2023, although it’s believed that such operations have been ongoing since at least 2018, when the Treasury sanctioned two companies Yanbian Silverstar and Volasys Silver Star for the “exportation of workers from North Korea, including exportation to generate revenue for the Government of North Korea or the Workers’ Party of Korea.”

The activity cluster is tracked by the cybersecurity community under the monikers Famous Chollima, Nickel Tapestry, UNC5267, and Wagemole.

Recent analyses have found that North Korean IT workers have been increasingly infiltrating cryptocurrency and Web3 companies and “compromising their networks, operations, and integrity.” The insider threat operation has also identified people in the U.S. who are willing to support their schemes by running laptop farms in exchange for a monthly fee.

Cybersecurity

Heightened public disclosures about these campaigns have further led to a surge in extortion attempts by stealing intellectual property from the companies they work for and demanding “more cryptocurrency than they ever have before” for not releasing it publicly or giving it away to rivals, Google-owned Mandiant told The Record.

That having said, the IT worker operation is just one of the many methods North Korea employs to illegally generate revenue. DPRK state-sponsored hacking groups have a long history of targeting developers with job-themed lures to deliver various kinds of malware that are capable of facilitating data and cryptocurrency theft.

“The DPRK continues to rely on its thousands of overseas IT workers to generate revenue for the regime, to finance its illegal weapons programs, and to enable its support of Russia’s war in Ukraine,” said Acting Under Secretary of the Treasury for Terrorism and Financial Intelligence Bradley T. Smith.

“The United States remains resolved to disrupt these networks, wherever they operate, that facilitate the regime’s destabilizing activities.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «european privacy group sues tiktok and aliexpress for illicit data European Privacy Group Sues TikTok and AliExpress for Illicit Data Transfers to China
Next Post: How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal? how to bring zero trust to wi fi security with a»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk
  • ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

Copyright © TheCyberSecurity.News, All Rights Reserved.