In brief
- Four North Korean agents allegedly used stolen identities to land remote IT jobs at a U.S. crypto startup.
- The group stole roughly $900,000 in two transactions and laundered crypto through sanctioned channels.
- Their operations are considered by authorities to be part of the DPRK's long-running strategy to fund their weapons programs.
Four North Korean nationals infiltrated an Atlanta-based blockchain startup and stole nearly $1 million in crypto by posing as remote developers, federal prosecutors from the Northern District of Georgia announced Monday, detailing charges from a five-count wire fraud and money laundering indictment.
The defendants first operated as a team in the UAE before infiltrating U.S. and Serbian crypto firms as remote IT workers. After gaining trust, they stole $175,000 and $740,000 in two separate 2022 incidents, laundering the funds through mixers and exchanges using fake identification documents.
Ostensibly dubbed as "North Korean IT workers," the alleged individuals operate by "embedding themselves within these organizations" to "gather intelligence, manipulate security protocols, and even facilitate insider breaches," Andrew Fierman, head of national security at blockchain analytics firm Chainalysis, told Decrypt.
The stolen crypto vanished through a maze of transactions designed to obscure its origin—a sophisticated playbook North Korea has refined over years of cybercriminal operations.
The DOJ did not immediately return Decrypt’s request for comment.

North Korea Targets Crypto Professionals With New Malware in Hiring Scams
North Korean hackers are luring crypto professionals into elaborate fake job interviews designed to steal their data and deploy sophisticated malware on their devices. A new Python-based remote access trojan called "PylangGhost," links malware to a North Korean-affiliated hacking collective called "Famous Chollima," also known as "Wagemole,” threat intelligence research firm Cisco Talos reported on Wednesday. "Based on the advertised positions, it is clear that the Famous Chollima is broadly tar...
Standard operating procedure
These tactics form "a pattern that has increasingly become standard operating procedure," Fierman told Decrypt.
The threat actors get hired by using "falsified documentation" and "masking their North Korean nexus," Fierman explained.
Aside from sending their compensation "back to the regime," the workers also "patiently wait for the opportunity to access funds of the Web3 company they've infiltrated" to steal more, Fierman said.
The scheme exposes a vulnerability in crypto's remote-first culture, where firms hiring globally may skip background checks, allowing state-sponsored actors with fake identities to exploit gaps.
"Unfortunately, many teams avoid in-person meetings and prefer hiring more 'cheap' developers than hiring well-known guys in our sector," Vladimir Sobolev, threat researcher at blockchain security firm Hexens, told Decrypt. "This is a fundamental issue."
Describing North Korea's cyber operations as a "long-term endeavor," Sobolev notes that the country has been engaged in these activities for a long time, even "before the popularity of blockchain and Web3."

Crypto Fueling Weapons Programs for Sanctioned States: FATF
Cryptocurrency is increasingly enabling sanctioned states like North Korea and Iran to finance illicit weapons programs, according to a June 2025 report by the Financial Action Task Force (FATF), an intergovernmental organization established over three decades ago by G7 countries. The global watchdog identifies blockchain-based assets as critical vulnerabilities exploited by proliferation finance networks, citing incidents such as North Korea's theft of $1.4 billion from crypto exchange ByBit in...
Broader scheme
Earlier this month, the federal prosecutors detailed in a civil action lawsuit how "tens of millions were exploited in a larger North Korean IT worker crypto scheme," Fierman said, sharing documents reviewed by Decrypt.
In a separate press release, the DOJ stated that it conducted coordinated raids across 16 states, seizing 29 financial accounts, 21 fraudulent websites, and approximately 200 computers from "laptop farms" supporting North Korean IT schemes, including the four aforementioned.
The enforcement actions revealed how North Korean agents used these laptop farms as remote access points, allowing operatives to modify smart contracts and drain crypto funds while appearing to work from U.S. locations.
"The ability for organizations to recognize these threats and protect their firm against them will be critical," Fierman warned.
Edited by Sebastian Sinclair