{"id":16765,"date":"2026-05-14T13:11:07","date_gmt":"2026-05-14T13:11:07","guid":{"rendered":"https:\/\/www.europesays.com\/korea\/16765\/"},"modified":"2026-05-14T13:11:07","modified_gmt":"2026-05-14T13:11:07","slug":"north-korean-operatives-stole-2-billion-last-year-and-financial-firms-are-the-next-target","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/korea\/16765\/","title":{"rendered":"North Korean operatives stole $2 billion last year\u2014and financial firms are the next target"},"content":{"rendered":"<p>North Korea\u2019s army of cyber operatives stole a record $2 billion in digital assets last year, fueled by the largest financial theft ever reported\u2014$1.46 billion stolen in a single operation from crypto exchange Bybit.\u00a0<\/p>\n<p>The attackers pulled off the heist by compromising a software developer\u2019s laptop at a third-party platform the Dubai-based Bybit relied on, and then stealing the developer\u2019s credentials and <a aria-label=\"Go to https:\/\/x.com\/safe\/status\/1894768522720350673\" href=\"https:\/\/x.com\/safe\/status\/1894768522720350673\" rel=\"nofollow\">ultimately draining<\/a> the assets from the exchange, <a aria-label=\"Go to https:\/\/www.ic3.gov\/psa\/2025\/psa250226\" href=\"https:\/\/www.ic3.gov\/psa\/2025\/psa250226\" rel=\"nofollow noopener\" target=\"_blank\">according to the FBI<\/a>.\u00a0<\/p>\n<p>That $1.46 billion payload was the most spectacular strike in what turned out to be a record 2025. North Korea-linked cyber groups stole a combined $2.02 billion last year, up 51% year-over-year, according to a <a aria-label=\"Go to https:\/\/www.crowdstrike.com\/en-us\/resources\/reports\/crowdstrike-2026-financial-services-threat-landscape-report\/\" href=\"https:\/\/www.crowdstrike.com\/en-us\/resources\/reports\/crowdstrike-2026-financial-services-threat-landscape-report\/\" rel=\"nofollow noopener\" target=\"_blank\">new CrowdStrike report<\/a> shared with Fortune ahead of its release on Thursday. The stolen billions were almost certainly laundered and will be used to fund the regime\u2019s military and nuclear weapons programs, the 2026 Financial Services Threat Landscape Report states.\u00a0<\/p>\n<p>With the success of 2025 in the rear view, operatives from the Democratic People\u2019s Republic of Korea (DPRK) are zeroing in on the financial services industry, CrowdStrike found. The latest findings, which cover activity observed from April 2025 through March 2026, reveal that North Korean adversaries have become the most prevalent state-sponsored intrusion threat facing financial firms, consumer banks, and related providers in the financial services sector.\u00a0<\/p>\n<p>The percent of hands-on-keyboard break-ins, meaning real human attackers inside a financial institution\u2019s network, grew 43% globally and 48% in North America over the past two years, CrowdStrike reported. Financial services jumped from being the sixth most-targeted sector in the first quarter of 2025 to the fourth most-targeted in the first quarter of 2026 behind tech, consulting and professional services, and manufacturing.<\/p>\n<p>And the DPRK\u2019s <a aria-label=\"Go to https:\/\/fortune.com\/2025\/06\/30\/north-korean-it-workers-american-accomplice-fortune500\/\" href=\"https:\/\/fortune.com\/2025\/06\/30\/north-korean-it-workers-american-accomplice-fortune500\/\" rel=\"nofollow noopener\" target=\"_blank\">tried-and-true scheme<\/a> involving <a aria-label=\"Go to https:\/\/fortune.com\/article\/north-korean-it-workers-kim-jong-un-cybersecurity-nuclear-program-america\/\" href=\"https:\/\/fortune.com\/article\/north-korean-it-workers-kim-jong-un-cybersecurity-nuclear-program-america\/\" rel=\"nofollow noopener\" target=\"_blank\">North Korean IT workers<\/a> pretending to be American job seekers doubled the volume of its attacks in 2025, according to CrowdStrike, making it the most active North Korea-linked form of attack the firm tracks. The IT worker operation, in which <a aria-label=\"Go to https:\/\/reports.dtexsystems.com\/DTEX-Exposing+DPRK+Cyber+Syndicate+and+Hidden+IT+Workforce.pdf\" href=\"https:\/\/reports.dtexsystems.com\/DTEX-Exposing+DPRK+Cyber+Syndicate+and+Hidden+IT+Workforce.pdf\" rel=\"nofollow noopener\" target=\"_blank\">thousands of North Korean men trained in software development<\/a> are stationed in China, Russia, and other locations, functions by using American identities to land remote tech jobs at American and European companies.\u00a0<\/p>\n<p>The scheme has been so successful, law enforcement has created a joint FBI-National Security Division task force to disrupt the operations and have dealt a series of harsh prison terms to American accomplices who have willingly aided the North Koreans.