DPRK IT Workers Earn $1M/Mo Faking IDs for Crypto Hacks

Imagine hiring a top dev from Indeed—only to fund North Korea's hackers. A leaked trove shows DPRK IT workers pulling $1M monthly while plotting crypto raids.

North Korean IT Ghosts: $1M Monthly from Fake Dev Jobs Funding Crypto Heists — theAIcatchup

Key Takeaways

  • North Korean IT workers earned $1M/month via fake dev identities, funding crypto hacks.
  • Exposed leaderboard and ops via luckyguys.site show poor security but big impact.
  • ZachXBT's reveal highlights need for better freelance KYC and blockchain forensics.

What if the coder behind your next app update is wiring cash straight to Pyongyang’s missile labs?

North Korean IT workers — yeah, those shadowy figures — just got busted pulling in over $1 million a month by masquerading as freelance devs on platforms like Indeed. A hacker cracked one of their devices, spilling docs that blockchain detective ZachXBT splashed across X. Picture this: 140 operatives, led by a guy called “Jerry,” netting $3.5 million in crypto since late November. It’s not just pocket change; it’s a funding machine for the regime’s cyber chaos.

And here’s the kicker — they ran it all through a site called luckyguys.site, password “123456.” Brutal opsec, right? Laughable, almost. But it worked, funneling payments tied to sanctioned outfits like Sobaeksu and Saenal. Crypto hits Chinese banks via Payoneer, then poof — blacklisted Tether wallets light up the trail.

How Do DPRK IT Workers Fool the World?

Jerry’s playbook? Astrill VPN to Gmail, firing off resumes for full-stack gigs. One draft email — unsent, thankfully — pitches him as a WordPress SEO whiz for a Texas T-shirt shop. $30 an hour, 15-20 hours weekly. Fake IDs galore: Rascal flaunts a Hong Kong billing statement, phony name and address. Even an Irish passport pic floats around.

They had a leaderboard. Since Dec. 8, tracking each worker’s crypto haul with blockchain explorer links. Competitive? You bet — like a twisted sales contest for state-sponsored spies.

“The leaked data obtained by the unnamed hacker was shared by blockchain sleuth ZachXBT in a post to X on Wednesday. It revealed that one of the IT workers, “Jerry,” and a team of 140 members were making roughly $1 million a month.”

ZachXBT’s drop hits hard, grounding the wild tale in receipts.

But wait — these guys aren’t the sharpest knives. ZachXBT calls them less slick than AppleJeus or TraderTraitor crews. Still, $1M monthly? That’s no small fry.

Why Does This North Korean IT Scheme Terrify Crypto?

North Korea’s hackers have vacuumed $7 billion since 2009, crypto’s the juicy target lately. Ronin bridge: $625M gone. Bybit: $1.4B. Drift Protocol: $280M on April Fools’, no joke. These IT gigs? Day jobs bankrolling the night raids.

Think of it like Prohibition bootleggers moonlighting as accountants — legit cash greasing illicit wheels. Except here, it’s code, not hooch. And the stakes? Global finance’s underbelly.

My unique take: this mirrors the Cold War’s Cambridge Five spies, burrowing into elite circles with fake personas. But digital. Tomorrow’s prediction? Blockchain sleuths like ZachXBT spawn an arms race in forensic AI — pattern-hunting bots that sniff DPRK ops before the first commit. We’re on the cusp; this leak’s the spark.

Skeptical? Sure, corporate crypto PR spins every hack as “isolated.” Bull. It’s systemic — lax KYC on freelance sites, crypto’s pseudonymity. Wake up.

Short para: Platforms must tighten ID checks, yesterday.

The Futurist Fix: AI Shields for Crypto’s Wild West

Energy surges here — AI’s our platform shift, remember? Not hype; reality. Imagine neural nets scanning resumes for VPN fingerprints, wallet clusters, even writing tics screaming “Pyongyang.” Vivid? Like bloodhounds with quantum noses.

We’ve seen it nascent: Chainalysis tools evolving. But scale it — federated learning across exchanges, no central weak spot. DPRK’s $1M/month? Chump change against that.

Wander a sec: Remember Stuxnet? US-Israel cyber op wrecked Iran’s nukes. Flip it — state hackers as innovators, forcing defenses to leap. Wonder at the pace; crypto matures through fire.

One sentence wonder: Blockchain’s resilience? Born in hacks like these.

Dense dive: These workers convert crypto to fiat smoothly — Payoneer bridges the gap. Links to OFAC-sanctioned firms scream red flags ignored. Tether blacklists pop up post-facto. Industry’s asleep? No — scrambling now. Bybit, Ronin scars linger; Drift’s fresh wound stings. Total DPRK crypto theft? $3B+ recently. IT side-hustle amplifies. Leaderboard gamifies theft. Jerry’s Texas pitch? Chilling normalcy. Rascal’s fakes? Amateur hour, yet effective. ZachXBT elevates it — hero of the hour.


🧬 Related Insights

Frequently Asked Questions

How much money did North Korean IT workers make from fake jobs? They pulled $3.5M in crypto since late November, about $1M monthly from 140 workers.

Who exposed the North Korean IT workers hacking crypto? Blockchain investigator ZachXBT shared leaks from a hacker who compromised their device.

Are North Korean hackers still targeting crypto projects? Yes, they’ve stolen billions, including recent hits like Drift Protocol’s $280M.

Elena Vasquez
Written by

Senior editor and generalist covering the biggest stories with a sharp, skeptical eye.

Frequently asked questions

How much money did North Korean IT workers make from fake jobs?
They pulled $3.5M in crypto since late November, about $1M monthly from 140 workers.
Who exposed the North Korean IT workers hacking crypto?
Blockchain investigator ZachXBT shared leaks from a hacker who compromised their device.
Are <a href="/tag/north-korean-hackers/">North Korean hackers</a> still targeting crypto projects?
Yes, they've stolen billions, including recent hits like Drift Protocol's $280M.

Worth sharing?

Get the best AI stories of the week in your inbox — no noise, no spam.

Originally reported by Cointelegraph

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.