BTCC / BTCC Square / Bitcoinist /
Feds Move to Seize $7.7M in Crypto Tied to North Korean IT Operatives

Feds Move to Seize $7.7M in Crypto Tied to North Korean IT Operatives

Author:
Bitcoinist
Published:
2025-06-06 23:00:51
10
2

U.S. authorities just dropped the hammer on a $7.7 million crypto haul—linked to North Korean IT workers allegedly gaming the system. Another day, another dollar laundered—except this time, Uncle Sam wants it back.


The Crypto Paper Trail

Blockchain sleuths traced the funds through a maze of wallets, exposing how digital assets still play cat-and-mouse with regulators. Who needs sanctions when you’ve got anonymity, right?


Finance’s Favorite Irony

Wall Street frets over crypto volatility while Pyongyang apparently treats it as a slush fund. Maybe decentralized finance isn’t the problem—just who’s using it.

Remote Employment, Blockchain Firms, and Laundering Tactics

The frozen funds are tied to an ongoing investigation that began with an indictment in April 2023 against Sim Hyon Sop, a China-based representative of North Korea’s Foreign Trade Bank.

Sim is accused of working alongside North Korean IT professionals to launder proceeds through various tactics. US officials say the seized funds represent part of a broader effort by the North Korean government to use the global cryptocurrency infrastructure to generate revenue in defiance of international sanctions.

According to the DOJ complaint, the DPRK has increasingly deployed IT workers across jurisdictions including China and Russia, instructing them to find employment in the blockchain and tech sectors.

These workers allegedly bypassed know-your-customer (KYC) and due diligence procedures by using stolen or forged documents to disguise their identities and locations. Their work, often compensated in stablecoins such as USDC or USDT, generated income that was eventually laundered and routed back to North Korea.

To obscure the origin of the funds, the workers allegedly engaged in a variety of laundering techniques: opening accounts with fake identities, executing multiple small transfers, switching between blockchains (“chain hopping”), converting assets into different cryptocurrencies (“token swapping”), and even purchasing non-fungible tokens (NFTs) as stores of value.

The proceeds were reportedly moved through online US.-based platforms and commingled to avoid detection, before being transmitted to North Korean entities through intermediaries such as Sim and Kim Sang Man.

Global Coordination Targets Sanctions Evasion

Kim Sang Man, named in the DOJ filing, is alleged to be the CEO of Chinyong (also known as Jinyong IT Cooperation Company), which operates under North Korea’s Ministry of Defense.

Chinyong is sanctioned by the US Treasury Department and is reported to manage delegations of North Korean IT workers in countries such as Russia and Laos.

Kim’s role allegedly involved transmitting funds from the IT workers to Sim, thereby completing the cycle of crypto laundering back to the North Korean government.

The case represents a broader strategic focus by US agencies to disrupt illicit financing networks. Officials from the DOJ, FBI, and national security offices emphasized that targeting North Korea’s digital revenue streams is essential to enforcing sanctions and limiting funds available for military development.

US businesses were also advised to review remote hiring practices to detect potential obfuscation tactics that may be used by foreign actors.

The global crypto market cap valuation on TradingView

Featured image created with DALL-E, Chart from TradingView

|Square

Get the BTCC app to start your crypto journey

Get started today Scan to join our 100M+ users