DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home News

Sanctions on North Korea’s Illicit Schemes

Reading Time: 2 mins read
in News

The US Treasury Department’s Office of Foreign Assets Control (OFAC) has imposed sanctions on four entities and one individual involved in illicit IT worker schemes and cyberattacks that generate revenue for North Korea’s weapons development programs. North Korea relies on a large number of anonymous IT workers who employ deceptive tactics, including stolen identities and fake personas, to secure employment abroad.

The generated revenue is funneled to support the Pyongyang regime’s weapons programs. These workers can accumulate salaries exceeding $300,000 annually while concealing their true identities. The DPRK’s extensive cyber and IT operations threaten international security and finance its unlawful activities, according to US Secretary of State Antony J. Blinken.

The sanctioned entities include Pyongyang University of Automation, responsible for training “malicious cyber actors,” as well as the Technical Reconnaissance Bureau and the 110th Research Center cyber unit of the Reconnaissance General Bureau (RGB), which coordinate cyberattacks and develop malicious tools.

The Chinyong Information Technology Cooperation Company, linked to the North Korean Ministry of Peoples’ Armed Forces, coordinates IT workers operating from Russia and Laos to generate revenue. Additionally, North Korean national Kim Sang Man is involved in payment-related activities.

The OFAC previously sanctioned Tornado Cash and Blender.io cryptocurrency mixers used by North Korean hackers to launder stolen Ethereum. Hacking groups Lazarus, Bluenoroff, and Andariel were also previously sanctioned for funneling stolen financial assets to the North Korean government.

A confidential report from UN experts revealed that North Korean threat actors engaged in record-breaking cryptocurrency theft in 2022, estimated between $630 million to over $1 billion, doubling the illicit gains from cyber theft in the previous year.

The US, along with its partners, is committed to combating North Korea’s illicit revenue generation activities and efforts to steal money worldwide.

Read More

Tags: DeveloperMay 2023NewsNews 2023North Koreaofac
ADVERTISEMENT

Related Posts

Memcyco Raises $10M for Website Security

Memcyco Raises $10M for Website Security

May 26, 2023
Unveiling Android Spyware ‘Predator’

Unveiling Android Spyware ‘Predator’

May 26, 2023
FinFisher Executives Indicted

FinFisher Executives Indicted

May 26, 2023
Enhancing Software Security with GUAC

Enhancing Software Security with GUAC

May 26, 2023

More Articles

Quotes

”Many organizations have a great…”

June 3, 2022
Cyber101

Self Assessment Questionnaire (SAQ)

May 17, 2022

Blizzard Experiences High Latency and Disconnections Due to Massive DDoS Attack

June 2, 2021
Alerts

Hackers Actively Exploiting Cisco AnyConnect and GIGABYTE Drivers Vulnerabilities

October 26, 2022
Incidents

Snatch claims Modesto ransomware attack

March 29, 2023
Alerts

SharkBot Trojan Spread Via Android File Manager Apps

November 28, 2022
Alerts

Dell security advisory (AV22-031)

January 19, 2022
Alerts

NSA, CISA, and ODNI Release Guidance on Potential Threats to 5G Network Slicing

December 13, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.