North Korea steals billions via crypto hacks and fake IT jobs to fund nuclear weapons, report reveals
- North Korean IT workers infiltrated U.S. firms using fake identities.
- They funneled millions in salaries to fund weapons programs.
- Hackers also stole billions in cryptocurrency through major digital heists.
- The scheme exploited corporate trust and remote hiring vulnerabilities.
- This operation poses a significant threat to global security.
According to a sweeping international investigation released this week, North Korean hackers have pilfered billions of dollars by breaking into cryptocurrency exchanges while thousands of regime operatives, using assumed identities, have infiltrated U.S. companies through remote IT jobs, siphoning salaries directly into Pyongyang’s nuclear and ballistic missile development.
This clandestine financial operation, detailed in a 138-page report from the Multilateral Sanctions Monitoring Team, shows a level of cyber sophistication that now rivals major state actors like China and Russia. The report concludes that despite its small size and isolation, North Korea has heavily invested in offensive cyber capabilities, posing a significant threat to foreign governments, businesses and individuals. The primary goal is clear: to fund the regime’s unlawful weapons of mass destruction programs.
A dual-pronged assault on global security
The regime’s strategy is two-fold, combining brazen digital theft with systematic corporate deception. On one front, hackers linked to North Korean intelligence have executed some of the largest crypto heists in history. Earlier this year, one such operation resulted in the theft of $1.5 billion worth of ethereum from the cryptocurrency exchange Bybit. This is not an isolated incident but part of a broader pattern of targeting digital assets to bypass international sanctions.
The other front involves a massive, state-sponsored fraud where thousands of skilled North Korean IT workers are dispatched worldwide. Federal authorities have alleged these operatives use fake and stolen personal identities to land remote work at U.S. companies. Once inside, they gain access to internal systems and funnel their salaries back to the North Korean government. In some cases, these workers held several remote jobs simultaneously, maximizing the illicit revenue stream.
Exploiting the trust of American businesses
The depth of the deception is profound. These are not low-level freelancers but operatives embedded within the infrastructure of American commerce. A recent indictment from the U.S. Department of Justice against four North Korean nationals illustrates the scheme’s mechanics. The defendants allegedly used stolen identities to get hired as developers at a blockchain research company in Atlanta and a Serbian virtual token company.
“The defendants used fake and stolen personal identities to conceal their North Korean nationality, pose as remote IT workers, and exploit their victims’ trust to steal hundreds of thousands of dollars,” said U.S. Attorney Theodore S. Hertzberg.
After gaining their employers’ trust, the operatives were assigned projects that gave them access to valuable virtual currency assets. They then allegedly stole nearly $1 million by modifying source code and transferring the funds through cryptocurrency mixers. “These schemes target and steal from U.S. companies and are designed to evade sanctions and fund the North Korean regime’s illicit programs, including its weapons programs,” said John A. Eisenberg, Assistant Attorney General for the Justice Department’s National Security Division.
The scale of this IT worker scheme is monumental. According to the international report, these operatives are estimated to have earned between $350 million and $800 million in 2024 alone. They belong to entities under UN-sanctioned bodies like the Reconnaissance General Bureau and the Ministry of Atomic Energy Industry, remitting roughly half of their income directly to Kim Jong-un’s regime.
The report found that North Korean IT workers are stationed in at least eight countries, with China and Russia serving as key hubs. An estimated 1,000 to 1,500 operatives work from China, while hundreds more use student visas to operate from cities in Russia. From these locations, they secure remote contracts with companies in the U.S. and Europe using forged identities.
This massive operation is enabled by a global network of facilitators. The report notes that Chinese nationals and China’s financial system are heavily involved in providing forged documents and helping launder and cash out stolen cryptocurrency. This international collusion underscores how the regime leverages global interconnectedness to undermine security.
The findings reveal a shocking failure of corporate due diligence and international policy. Companies eager to hire remote tech talent have inadvertently opened their doors to a hostile state actor, failing to verify identities despite the obvious risks. Meanwhile, the report states North Korea’s cyber actions have "been directly linked to the destruction of physical computer equipment, endangerment of human lives, private citizens’ loss of assets and property, and funding for the DPRK’s unlawful weapons of mass destruction and ballistic missile programs."
It is a sobering reality that the very tools of modern liberty—remote work and decentralized currency—are being systematically hijacked by a tyrannical regime. The trust-based remote economy has become a new battlefield, and the paychecks from unsuspecting American companies are indirectly funding the development of nuclear weapons aimed at our allies and potentially at us. This is more than a cybercrime story; it is a serious warning about the vulnerabilities of our interconnected world and the relentless ingenuity of those who seek to destroy it.
Sources for this article include:
ABCNews.go.com
NBCNews.com
Justice.gov
KoreaHerald.com