BTCC / BTCC Square / BTCX7 /
ZachXBT Exposes North Korean Devs: $16.5M Swindled via Fake Jobs—Up to 920 Roles Compromised

ZachXBT Exposes North Korean Devs: $16.5M Swindled via Fake Jobs—Up to 920 Roles Compromised

Author:
BTCX7
Published:
2025-07-04 10:26:03
9
2


Hold onto your wallets, folks—North Korean IT workers have allegedly infiltrated crypto and tech firms, siphoning off a jaw-dropping $16.5 million through fake remote jobs since January 2025. On-chain sleuth ZachXBT uncovered this sprawling operation, revealing coordinated clusters of DPRK-linked devs gaming the system. From dodgy IP addresses to LinkedIn ghosting, here’s how they pulled it off—and why your startup might be next. --- ###

How Did North Korean IT Workers Infiltrate Global Companies?

ZachXBT’s investigation paints a wild picture: North Korean operatives posed as remote tech talent, landing gigs at unsuspecting firms—some paying up to $8,000/month per "employee." These weren’t solo acts; they worked in synchronized clusters, with one group of 8 devs infiltrating over 12 projects. Payments funneled to consolidation addresses, like a digital money-laundering carousel.*Source: The Coin Republic* Red flags? Oh, plenty. Workers refused in-person meetings (despite claiming to be local), used Russian IPs while "based in California," and even *recommended each other* for the same jobs. Classic teamwork—if your team’s goal is espionage.

--- ###

$16.58M in Crypto Payments: Follow the Money

Traceable on-chain flows revealed $16.58 million sent to DPRK-linked wallets—averaging $2.76M monthly. Transactions ranged from $3K–$8K/month per worker, suggesting 345–920 compromised roles.*Source: ZachXBT* USDC payments traced back to Circle accounts, while one address tied to Hyon Sop Sim (a Tether-sanctioned entity) moved funds in a single hop. Meanwhile, DPRK devs hoarded USDC across multiple wallets, juggling roles until poor performance got them "laid off"—only to reappear elsewhere.

--- ###

Operational Slip-Ups That Exposed the Scam

Forget spy movies—real-life ops are messier. GitHub handle changes, deleted LinkedIn profiles, and failed KYC checks littered the trail. Three workers from the same cluster applied to one project *together*. Smooth. Even "elite" hackers flub basics: One operative, Sandy Nguyen, was spotted in Russia beside a DPRK flag—hardly discreet for someone claiming to be in Silicon Valley. Pro Tip: If your dev’s IP bounces from Seoul to St. Petersburg mid-Zoom call, maybe dig deeper.

--- ###

Crypto Exchanges in the Crosshairs

North Korea’s Lazarus Group stole $2.1B in crypto in 2025 alone, including a $1.5B heist from Bybit. But here’s the twist: DPRK operatives now flock to U.S. exchanges (Coinbase, Robinhood), debunking the myth that domestic platforms are KYC fortresses. MEXC remains a laundry hub, while Binance usage dropped—thanks to improved asset seizures by regulators. Neobanks supporting Stablecoins? A gift to money movers.

--- ###

Why Crypto’s Transparency Is a Double-Edged Sword

Blockchain’s traceability lets investigators follow the money (shoutout to ZachXBT), but traditional tech firms face worse infiltration with *zero* Fiat transparency. Lesson? Crypto’s not the villain—it’s the ledger.

*Source: ZachXBT* --- ###

FAQ: Your Burning Questions, Answered

How widespread is this infiltration?

ZachXBT identified 6+ DPRK clusters, with one group compromising 12+ projects. At peak estimates, 920 roles may be fake.

What’s the biggest red flag for employers?

IP mismatches, refusal to meet, and coordinated referrals. Also: if their GitHub commits vanish faster than a Satoshi wallet.

Did any exchanges crack down?

Binance saw reduced DPRK activity post-crackdowns, but MEXC remains a hotspot. *This article does not constitute investment advice.*

|Square

Get the BTCC app to start your crypto journey

Get started today Scan to join our 100M+ users