-->
uMaHF0G5M1jYL9t88qHEEkQggU6GJ5wTZlhvItt7
Bookmark
      Ozak AI Banner  
 

North Korean Hackers Hijack Global Freelancers in Massive Crypto Laundering Scheme

North Korean hackers are exploiting global freelancers to launder stolen crypto, posing as employers on remote work platforms. Experts warn this growi

 

hokanews,hoka news,hokanews.com,pi coin,coin,crypto,cryptocurrency,blockchain,pi network,pi network open mainnet,news,pi news  Coin Cryptocurrency  Digital currency     Pi Network     Decentralized finance     Blockchain     Mining     Wallet     Altcoins     Smart contracts     Tokenomics     Initial Coin Offering (ICO)     Proof of Stake (PoS) Airdrop   Proof of Work (PoW)     Public key cryptography Bsc News bitcoin btc Ethereum, web3hokanewshokanews,hoka news,hokanews.com,pi coin,coin,crypto,cryptocurrency,blockchain,pi network,pi network open mainnet,news,pi news  Coin Cryptocurrency  Digital currency     Pi Network     Decentralized finance     Blockchain     Mining     Wallet     Altcoins     Smart contracts     Tokenomics     Initial Coin Offering (ICO)     Proof of Stake (PoS) Airdrop   Proof of Work (PoW)     Public key cryptography Bsc News bitcoin btc Ethereum, web3hokanewshokanews,hoka news,hokanews.com,pi coin,coin,crypto,cryptocurrency,blockchain,pi network,pi network open mainnet,news,pi news  Coin Cryptocurrency  Digital currency     Pi Network     Decentralized finance     Blockchain     Mining     Wallet     Altcoins     Smart contracts     Tokenomics     Initial Coin Offering (ICO)     Proof of Stake (PoS) Airdrop   Proof of Work (PoW)     Public key cryptography Bsc News bitcoin btc Ethereum, web3hokanews

North Korean Hackers Exploit Freelancers in Global Crypto Laundering Network

North Korean cybercriminals are increasingly targeting global freelancers as unwitting accomplices in sophisticated cryptocurrency laundering operations, according to cybersecurity investigators. What appears to be an innocent remote work opportunity is often part of a coordinated scheme to disguise the movement of stolen digital assets linked to Pyongyang’s illicit financial networks.

The growing trend reveals how hackers are shifting tactics—from creating fake online identities to hijacking verified freelancer accounts—to evade sanctions and international monitoring systems. Investigators warn that these operations are not isolated scams but part of a broader effort to fund North Korea’s weapons and missile programs through cyber theft and money laundering.

Freelancers Tricked Into Becoming Crypto Mules

In recent months, cybersecurity firms and law enforcement agencies have reported a surge in cases involving freelancers being unknowingly recruited by North Korean hackers.
These individuals are contacted on popular job platforms such as Upwork, Freelancer, and GitHub, where attackers pose as legitimate employers offering remote technical or administrative positions.


hokanews,hoka news,hokanews.com,pi coin,coin,crypto,cryptocurrency,blockchain,pi network,pi network open mainnet,news,pi news  Coin Cryptocurrency  Digital currency     Pi Network     Decentralized finance     Blockchain     Mining     Wallet     Altcoins     Smart contracts     Tokenomics     Initial Coin Offering (ICO)     Proof of Stake (PoS) Airdrop   Proof of Work (PoW)     Public key cryptography Bsc News bitcoin btc Ethereum, web3hokanewshokanews,hoka news,hokanews.com,pi coin,coin,crypto,cryptocurrency,blockchain,pi network,pi network open mainnet,news,pi news  Coin Cryptocurrency  Digital currency     Pi Network     Decentralized finance     Blockchain     Mining     Wallet     Altcoins     Smart contracts     Tokenomics     Initial Coin Offering (ICO)     Proof of Stake (PoS) Airdrop   Proof of Work (PoW)     Public key cryptography Bsc News bitcoin btc Ethereum, web3hokanewshokanews,hoka news,hokanews.com,pi coin,coin,crypto,cryptocurrency,blockchain,pi network,pi network open mainnet,news,pi news  Coin Cryptocurrency  Digital currency     Pi Network     Decentralized finance     Blockchain     Mining     Wallet     Altcoins     Smart contracts     Tokenomics     Initial Coin Offering (ICO)     Proof of Stake (PoS) Airdrop   Proof of Work (PoW)     Public key cryptography Bsc News bitcoin btc Ethereum, web3hokanews


Once contact is established, the conversation is quickly moved off-platform to encrypted messaging apps like Telegram or Discord, where the fraudulent onboarding process begins.

According to Thomas Reid, an analyst at ChainGuard Cyber Intelligence, this method allows hackers to “mask their operations behind real, verified people, making detection extremely difficult for platforms and law enforcement.”

“They’re no longer relying on fake identities,” Reid explained. “They’re using real humans — with verified IDs, authentic work histories, and legitimate online reputations — to funnel stolen crypto through regulated exchanges.”

How the Scam Unfolds

The scam typically starts with a convincing job offer: a freelance contract in software testing, crypto wallet development, or blockchain data entry.
Victims are told that, as part of their “training,” they must install remote access tools like AnyDesk, TeamViewer, or Chrome Remote Desktop on their computers.

Once installed, the hackers gain full control of the freelancer’s system — including their browsing sessions, credentials, and even webcam access in some cases. They then use the freelancer’s verified identity to register crypto accounts, apply for blockchain-related jobs, or process transactions under the guise of legitimate work.

From that point forward, all activity — including crypto transfers — appears to originate from a real user with a verified account, often based in Europe or Southeast Asia.
The freelancer might receive a small payment, usually between 10% to 20% of the laundered amount, without realizing they’ve participated in a major international crime.

