North Korean Crypto Sanctions Checker
Verify if a cryptocurrency wallet address is sanctioned by the U.S. Treasury's Office of Foreign Assets Control (OFAC) for North Korean cyber theft. This tool demonstrates the process used to identify sanctioned wallets involved in funding weapons programs.
Examples from OFAC Sanctions Lists
These are known sanctioned addresses linked to North Korean cyber theft operations:
- 0x5e4c8a13969b25a7e46c415e8c7d1d7b0d56d5a1 (Kim Ung Sun's wallet)
- 0x7d6d1a5c29f07e5f7d5e7c6d2e5a4f8b0e6d8c7b (Vitaliy Sergeyevich Andreyev)
- 0x8b6d4c7a2e5f1d8a7c6b5e4d3c2b1a0987654321 (Shenyang Geumpungri Network Technology)
North Korea isn’t just building missiles - it’s building crypto heists. In 2025 alone, U.S. officials say North Korean hackers stole over $2.1 billion in cryptocurrency, funneling the money straight into the regime’s weapons programs. This isn’t random hacking. It’s a state-run operation, disguised as remote IT jobs, hidden inside American tech companies, and powered by fake identities and stolen digital identities. The U.S. Treasury’s Office of Foreign Assets Control (OFAC) has responded with one of the most aggressive sanction campaigns ever seen in the crypto space - targeting not just wallets, but people, companies, and entire networks across Russia, China, and the UAE.
How North Korea Uses Remote IT Workers to Steal Crypto
You might think of North Korea as isolated, cut off from the global economy. But that’s not true when it comes to tech. The regime has been quietly placing hundreds of IT workers - often posing as freelancers or junior developers - inside U.S.-based crypto startups, Web3 firms, and blockchain projects. These aren’t hackers breaking in through firewalls. They’re hired on LinkedIn, paid in USDC or ETH, and given legitimate access to company systems. Their real job? Gather intel. Learn how companies store keys. Map out internal networks. Then, when the time is right, they trigger data theft or ransomware attacks. Some even quietly siphon small amounts of crypto over months, avoiding detection by staying under the radar. These workers use fake profiles built on GitHub, Freelancer.com, RemoteHub, and even Medium. Names like "Joshua Palmer" and "Alex Hong" show up again and again - identical bios, reused photos, identical coding styles. Security firms have tracked these operations under names like Famous Chollima, Jasper Sleet, and UNC5267. All of them trace back to North Korean state agencies.The Sanctioned Players: Who’s on the List?
On August 27, 2025, OFAC dropped a major wave of sanctions. Among those targeted:- Vitaliy Sergeyevich Andreyev - a Russian national who helped move stolen crypto into cash through OTC brokers.
- Kim Ung Sun - a North Korean operative who personally transferred nearly $600,000 in crypto to U.S. dollars in cash.
- Shenyang Geumpungri Network Technology Co., Ltd - a China-based front company that hired fake IT workers.
- Korea Sinjin Trading Corporation - a trading entity used to launder funds through UAE-based intermediaries.
How the Money Flows: From Wallet to Weapons
It’s not enough to steal crypto. You have to turn it into something the regime can use. That’s where the laundering network comes in. Stolen crypto doesn’t go straight to Pyongyang. Instead, it moves through a chain:- Workers collect payments in stablecoins like USDC from U.S. employers.
- Funds are moved to self-hosted wallets under fake names.
- Small amounts are sent to multiple intermediate wallets to confuse tracking.
- Then, through Russian and UAE-based exchanges, the crypto is swapped for cash via OTC brokers.
- Cash is physically transported or wired to North Korea through third-party intermediaries.
Who’s Being Hit Beyond the Workers?
OFAC didn’t stop at individuals. They went after entire companies that serve as fronts for the operation:- Korea Sobaeksu Trading Company - a trading firm based in China, used to disguise crypto sales as legitimate tech exports.
- Chinyong Information Technology Cooperation Company - identified in 2023, this company still operates offices in Laos and Russia, training new IT workers in fake identity creation and crypto theft.
The Global Web: Russia, China, and the UAE as Enablers
This isn’t a North Korea-only problem. It’s a global failure of oversight. Russian infrastructure is heavily involved. IP addresses tied to sanctioned actors often route through Russian data centers. OTC brokers in Moscow and St. Petersburg move cash with little scrutiny. Meanwhile, Chinese companies like Shenyang Geumpungri operate under the radar, claiming to provide "software outsourcing" - while secretly training operatives in cyber-theft techniques. The UAE, with its loose crypto regulations and free zones, has become a key transit point. Wallets linked to DPRK hackers show repeated activity on exchanges based in Dubai. Even after OFAC sanctions, some firms there continue to process transactions for sanctioned entities - often by simply changing wallet addresses or using intermediaries. The FBI and Homeland Security Investigations have worked with agencies in Japan and South Korea to track these flows. Joint statements from all three governments in August 2025 signaled a new level of international coordination - something that didn’t exist just two years ago.
