
{"id":30412,"date":"2024-12-22T17:10:33","date_gmt":"2024-12-22T17:10:33","guid":{"rendered":"https:\/\/mycryptomania.com\/?p=30412"},"modified":"2024-12-22T17:10:33","modified_gmt":"2024-12-22T17:10:33","slug":"treasury-cracks-down-on-north-korean-sanctions-evasion-through-crypto-laundering","status":"publish","type":"post","link":"https:\/\/mycryptomania.com\/?p=30412","title":{"rendered":"Treasury Cracks Down on North Korean Sanctions Evasion Through Crypto Laundering"},"content":{"rendered":"<p>The US Department of the Treasury\u2019s Office of Foreign Assets Control (OFAC) has sanctioned two individuals and one entity involved in a network laundering millions of dollars in illicit funds for North Korea.<\/p>\n<p>Lu Huaying and Zhang Jian, based in the United Arab Emirates (UAE), used a UAE-based front company to facilitate money laundering and cryptocurrency conversion, funneling the proceeds back to Pyongyang.<\/p>\n<h2>OFAC Imposes Sanctions<\/h2>\n<p>In its official <a href=\"https:\/\/home.treasury.gov\/news\/press-releases\/jy2752\" target=\"_blank\" rel=\"noopener\">press release<\/a> on December 17th, the OFAC stated that North Korea continues to rely on agents and proxies to access the global financial system for illicit activities. The agency added these operations are part of the country\u2019s broader efforts to destabilize international security, now extending to Europe with increasing military ties to Russia.<\/p>\n<p>Sim Hyon Sop, a representative of the DPRK\u2019s Korea Kwangson Banking Corp (KKBC) based in the People\u2019s Republic of China (PRC), is said to be a key figure in these activities. Operating as an agent for North Korean financial institutions, Sim is accused of orchestrating money laundering schemes, establishing shell companies, and managing bank accounts to move illicit funds. The OFAC previously designated Sim and KKBC under Executive Order 13382, targeting entities that support WMD proliferation. Sim\u2019s operations primarily involve digital assets to funnel money back to North Korea\u2019s missile programs.<\/p>\n<p>Since 2022, Huaying has been allegedly involved in laundering millions of dollars of illicit funds derived from DPRK activities by converting cryptocurrency into fiat currency. Between 2022 and September 2023, the accused used various methods, including money mules, to facilitate these transactions. Meanwhile, Jian also helped facilitate the exchange of fiat currency and acted as a courier for Sim.<\/p>\n<p>OFAC is designating both Huaying and Zhang Jian, along with Green Alpine Trading, LLC, a UAE-based front company involved in the network, for their roles in supporting Sim\u2019s illicit activities.<\/p>\n<p>Acting Under Secretary of the Treasury for Terrorism and Financial Intelligence Bradley T. Smith stated,<\/p>\n<p>\u201cAs the DPRK continues to use complex criminal schemes to fund its WMD and ballistic missile programs \u2013 including through the exploitation of digital assets \u2013 Treasury remains focused on disrupting the networks that facilitate this flow of funds to the regime. The United States, along with the UAE and our other partners, will continue to target the financial networks that enable the Kim regime\u2019s destabilizing activities.\u201d<\/p>\n<h2>North Korean Hackers Execute Wide-Ranging Crypto Heist<\/h2>\n<p>North Korea\u2019s involvement in cybercrime has wreaked significant havoc in the crypto industry, as evidenced by a series of high-profile hacks and exploits. In August, ZachXBT <a href=\"https:\/\/cryptopotato.com\/north-korean-devs-used-fake-identities-to-steal-from-crypto-project-zachxbt\/\" target=\"_blank\" rel=\"noopener\">reported<\/a> that North Korean developers infiltrated over 25 crypto projects using fake identities, stealing $1.3 million through malicious code.<\/p>\n<p>In October, reports emerged that North Korean hackers linked to Lazarus Group used a fake NFT game\u00a0<a href=\"https:\/\/cryptopotato.com\/north-korean-hackers-used-fake-nft-game-to-steal-wallet-credentials-report\/\" target=\"_blank\" rel=\"noopener\">exploiting<\/a> a Chrome zero-day flaw to steal wallet credentials.\u00a0The game, promoted via social engineering tactics, included malware that harvested sensitive data. Despite a fix from Google, the attackers had already executed large-scale crypto thefts.<\/p>\n<p>Then in November, South Korean police <a href=\"https:\/\/cryptopotato.com\/south-korean-police-confirm-north-korea-orchestrated-the-50m-upbit-crypto-heist\/\" target=\"_blank\" rel=\"noopener\">confirmed<\/a> that North Korean hacking groups Lazarus and Andariel orchestrated the 2019 Upbit crypto heist, stealing $50 million worth of ETH. Collaboration with the FBI and Swiss prosecutors uncovered key evidence, including North Korean IP addresses and virtual asset flow patterns. The stolen funds were laundered through multiple platforms.<\/p>\n<p>More recently, Radiant Capital <a href=\"https:\/\/cryptopotato.com\/web3-security-firms-confirm-north-koreas-role-in-radiant-capital-hack\/\" target=\"_blank\" rel=\"noopener\">confirmed<\/a> that a $50 million hack on its DeFi platform in October 2024 was carried out by a North Korea-linked hacking group. The attackers used a Telegram-based malware scheme to exploit a developer, leading to the installation of a macOS backdoor.<\/p>\n<p>The post <a href=\"https:\/\/cryptopotato.com\/treasury-cracks-down-on-north-korean-sanctions-evasion-through-crypto-laundering\/\">Treasury Cracks Down on North Korean Sanctions Evasion Through Crypto Laundering<\/a> appeared first on <a href=\"https:\/\/cryptopotato.com\/\">CryptoPotato<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>The US Department of the Treasury\u2019s Office of Foreign Assets Control (OFAC) has sanctioned two individuals and one entity involved in a network laundering millions of dollars in illicit funds for North Korea. Lu Huaying and Zhang Jian, based in the United Arab Emirates (UAE), used a UAE-based front company to facilitate money laundering and [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":30413,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-30412","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-discovery"],"_links":{"self":[{"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/posts\/30412"}],"collection":[{"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=30412"}],"version-history":[{"count":0,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/posts\/30412\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/media\/30413"}],"wp:attachment":[{"href":"https:\/\/mycryptomania.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=30412"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=30412"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=30412"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}