The United States has announced new North Korean IT worker sanctions aimed at disrupting cybercrime funding state operations.
The move targets Song Kum Hyok, a hacker linked to North Korea’s notorious Andariel group.

The Andariel hacking group is part of North Korea’s larger Lazarus umbrella, known for global cyberattacks and financial crimes.


Who is Song Kum Hyok?

Song Kum Hyok is a key figure in North Korea’s cybercrime network.
He is associated with the Andariel group, also known as APT45 or Silent Cholima.

Andariel focuses on financially motivated cyberattacks, including ransomware and cryptocurrency theft.
The group’s operations generate revenue for North Korea’s weapons programs.

The North Korean IT worker sanctions expose Song’s role in deploying IT workers with fake identities to Western companies.


How the IT Worker Scheme Operated

Song helped North Korean nationals obtain remote IT jobs at U.S. companies using stolen American identities.
The fake workers operated from countries like China and Russia, hiding their true nationality.

Income from these jobs was split with Song, who funneled the money to Pyongyang.
These funds help support North Korea’s WMD and ballistic missile development.

In some cases, these IT workers also aided cyberattacks by deploying malware or stealing sensitive data.

The U.S. Treasury highlighted that these schemes are both financial and espionage-driven.


The Broader Sanctions: Who Else Is Involved?

The North Korean IT worker sanctions extend beyond Song Kum Hyok.
The U.S. Treasury also sanctioned:

  • Gayk Asatryan, a Russian national who hired DPRK workers.
  • Asatryan LLC and Fortuna LLC, Russian companies linked to Asatryan.
  • Korea Songkwang Trading General Corporation, a North Korean dispatch company.
  • Korea Saenal Trading Corporation, another DPRK-linked firm involved in the scheme.

These organizations played critical roles in employing and hiding North Korean IT workers.


The Impact of the Sanctions

Sanctions freeze assets under U.S. jurisdiction linked to these individuals and entities.
They also prohibit U.S. companies and individuals from doing business with them.

Access to U.S.-based payment systems has been cut off.
Foreign organizations that continue working with sanctioned parties also risk penalties.

The North Korean IT worker sanctions aim to disrupt North Korea’s ability to earn foreign currency through fraud.


DOJ Crackdown on North Korean IT Networks

This action follows a major crackdown by the U.S. Department of Justice.
On July 1, 2025, authorities targeted North Korean IT worker operations across the U.S.

Investigators searched 29 illegal “laptop farms” used by fake IT workers.
The operation resulted in one arrest, 12 indictments, and the seizure of:

  • 29 financial accounts
  • 21 websites
  • 200 computers

The DOJ confirmed that North Korean operatives had deeply infiltrated legitimate U.S. companies.
Their goal: generate income and gather intelligence.


Why These Sanctions Matter

The North Korean IT worker sanctions are a critical step in fighting state-sponsored cybercrime.
North Korea has long used cyberattacks and fraud to bypass international sanctions.

These operations finance dangerous programs that threaten global security.
They also harm businesses by introducing malware and stealing sensitive data.

By targeting both individuals and their networks, the U.S. aims to cut off North Korea’s digital lifeline.


Conclusion

The North Korean IT worker sanctions mark another escalation in the fight against cyber-enabled financial crime.
North Korea’s reliance on fake IT workers exposes vulnerabilities in global hiring practices.

Governments and businesses must stay vigilant.
Verifying identities and monitoring remote work environments are now security priorities.

As North Korea adapts, so must international defenses.
These sanctions signal that cybercrime used for hostile state funding will not go unpunished.


0 responses to “North Korean IT Worker Sanctions: Treasury Targets Cybercriminal Scheme Backing Pyongyang”