Loading cryptocurrency prices...

US Treasury Sanctions Russian Aiding DPRK Fraud and Crypto Schemes

US Treasury Sanctions Russian and North Korean Entities for Supporting North Korea's Fraudulent IT Worker Schemes and Crypto-Linked Attacks on American Businesses

  • The US Treasury sanctioned Russian Vitaliy Sergeyevich Andreyev and others for aiding North Korea‘s fraudulent schemes targeting American businesses.
  • These schemes involve North Korean IT workers overseas who steal data and demand ransom, supporting the regime’s weapons programs.
  • Andreyev is linked to Chinyong Information Technology Cooperation Company and associated front companies in Russia, Laos, and China.
  • The sanctioned crypto address connected to Andreyev has received over $600,000, tied to the June 2023 Atomic Wallet exploit attributed to North Korea‘s Lazarus Group.
  • OFAC’s actions build on previous sanctions from July and include steps to help trace and block related crypto transactions.

On August 27, 2025, the US Department of the Treasury’s Office of Foreign Assets Control (OFAC) sanctioned Russian national Vitaliy Sergeyevich Andreyev, a North Korean individual, and two companies for helping North Korea target American businesses with fraud schemes using overseas IT workers. These workers steal data and demand ransom payments.

- Advertisement -

Andreyev is the only person designated today linked to a cryptocurrency address. OFAC also sanctioned Kim Ung Sun, who reportedly managed financial transfers of nearly $600,000 by converting cryptocurrency to US dollars. The actions build on previous sanctions from July 8 and July 24 aimed at stopping North Korea’s IT worker schemes.

North Korea places IT workers abroad in companies, especially in the crypto and Web3 fields. These workers use fake identities and the remote work culture to work legitimately while sending their pay to fund North Korea’s weapons programs. They also look for opportunities to exploit sensitive data or gain financially.

Andreyev is connected to Chinyong Information Technology Cooperation Company, a North Korean IT employer in Russia and Laos. Other sanctioned companies include Shenyang Geumpungri Network Technology, a Chinese front for Chinyong, and Korea Sinjin Trading Corporation, linked to North Korea’s Ministry of People’s Armed Forces General Political Bureau, which OFAC sanctioned in 2017.

One Bitcoin address tied to these sanctions has received over $600,000 and is linked back to the June 2023 Atomic Wallet exploit, associated with North Korea’s Lazarus Group. The funds move through several addresses and cross-chain bridges, a method North Korean actors use to hide transactions.

- Advertisement -

Elliptic, a blockchain analytics firm, has updated its tools to allow users to screen and trace transactions involving these sanctioned addresses, helping prevent the processing of funds connected to these individuals.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

IBM Unveils 120-Qubit Nighthawk Chip, Aiming for Quantum Advantage by 2026

IBM unveiled the Nighthawk and Quantum Loon quantum processors, marking significant progress toward verified...

Nvidia Eyes $200 Return Amid AI Growth and Strategic Deals

NVIDIA stock has encountered resistance near $200 but rose 5% over the last month...

JPMorgan Expands JPM Coin to Base, Eyes Retail and Multi-Currency Use

JPMorgan has launched its dollar-backed stablecoin, JPM Coin (JPMD), for institutional transfers on the...

Report: 16 Blockchains Have Built-in Fund Freezing Mechanisms

Sixteen blockchains have built-in fund freezing features, while 19 more can add this with...

Peraire-Bueno Bros Face Retrial in $25M Ethereum Fraud Case

Anton and James Peraire-Bueno face a potential retrial for alleged fraud and money laundering...
- Advertisement -

Must Read

What Is Binance Earn?

As someone who is passionate about cryptocurrency, I am always on the lookout for new opportunities to grow my portfolio. That's why I was...