Stock

North Korea IT Worker Network Used 390 Accounts to Funnel…

Pinterest LinkedIn Tumblr

What Did ZachXBT Uncover?

Blockchain investigator ZachXBT has identified what he describes as a North Korea-linked IT worker network generating roughly $1 million per month through crypto-linked payments and fraudulent employment schemes. The findings are based on data extracted from an internal payment server tied to 390 accounts.

The dataset includes chat logs, wallet activity, and identity records, offering a detailed view into how the operation functions. According to the analysis, the network has generated more than $3.5 million since last November, using coordinated workflows built around fake identities and remote employment.

The activity adds to mounting evidence that North Korea is expanding beyond high-profile exchange hacks into lower-visibility, scalable revenue channels tied to labor and financial fraud.

How Does the Payment Network Operate?

At the center of the system is an internal remittance platform resembling a messaging service, where workers report earnings and receive payment instructions from a central administrator account. Funds are routed through cryptocurrency transactions before being converted into fiat via Chinese bank accounts or platforms such as Payoneer.

ZachXBT linked multiple payment addresses to known clusters associated with North Korean IT worker activity. One Tron address connected to the network was frozen by Tether in December, indicating overlap with previously identified illicit flows.

The data also revealed operational tactics, including the use of VPNs to mask locations, job applications submitted under forged identities, and internal communications across dozens of participants. In one instance, discussions referenced targeting a crypto gaming project, though it remains unclear whether the attempt was carried out.

Investor Takeaway

Crypto is being used as a payment rail for organized labor fraud, not just hacks. This expands the risk surface for exchanges, protocols, and employers interacting with remote developers and contractors.

How Does This Compare to Other DPRK Operations?

While the network appears less sophisticated than well-known North Korean groups such as Lazarus, the revenue profile is consistent with prior estimates that DPRK-linked IT worker schemes generate multiple seven figures per month. The model relies on scale and persistence rather than complex exploits.

The findings align with a broader shift in North Korea’s cyber strategy, where state-linked actors diversify income streams across hacking, fraud, and employment-based infiltration. This reduces reliance on single large-scale attacks while maintaining steady inflows of capital.

Recent incidents reinforce this pattern. A Solana-based project urged liquidity providers to withdraw funds after identifying a former North Korean employee, while another protocol linked a $280 million exploit to a prolonged social engineering campaign attributed to suspected DPRK actors.

Investor Takeaway

The shift from one-off hacks to continuous revenue models increases systemic risk. Detection becomes harder, and exposure extends beyond protocols to hiring processes and off-chain operations.

What Does This Mean for the Crypto Market?

North Korea-linked actors have reportedly stolen more than $7 billion since 2009, with a significant share tied to crypto-related activity. High-profile incidents such as the $625 million Ronin bridge exploit and other major breaches highlight the scale of the threat.

The emergence of structured IT worker networks adds a different layer of exposure. Instead of targeting vulnerabilities in code, these operations exploit gaps in identity verification, remote hiring, and payment workflows.

This shifts part of the risk assessment from purely technical security toward operational and compliance controls. Exchanges, protocols, and service providers may need to strengthen onboarding, monitoring, and payment tracing mechanisms to limit exposure to similar schemes.