• Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
No Result
View All Result
Home Cyber

U.S. Sanctions North Korea IT Worker Schemes

Jane Doe by Jane Doe
August 28, 2025
in Cyber
Share on FacebookShare on Twitter

In a move to combat illicit revenue generation for North Korea’s weapons programs, the U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) has imposed sanctions on a network of individuals and entities involved in a widespread fraudulent IT worker scheme. The sanctions target a Russian national, a North Korean consular official, and two companies—one based in China and another in North Korea—for their roles in a sophisticated operation that uses fraudulent identities to place North Korean IT workers in remote jobs worldwide.

This operation is a key source of funding for North Korea’s weapons of mass destruction (WMD) and ballistic missile programs, which are in violation of multiple U.S. and United Nations sanctions. The scheme involves highly skilled IT workers who, posing as legitimate professionals, secure high-paying jobs in the U.S. and other countries. The majority of the wages they earn, which can amount to hundreds of millions of dollars, are seized by the North Korean regime to finance its military ambitions. In some cases, these workers have also been found to introduce malware into company networks to steal data and demand ransoms.

The newly sanctioned individuals and entities are:

Read

Gorilla Technology Secures Major AI Government Intelligence Platform Win in Asia

CrowdStrike’s Fal.Con 2025 Event Kicks Off, Focusing on AI and Ecosystem Innovation

  • Vitaliy Sergeyevich Andreyev, a Russian national who facilitated financial transfers, converting over $600,000 in cryptocurrency into U.S. dollars on behalf of a sanctioned North Korean IT company.
  • Kim Ung Sun, a North Korean economic and trade consular official based in Russia, who collaborated with Andreyev on the money laundering.
  • Shenyang Geumpungri Network Technology Co., Ltd., a Chinese front company that manages a group of North Korean IT workers and has generated over $1 million in profits.
  • Korea Sinjin Trading Corporation, a North Korean state-affiliated trading company subordinate to the Ministry of People’s Armed Forces General Political Bureau.

Under Secretary of the Treasury for Terrorism and Financial Intelligence, John K. Hurley, stated that the U.S. remains committed to protecting American businesses from these schemes. The sanctions block all property and interests in property of the designated individuals and entities that are in the United States or in the possession of U.S. persons.

This latest action builds on previous U.S. efforts to disrupt these networks, with recent crackdowns including the seizure of $7.74 million in cryptocurrency by the Justice Department. The move also follows a joint statement by the U.S., Japan, and the Republic of Korea to enhance cooperation and information sharing to counter the threat posed by these schemes, underscoring a united front against North Korea’s illicit activities.

Previous Post

Interpol-Led Crackdown Disrupts African Cybercrime Networks

Next Post

Citrix NetScaler Customers Hit by New Zero-Day Vulnerability

Jane Doe

Jane Doe

More Articles

Fujitsu Develops Energy-Efficient Generative AI Technology
Cyber

UN Establishes Global Dialogue on AI Governance to Address AI Risks and Oversight

In a landmark move, the United Nations has launched a new global initiative to establish an international framework for AI...

by Jane Doe
September 8, 2025
Fujitsu Develops Energy-Efficient Generative AI Technology
Cyber

EU Data Act to Become Applicable on September 12, 2025, Regulating Data Access and Sharing

The European Union's Data Act is poised to become applicable on September 12, 2025, marking a significant milestone in the...

by Jane Doe
September 8, 2025
Fujitsu Develops Energy-Efficient Generative AI Technology
Cyber

VirusTotal Finds Hidden Malware Phishing Campaign in SVG Files

In a new and concerning development, security researchers at VirusTotal have identified a sophisticated phishing campaign that uses Scalable Vector...

by Jane Doe
September 8, 2025
Fujitsu Develops Energy-Efficient Generative AI Technology
Cyber

AI-powered Malware Hits Over 2,180 GitHub Accounts in “s1ngularity” Attack

A new and insidious form of cyberattack, leveraging artificial intelligence (AI) to automate and scale malicious activities, is reportedly targeting...

by Jane Doe
September 8, 2025
Next Post
AI Evolution Outpaces Regulation According to New Omdia Report

Citrix NetScaler Customers Hit by New Zero-Day Vulnerability

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Latest News

Hacking AI the Right Way: A Guide to AI Red Teaming

Hacking AI the Right Way: A Guide to AI Red Teaming

May 27, 2025
Researchers Cracked the Encryption Used by DarkBit Ransomware

Researchers Cracked the Encryption Used by DarkBit Ransomware

August 12, 2025
Researchers Cracked the Encryption Used by DarkBit Ransomware

High-severity WinRAR 0-day exploited for weeks by 2 groups

August 12, 2025

Transforming App Development with AI, Part 3: Challenges and Ethical Considerations

March 19, 2025
Exploring AI’s Critical Role in Climate Change at the G7 Summit

Exploring AI’s Critical Role in Climate Change at the G7 Summit

May 28, 2025
Are We Ready for the Next Cyber Storm? Why Staying Passive Is the Greatest Risk

Are We Ready for the Next Cyber Storm?

April 26, 2025
Researchers Cracked the Encryption Used by DarkBit Ransomware

Ghanaian Nationals Extradited for Roles in $100M Romance and Wire Fraud

August 12, 2025
Sumtrix.com

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Navigate Site

  • About
  • Contact
  • Privacy Policy
  • Advertise

Follow Us

No Result
View All Result
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Our website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.