What’s Going On?

Since 2014, and especially after 2020, North Korea has deployed thousands of IT operatives using fake identities to get remote jobs in the U.S. and Europe.

By 2025, over 8,400 cyber operatives were active, targeting sectors like finance and defence.

Scale of the Damage

Illicit revenue: Over $5 million, with some teams earning up to $3 million/year

Top individual pay: Around $300,000/year

Crypto theft: Over $900,000

Seizures: ~200 laptops and numerous “laptop farms”

How They Operate

AI-generated resumes and deepfake interviews to secure jobs.

Laptop farms in the U.S. used to mask their location.

Malware deployment to steal data and crypto.

Bigger Picture

Part of North Korean hacker units like Bureau 121, Lazarus Group, and Kimsuky, known for global ransomware and espionage.

U.S. Crackdown

In June 2025, U.S. authorities raided, seized devices, froze accounts, and charged accomplices, disrupting millions in funding to North Korean weapons.

How Companies Can Protect Themselves

Require live identity checks

Audit network activity

Train teams on fraud signals

Monitor financial transactions

North Korea has turned remote work into a powerful funding tool for cybercrime, requiring constant vigilance to stop these evolving threats.

#StrategyBTCPurchase #BTC