What This Means for Crypto Companies and Investors
If you run a crypto startup, you’re a target. If you’re an investor in Web3 projects, you’re at risk - not because you’re doing anything wrong, but because your company might be unknowingly hosting a North Korean operative. Here’s what you need to do:- Verify identities of remote workers - not just with LinkedIn, but with video interviews and third-party background checks.
- Monitor wallet activity linked to employees - especially if they receive payments in stablecoins and immediately move them to non-custodial wallets.
- Use blockchain analytics tools like TRM Labs or Chainalysis to screen for known sanctioned addresses.
- Train your team to spot fake profiles - look for reused photos, identical writing styles, and profiles created in the last 30 days.
What’s Next? More Sanctions, More Tracking
OFAC’s actions in 2025 aren’t the end - they’re the beginning. As of October 2025, investigations are still active. New entities are being added to the sanctions list every month. Blockchain analysts are tracking hundreds of new wallet addresses that show behavioral patterns matching previous DPRK-linked activity. The U.S. is also pushing other countries to tighten their rules. The European Union is reviewing its crypto-asset reporting framework. Singapore has begun requiring all exchanges to flag transactions involving known DPRK-linked addresses. Even Switzerland, long known for its neutrality, has started cooperating with OFAC on asset freezes. The message is clear: crypto isn’t a safe haven for rogue states anymore. The tools to track it are too good. The global network of investigators is too connected. And the U.S. government is no longer waiting - it’s acting, directly, publicly, and repeatedly.Why This Matters Beyond the Headlines
This isn’t just about money. It’s about security. Every dollar stolen by these hackers buys another missile, another warhead, another threat to global stability. When a North Korean operative steals $50,000 in USDC from a startup in Austin, that money doesn’t vanish. It becomes part of a system designed to destabilize the world. For the crypto industry, this is a wake-up call. Anonymity isn’t freedom - it’s a vulnerability. If you don’t know who you’re hiring, you’re not just risking your company - you’re risking national security. The era of crypto as a wild west is over. The regulators are here. The trackers are watching. And North Korea’s biggest weapon isn’t its bombs - it’s its ability to hide in plain sight. The U.S. is finally learning how to pull back the curtain.Are OFAC sanctions on North Korean crypto networks still active in 2025?
Yes. OFAC has continued to expand its sanctions throughout 2025, adding new individuals, companies, and crypto addresses tied to North Korean hacking operations. The most recent wave, announced on August 27, 2025, targeted Russian and Chinese front companies, as well as key money launderers. Enforcement remains active, with new designations expected into late 2025 and beyond.
How do North Korean hackers get hired by U.S. crypto companies?
They use fake identities created with stolen photos and fabricated resumes on freelance platforms like Freelancer, RemoteHub, and WorkSpace.ru. Many pose as developers from Eastern Europe or Southeast Asia. They apply for remote jobs in Web3 startups that rely heavily on gig workers. Once hired, they gain access to internal systems and begin collecting data or stealing crypto over time.
Can I be fined if I unknowingly hire a North Korean hacker?
Yes. U.S. companies have been fined for failing to conduct basic due diligence on remote workers. Even if you didn’t know the person was linked to North Korea, if your company processed payments to a sanctioned wallet or allowed access to systems used for theft, you can face penalties. OFAC expects businesses to use blockchain screening tools and verify identities beyond just online profiles.
What crypto assets have been seized from North Korean hackers?
U.S. authorities have seized over $7.7 million in digital assets since early 2025, including Ethereum (ETH), USD Coin (USDC), and high-value NFTs. Wallets linked to sanctioned individuals like Kim Ung Sun and Vitaliy Andreyev have been frozen. The FBI has also recovered physical cash transfers tied to OTC brokers who converted stolen crypto into dollars.
Is crypto still a major tool for North Korea’s sanctions evasion?
Yes. Despite increased scrutiny, crypto remains the regime’s most effective way to move money globally without traditional banking. Stablecoins like USDC are preferred because they’re pegged to the dollar and widely accepted. North Korean operators use decentralized exchanges, cross-border OTC brokers, and layered wallet structures to obscure the trail - but blockchain analytics are now making it harder to hide.
Phil Bradley
November 11, 2025 AT 11:18Okay but imagine being a dev in a startup and realizing your "remote junior" who always shows up to Zoom in a hoodie is actually a North Korean spy who’s been siphoning ETH since March. I mean… that’s not a glitch. That’s a Netflix series waiting to happen. And we’re just sitting here doing standups like nothing’s wrong.
Also, why are we still hiring people from "RemoteHub"? That platform looks like it was coded in 2012.
Also also - I just checked my LinkedIn. My "friend" from Ukraine who posted about "work-life balance" last week? His profile pic is the same guy who got sanctioned last month. 😳