"Treasury Strikes at Front Companies Fueling North Korea’s IT Worker Fraud Empire"
- U.S. Treasury sanctions 2 firms and 2 individuals for North Korea's IT worker fraud scheme involving $1M+ in falsified salaries across China, Russia, and Korea. - Sanctions freeze assets and penalize business ties with entities enabling North Korean infiltration of Western companies through deceptive recruitment and data theft. - International collaboration with Japan/South Korea and advanced tactics like deepfakes highlight evolving threats as U.S. intensifies countermeasures against cross-border cyberc
The U.S. Treasury has imposed sanctions on two companies and two individuals for their alleged roles in a North Korea-led IT worker fraud scheme that spanned across China, Russia, and the Korean Peninsula. Shenyang Geumpungri Network Technology Co. in China and the South Korea Sinjin Trading Corporation were identified as key facilitators of the scam, which reportedly funneled over $1 million into North Korean accounts through falsified IT worker salaries and fraudulent activities. The Treasury’s Office of Foreign Assets Control (OFAC) emphasized that the sanctioned entities and individuals will now face financial freezes and legal consequences for any business dealings with them or their affiliated entities.
The Treasury’s announcement underscored the persistent threat posed by North Korean IT workers who infiltrate American businesses under false pretenses, often leading to data theft and ransom demands. Under Secretary of the Treasury for Terrorism and Financial Intelligence, John Hurley, highlighted the administration’s commitment to countering these schemes and holding perpetrators accountable. The sanctioning of Kim Ung Sun, a Russian-based economic and trade consular official for North Korea, and Vitaliy Sergeyevich Andreyev, a Russian accused of orchestrating the scam, further illustrates the international dimension of the operation.
This action builds on a series of recent U.S. efforts to counter North Korean digital fraud. In May 2025, OFAC targeted Chinese companies that facilitated the placement of North Korean IT workers in Western organizations. In June, the U.S. attempted to recover nearly $8 million in payments sent to the North Koreans through similar fraudulent methods. Earlier in the month, the Department of Justice pursued the recovery of over $1 million stolen from a New York-based business by North Korean IT workers. These efforts reflect an intensifying U.S. response to what cybersecurity firm Mandiant described as a pervasive issue among Fortune 500 companies.
Remote work, which gained widespread adoption post-pandemic, has enabled North Korean actors to expand their tactics beyond traditional cyberattacks and into the realm of embedded staff infiltration. These workers often operate with elevated access to company networks, increasing the potential for data exfiltration and financial exploitation. Mandiant reported that many large corporations have admitted to experiencing North Korean IT worker infiltration, underscoring the severity of the issue.
To complicate matters, North Korean scammers are increasingly leveraging advanced technologies, including deepfake methods, to bypass standard verification procedures during recruitment processes. These tactics have proven effective in deceiving employers and embedding fraudulent IT workers into critical organizations. In response, cybersecurity experts have recommended the implementation of robust verification protocols and continuous staff education to mitigate risks.
The Treasury’s actions have also drawn support from international partners. The Japanese and South Korean governments reportedly cooperated with U.S. authorities in the enforcement of these sanctions. Additionally, the U.S. has joined with regional partners in hosting roundtable discussions to develop countermeasures against the growing threat. These collaborative efforts indicate a broader strategy to address cross-border cybercriminal activities linked to North Korea.

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.
You may also like
Google pours $9 B into Virginia to expand AI and cloud data centers
Share link:In this post: Google is investing $9 billion in Virginia to build and expand data centers. It will also spend $1 billion on AI training programs for college students. The growth raises concerns about energy and water use in the state.

Nvidia fuels rush into AI-focused leveraged ETFs
Share link:In this post: Nvidia is now the most traded stock in the leveraged ETF market. More than 100 new leveraged ETFs launched in 2025, many tied to AI stocks. AI-focused ETFs hold most of the money in the leveraged ETF market.

South Korea holds rates steady for second consecutive meeting
Share link:In this post: The Bank of Korea kept the rates unchanged at 2.5%. Kim Jin-wook will cut rates by 25 basis points in October. The central bank also held rates steady in July.

Naoris Protocol: The First-Mover Advantage in Post-Quantum Cybersecurity for Web3
- Naoris Protocol leads post-quantum cybersecurity with quantum-resistant tech and institutional backing, addressing urgent EU/US regulatory mandates. - Its Sub-Zero Layer architecture and SWARM AI offer real-time threat detection, aligning with 2030 PQC deadlines for critical infrastructure. - First-mover advantage through live testnet performance and EVM compatibility positions Naoris as a scalable solution for Web2/3 quantum-safe transitions.

Trending news
MoreCrypto prices
More