A Sophisticated Laundering Network

This method gives North Korean hackers a significant advantage. Traditional anti-money laundering (AML) systems rely on identifying suspicious activity or geographic risk. By operating through verified freelancers in other countries, the hackers bypass these filters entirely.

“The brilliance — and danger — of this approach is that it looks perfectly legitimate on paper,” said Dr. Mina Okada, a cyber law expert at the University of Tokyo. “The accounts are verified, the activity is consistent, and the payments appear to come from freelance work. It’s almost impossible for automated systems to flag it.”

Authorities suspect that millions of dollars in stolen crypto have already been funneled through such networks. In one case documented by South Korean investigators, more than $12 million worth of Ethereum stolen from a decentralized finance (DeFi) platform was traced to wallets linked to compromised freelancer accounts in the Philippines and Ukraine.

Global Impact: Funding Sanctions Evasion and Weapons Programs

Western intelligence agencies believe the laundered crypto is ultimately used to finance North Korea’s nuclear and ballistic missile programs.
According to a United Nations Security Council report, North Korean hacking groups — including Lazarus Group and APT38 — have stolen more than $3 billion in digital assets since 2017.

“This isn’t just about online crime — it’s national security,” warned Andrew Langley, a cybersecurity advisor to the U.K.’s National Crime Agency.
“Each time stolen crypto is successfully laundered, that money may end up funding missile components or weapons testing in North Korea. The stakes couldn’t be higher.”

In 2024, the U.S. Treasury Department imposed sanctions on several North Korean-linked wallets and individuals involved in laundering crypto through Asian and Middle Eastern intermediaries. However, officials admit that identifying every layer of the network is extremely challenging due to the decentralized nature of blockchain technology.

Who the Hackers Target

Investigations show that hackers mainly target freelancers from Asia, Eastern Europe, and the United States — regions with large remote workforces and strong verification systems.
Workers from the Philippines, India, Malaysia, and Ukraine have been among the most frequent victims.

Many of these freelancers are drawn by seemingly legitimate offers from international clients promising stable remote income. Others are approached through professional networking platforms or tech communities where cybercriminals pose as recruiters for blockchain startups.

“It’s heartbreaking,” said Elaine Torres, a freelance security consultant from Manila. “Some of these people are just trying to make an honest living. They end up being used as fronts for laundering stolen crypto, and many don’t realize it until their accounts are suspended or investigated.”

Why the Problem Keeps Growing

Cybersecurity experts say this exploitation model is spreading because it’s both low-risk and high-reward. By outsourcing parts of their operations to real people, North Korean hacking groups remain insulated from detection.

The use of human intermediaries also creates legal gray zones. While freelancers may not realize they are aiding illegal activity, they can still face criminal investigations, account bans, or permanent loss of online work privileges.

Moreover, as crypto adoption grows globally, more platforms are integrating KYC (Know Your Customer) verification systems — ironically creating more opportunities for hackers to exploit verified users.

“Hackers are turning compliance tools into weapons,” said David Chen, a blockchain forensics specialist at CipherTrace. “The more platforms require verification, the more valuable a verified freelancer account becomes.”

How Freelancers Can Protect Themselves

Experts recommend that online workers take proactive steps to avoid falling victim to these schemes:

  • Never share your ID, account credentials, or verification details with anyone claiming to be a recruiter.

  • Avoid installing remote access software unless it’s absolutely necessary and from a trusted employer.

  • Keep all communication on the official freelance platform until a job is fully verified.

  • Be skeptical of crypto-related projects that ask you to handle payments or wallet addresses.

  • Report suspicious job postings or messages to platform support immediately.

Cybersecurity organizations are also calling on major freelance platforms to enhance monitoring systems, flag unusual login patterns, and educate users on remote-access fraud risks.

The Human Cost of Cybercrime

For many freelancers, the fallout can be devastating. Once their accounts are linked to illicit transactions, they may lose access to their income, face reputational damage, or even become targets of law enforcement investigations.

Some have described being locked out of their accounts and losing years of professional credibility. Others faced police questioning without understanding how their computers had been used in a global crypto-laundering ring.

“This shows how cybercrime has evolved,” said Okada. “It’s no longer about just stealing money—it’s about stealing identities, reputations, and livelihoods.”

A Growing Threat to the Digital Workforce

As remote work continues to rise, cybersecurity specialists warn that such scams could become one of the most persistent threats to the global freelance economy.
With North Korean hackers leading the trend, experts predict that other criminal networks will likely adopt similar tactics to exploit the trust-based nature of online work.

The message from authorities is clear: vigilance, awareness, and digital hygiene are now essential survival tools for freelancers in a hyperconnected world.


hokanews.com – Not Just Crypto News. It’s Crypto Culture.

Writer @Erlin
Erlin is an experienced crypto writer who loves to explore the intersection of blockchain technology and financial markets. She regularly provides insights into the latest trends and innovations in the digital currency space.
 
 Check out other news and articles on Google News


Disclaimer:


The articles published on hokanews are intended to provide up-to-date information on various topics, including cryptocurrency and technology news. The content on our site is not intended as an invitation to buy, sell, or invest in any assets. We encourage readers to conduct their own research and evaluation before making any investment or financial decisions.
hokanews is not responsible for any losses or damages that may arise from the use of information provided on this site. Investment decisions should be based on thorough research and advice from qualified financial advisors. Information on HokaNews may change without notice, and we do not guarantee the accuracy or completeness of the content published.

Listen
Pilih Suara
1x
* Mengubah pengaturan akan membuat artikel dibacakan ulang dari awal.