\u00a0<\/p>\n<p>A Nashville laptop farm and New York recruiting front<\/p>\n<p>Generally, the IT workers running the employment scam fabricate r\u00e9sum\u00e9s and software development profiles using stolen identities to appear legitimate\u2014or they <a aria-label=\"Go to https:\/\/fortune.com\/2026\/04\/25\/north-korean-it-worker-scheme-american-faciliators\/\" href=\"https:\/\/fortune.com\/2026\/04\/25\/north-korean-it-worker-scheme-american-faciliators\/\" rel=\"nofollow noopener\" target=\"_blank\">recruit American accomplices to rent out their <\/a>names to the workers in exchange for quick cash and sometimes a recurring cut of the proceeds. The IT workers take their salary, often earned doing real work, and then send most of the money back to the DPRK where authoritarian ruler Kim Jong-Un uses it to fund the country\u2019s nuclear weapons program. In some cases, the IT operatives share intelligence with the DPRK\u2019s malicious hacking army to help steal data or organize additional theft.\u00a0<\/p>\n<p>This month, two American men were <a aria-label=\"Go to https:\/\/www.justice.gov\/opa\/pr\/two-us-nationals-sentenced-facilitating-fraudulent-remote-information-technology-worker-0\" href=\"https:\/\/www.justice.gov\/opa\/pr\/two-us-nationals-sentenced-facilitating-fraudulent-remote-information-technology-worker-0\" rel=\"nofollow noopener\" target=\"_blank\">sentenced to 18 months<\/a> in federal prison each for operating \u201claptop farms\u201d and helping North Korean IT workers get remote jobs at nearly 70 American companies in separate schemes that generated more than $1.2 million for the DPRK. The term laptop farm refers to the setups the accomplices create after fraudulently accepting laptops from companies and installing software and remote desktop applications to shield the IT workers identities\u2019 and help funnel their salaries.\u00a0<\/p>\n<p>Matthew Isaac Knoot ran a laptop farm out of his Nashville home between July 2022 and August 2023, <a aria-label=\"Go to https:\/\/www.justice.gov\/archives\/opa\/pr\/justice-department-disrupts-north-korean-remote-it-worker-fraud-schemes-through-charges-and\" href=\"https:\/\/www.justice.gov\/archives\/opa\/pr\/justice-department-disrupts-north-korean-remote-it-worker-fraud-schemes-through-charges-and\" rel=\"nofollow noopener\" target=\"_blank\">court records show<\/a>, and helped the North Korean scheme with jobs at four companies that paid more than $250,000 for IT work. Most of the money was reported to the IRS and Social Security Administration in the name of a real person whose identity was stolen. Knoot helped transfer the salary to accounts outside the U.S. and into accounts associated with North Korean and Chinese operatives, the DOJ said.\u00a0<\/p>\n<p>In addition to 18 months in prison, Knoot was ordered to pay $15,100 in restitution to victim companies and forfeit another $15,100, which is what the DPRK IT workers paid him for his help in the scheme.\u00a0<\/p>\n<p>A New York man, Erick Ntekereze Prince, was also sentenced to 18 months for laptop farming. Prince pleaded guilty to wire-fraud conspiracy and was ordered to forfeit the $89,000 DPRK IT workers paid him. According to authorities, Prince worked in the scheme from June 2020 through August 2024 and used his recruiting firm, Taggcar Inc., to direct \u201ccertified\u201d IT workers to U.S. companies. He also kept U.S. company laptops at his New York home and installed remote access software so the IT workers could appear as though they worked from his residence.<\/p>\n<p>The DOJ said Prince was part of a scheme that, in total, obtained work from 64 U.S. companies that paid more than $943,069 in salary payments. Four others were charged in the scheme, including Emanuel Ashtor and Pedro Ernesto Alonso de los Reyes. Ashtor awaits trial and de los Reyes is in custody in The Netherlands, authorities said. Two others charged, Jin Sung-il and Pak Jin-Song, are North Korean and remain at large.\u00a0Ashtor\u2019s lawyer did not immediately respond to a request for comment and de los Reyes could not be reached. <\/p>\n<p>The Knoot and Prince sentencings bring the total number of Americans sent to prison for working as accomplices to at least nine since last year.\u00a0<\/p>\n<p>\u2018Golden unicorns\u2019<\/p>\n<p>Adam Meyers, senior vice president of counter adversary operations at CrowdStrike, said last year he investigated about one DPRK-related attack a day, and this year it\u2019s closer to two. In the month of March 2025, CrowdStrike identified 33 insider threat operations linked to Famous Chollima, CrowdStrike\u2019s term for the North Korean IT worker scheme. In March 2026, Meyers said CrowdStrike identified 45 operations.\u00a0<\/p>\n<p>The IT workers strike opportunistically, said Meyers, so if there\u2019s a job opening posted online, they\u2019ll just go for it with the goal of getting as many jobs as possible. He described the operation as \u201chigh tempo, low sophistication.\u201d However, the DPRK operatives have become highly skilled at appearing to recruiters as \u201cgolden unicorn\u201d job applicants that are irresistible to hiring teams, he added.\u00a0<\/p>\n<p>\u201cTheir job is to make revenue for the weapons program of North Korea,\u201d said Meyers. \u201cSo they are going to do whatever they can in terms of finding jobs.