📢 Gate广场 #NERO发帖挑战# 秀观点赢大奖活动火热开启!
Gate NERO生态周来袭!发帖秀出NERO项目洞察和活动实用攻略,瓜分30,000NERO!
💰️ 15位优质发帖用户 * 2,000枚NERO每人
如何参与:
1️⃣ 调研NERO项目
对NERO的基本面、社区治理、发展目标、代币经济模型等方面进行研究,分享你对项目的深度研究。
2️⃣ 参与并分享真实体验
参与NERO生态周相关活动,并晒出你的参与截图、收益图或实用教程。可以是收益展示、简明易懂的新手攻略、小窍门,也可以是行情点位分析,内容详实优先。
3️⃣ 鼓励带新互动
如果你的帖子吸引到他人参与活动,或者有好友评论“已参与/已交易”,将大幅提升你的获奖概率!
NERO热门活动(帖文需附以下活动链接):
NERO Chain (NERO) 生态周:Gate 已上线 NERO 现货交易,为回馈平台用户,HODLer Airdrop、Launchpool、CandyDrop、余币宝已上线 NERO,邀您体验。参与攻略见公告:https://www.gate.com/announcements/article/46284
高质量帖子Tips:
教程越详细、图片越直观、互动量越高,获奖几率越大!
市场见解独到、真实参与经历、有带新互动者,评选将优先考虑。
帖子需原创,字数不少于250字,且需获得至少3条有效互动
North Korean Hackers Laundered $7.74M with ChatGPT and NFTs — Here's How
Key Insights
The DOJ seized over $7.74 million in crypto laundered by North Korean IT workers funding weapons programs.
North Korean operatives used fake identities and AI tools to secure remote tech jobs in the US and abroad.
Laundered funds were converted, mixed, smurfed and disguised through NFTs and mixers.
AI tools like OpenAI and Google were used to generate fake resumes, cover letters, and research employers for job applications.
The seizures are part of the DOJ's RevGen initiative to crack down on North Korea's cyber-financial networks.
The U.S. Department of Justice (DOJ) has seized over $7.74 million in crypto laundered by North Korean hackers pretending to be remote workers
This operation was revealed through a civil forfeiture complaint in the District of Columbia.
It also shows how North Korea is now using tools like artificial intelligence and cryptocurrency to not only bypass sanctions but to finance its weapons programs.
This is no longer a mere case of crypto fraud.
It’s a window into how a sanctioned regime is taking advantage of loopholes to fund its activities in plain sight.
North Korean Operatives Posing as Remote Tech Workers
The DOJ’s complaint showed a disturbing trend, where North Korean IT operatives used stolen or fake identities to pass “Know Your Customer” (KYC) checks.
Soon after this, they get hired by companies in the US and other regions as remote developers.
These hackers were not breaking into systems or stealing directly from accounts. Instead, they were hired legitimately while pretending to be skilled professionals from other countries
In reality, the money they earned was being funneled directly to the North Korean regime.
The wages were typically paid in U.S. dollar-pegged stablecoins like USDT or USDC. Once paid, the crypto was laundered and funneled straight into the North Korean regime’s coffers.
How They Laundered the Funds
To wash the funds and make them untraceable, these individuals first converted the stablecoins into other cryptocurrencies
Then, they used mixing services to further hide the transaction trail
Sometimes, funds were moved in small amounts to avoid triggering automated alerts. In further detail, this technique is known as “smurfing.”
One interesting tactic from these individuals was the use of NFTs.
The operatives would buy and sell NFTs as part of the laundering cycle. These transactions helped blend the illegally obtained funds with legitimate blockchain activity and therefore made it harder for authorities to trace the money back to its origin.
The DOJ specifically named two individuals, Sim Hyon Sop of North Korea’s sanctioned Foreign Trade Bank, and Kim Sang Man of Chinyong IT Cooperation Company, as major intermediaries helping move the funds on behalf of the North Korean government.
AI Was A Major Part Of The Plan
One of the most disturbing aspects of this operation was the use of AI tools.
OpenAI (the company behind ChatGPT) confirmed that several accounts associated with North Korean actors were recently banned
These accounts were being used to generate fake resumes, craft employment histories, write cover letters and even research employers.
Essentially, the AI was being used as a tool to automate the entire job-application process
Some operatives even ran “laptop farms” to simulate real remote work activity from places like Russia and Laos.
Google even reported taking similar action by removing accounts tied to North Korean actors for similar misuse.
The RevGen Initiative
This disturbing trend is part of efforts from the US to crack down on North Korea’s cyber-financial network
The DOJ launched the DPRK Revenue Generation (RevGen) initiative in March 2024 to track down channels that the regime uses to fund its banned weapons programs.
Jeanine Pirro, U.S. Attorney for the Southern District of New York, stressed the importance of continued enforcement, saying:
“U.S. sanctions are in place for a reason. We will continue to investigate and prosecute anyone helping North Korea fund its illegal weapons programs.”
Thursday’s crask-down sends a clear signal that the DOJ is not letting up, especially as North Korea starts to use more and more tools to carry out its plans.
Disclaimer: Voice of Crypto aims to deliver accurate and up-to-date information, but it will not be responsible for any missing facts or inaccurate information. Cryptocurrencies are highly volatile financial assets, so research and make your own financial decisions.