DOJ Charges North Koreans in Major Crypto Theft & Cyber Impersonation Scheme

Photo of author

By Maxwell Reed

The U.S. Department of Justice (DOJ) has formally charged four North Korean individuals, alleging they orchestrated a sophisticated cryptocurrency theft scheme. This action underscores the persistent and evolving threat posed by state-sponsored cybercrime. These operatives are accused of impersonating U.S. IT specialists to secure remote employment within American and Serbian companies, ultimately siphoning over $900,000 in digital assets. This initiative is part of a broader federal effort to dismantle clandestine operations that fund illicit state activities through cyber intrusions.

The charges, which include five counts encompassing fraud and theft, target Kim Kwang Jin, Kang Tae Bok, Jong Pon Ju, and Jang Nam Il. Prosecutors, including Theodore Herzberg, detailed how these individuals leveraged fabricated and stolen identities to establish a credible facade as legitimate remote IT professionals. This deception enabled them to embed themselves within target organizations, gradually earning trust and access to sensitive virtual assets. This infiltration strategy allowed them to operate largely undetected while planning their illicit activities.

The elaborate scheme unfolded over several years. According to DOJ findings, the operatives initially entered the UAE in 2019 using North Korean documents. By 2020 and 2021, Kim Kwang Jin and Jong Pon Ju had successfully secured remote positions with a U.S. and a Serbian firm, respectively. Jang Nam Il later joined these operations, posing as “Peter Xiao.” After establishing trust and gaining familiarity with the companies’ systems, the group executed their primary theft in February and March 2022, stealing a total of $915,000 in cryptocurrency. These stolen funds were subsequently laundered using cryptocurrency mixers and transferred to accounts controlled by Kang Tae Bok and Jang Nam Il, which were registered under forged identities using Malaysian documents. The Federal Bureau of Investigation (FBI) is leading the ongoing investigation into these specific charges.

Broader Enforcement Actions Against Cybercrime

Beyond these individual indictments, the DOJ has concurrently announced significant nationwide enforcement actions, revealing the extensive scope of North Korean cyber operations. A major operation across 16 U.S. states led to the disruption of 29 “laptop farms”—complex setups designed to create the illusion that North Korean hackers were operating from within the United States. This extensive crackdown resulted in the freezing of 29 financial accounts and the seizure of over 200 computers, which were instrumental in facilitating these deceptive activities. Authorities further revealed that North Korean hackers had successfully infiltrated more than 100 American companies, with some intrusions extending to highly sensitive military information.

The persistent use of deceptive identities by North Korean state-sponsored actors has been a recurring concern for cybersecurity experts. Reports from entities like the Google Threat Intelligence Group have previously highlighted the increasing prevalence of such tactics, particularly in Europe, as American authorities intensify their scrutiny. These incidents collectively illustrate the multifaceted challenges posed by state-sponsored cyber warfare, compelling businesses and governmental agencies alike to bolster their digital defenses against increasingly sophisticated and well-resourced adversaries.

Share