\u201d<\/p>\n<p>The UN has pegged the DPRK\u2019s IT worker revenue generation at $250 million to $600 million per year. The UN\u2019s <a aria-label=\"Go to https:\/\/webtv.un.org\/en\/asset\/k1t\/k1tjrc6a8a\" href=\"https:\/\/webtv.un.org\/en\/asset\/k1t\/k1tjrc6a8a\" rel=\"nofollow noopener\" target=\"_blank\">Multilateral Sanctions Monitoring Committee<\/a>, which tracks DPRK sanctions violations and evasion tactics, <a aria-label=\"Go to https:\/\/msmt.info\/Publications\/detail\/MSMT%20Report\/4221\" href=\"https:\/\/msmt.info\/Publications\/detail\/MSMT%20Report\/4221\" rel=\"nofollow noopener\" target=\"_blank\">revealed<\/a> at its latest meeting in January that the scheme has now victimized 40 countries around the globe. \u00a0<\/p>\n<p>The DPRK threat is compounded by the fact that traditional financial institutions, an increasingly prevalent target, have pushed further into digital asset services and crypto in recent years, an area North Korean operatives have deep experience working to exploit.\u00a0<\/p>\n<p>In the fourth quarter of 2025 alone, a North Korea-linked group that CrowdStrike calls \u201cStardust Chollima,\u201d tripled the pace of its attacks, targeting at least 21 crypto and fintech firms across North America, Europe, and Asia in a single two-month period.\u00a0<\/p>\n<p>That scheme involved operatives <a aria-label=\"Go to https:\/\/unit42.paloaltonetworks.com\/north-korean-threat-actors-lure-tech-job-seekers-as-fake-recruiters\/\" href=\"https:\/\/unit42.paloaltonetworks.com\/north-korean-threat-actors-lure-tech-job-seekers-as-fake-recruiters\/\" rel=\"nofollow noopener\" target=\"_blank\">impersonating recruiters and executive search consultants<\/a> on <a aria-label=\"Go to https:\/\/fortune.com\/company\/linkedin\/\" href=\"https:\/\/fortune.com\/company\/linkedin\/\" target=\"_blank\" rel=\"nofollow noopener\">LinkedIn<\/a> and Telegram and then sending unwitting job-seeking targets standard technical coding tests laced with malware. <\/p>\n<p>The attackers used AI to generate fabricated people and video-conference environments by using images and videos of real executives and offices to make job seekers believe the sham interviews, CrowdStrike found.\u00a0<\/p>\n<p>The hard way<\/p>\n<p>Meyers said traditional financial institutions should absorb the \u201chard lessons\u201d the crypto industry has taken in\u2014sometimes at enormous cost.\u00a0<\/p>\n<p>\u201cThey need to make sure they follow best practices in terms of things like having cold storage versus hot storage,\u201d Meyers said, referring to security protocols for offline digital assets versus connected wallets. \u201cMaking sure that you have multi-factor authentication, making sure that you have multiple control factors in place in terms of authorizing transfers\u201d and steadfast defensive measures will help guard financial institutions.\u00a0<\/p>\n<p>CrowdStrike\u2019s report assessed that the DPRK cyber operations targeting consumer banks and other financial services firms will intensify through 2026, driven by international sanctions and the need to fund North Korea\u2019s military and weapons programs.\u00a0<\/p>\n<p>Meyers said protecting against the intrusions is a constant battle and as companies tighten their defenses, operatives will shift tactics. And then the cycle begins again.\u00a0<\/p>\n<p>\u201cIt\u2019s a constant battle to stop them from being successful,\u201d said Meyers. \u201cCompanies really need to look at those lessons learned and make sure they\u2019ve learned them\u2014before they learn them the hard way.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"North Korea\u2019s army of cyber operatives stole a record $2 billion in digital assets last year, fueled by&hellip;\n","protected":false},"author":2,"featured_media":16766,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[145,8642,12059,31,34,5055],"class_list":{"0":"post-16765","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-north-korea","8":"tag-cyber","9":"tag-fraud","10":"tag-hackers","11":"tag-korea","12":"tag-north-korea","13":"tag-security"},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/korea\/wp-json\/wp\/v2\/posts\/16765","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/korea\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/korea\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/korea\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/korea\/wp-json\/wp\/v2\/comments?post=16765"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/korea\/wp-json\/wp\/v2\/posts\/16765\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/korea\/wp-json\/wp\/v2\/media\/16766"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/korea\/wp-json\/wp\/v2\/media?parent=16765"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/korea\/wp-json\/wp\/v2\/categories?post=16765"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/korea\/wp-json\/wp\/v2\/tags?post=16765"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}