Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
OFAC Sanctions North Korean IT Network Exploiting Remote Jobs

OFAC Sanctions North Korean IT Network Exploiting Remote Jobs

Posted on March 18, 2026 By CWS

The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) has imposed sanctions on six individuals and two entities linked to a scheme operated by the Democratic People’s Republic of Korea (DPRK). This network of information technology (IT) workers is accused of defrauding U.S. businesses to generate funds for North Korea’s weapons of mass destruction (WMD) programs.

Sanctioned Entities and Individuals

According to the Treasury, North Korean IT operatives target American companies by using deceptive tactics to extract payments, manipulating sensitive data, and engaging in extortion. The fraudulent operation, known by names such as Coral Sleet and PurpleDelta, uses fake documents and identities to secure employment in legitimate firms, channeling a significant portion of the earnings back to North Korea for illicit activities.

Among those sanctioned is the Amnokgang Technology Development Company, responsible for managing overseas IT workers and engaging in illegal procurement of military technology. Also targeted is Nguyen Quang Viet, CEO of a Vietnamese firm that converted millions into cryptocurrency, facilitating transactions for North Koreans.

Cybersecurity Concerns and International Operations

These operations are often supported by malware that steals proprietary information and demands ransoms to prevent data leaks. The tactics involve leveraging VPN services like Astrill to bypass geographic barriers, allowing operatives to appear as domestic employees by routing traffic through U.S. nodes.

Security experts highlight the network’s use of Astrill VPN to operate clandestinely from countries like China, where internet infrastructure is more reliable. These VPN services help mask the true origin of the operatives, contributing to their ability to conduct unrestricted global operations.

Role of Artificial Intelligence in Threat Operations

The network’s sophistication extends to the use of artificial intelligence (AI) in creating convincing digital personas and fake company websites. AI tools like Faceswap are employed to fabricate identities, enhancing the credibility of job applications with realistic digital headshots.

This technological edge allows North Korean IT workers to maintain extended and trusted access within organizations. The threat actors exploit AI to streamline operations, including malware development and social engineering, heightening the challenge for cybersecurity defenses worldwide.

Reports by cybersecurity firms Flare and IBM X-Force reveal a complex operational structure behind the IT worker scheme, involving recruiters, facilitators, and collaborators. These roles collectively enable North Korean operatives to infiltrate organizations and evade detection, contributing to the DPRK’s broader revenue-generation efforts.

The involvement of Western collaborators, often recruited through platforms like LinkedIn and GitHub, further bolsters the scheme’s reach and effectiveness, underscoring the pervasive nature of North Korea’s IT worker operations in circumventing international sanctions.

The Hacker News Tags:AI in cybercrime, Cybersecurity, fraudulent employment, identity theft, malware deployment, North Korean IT workers, OFAC sanctions, sanctions evasion, VPN usage, WMD funding

Post navigation

Previous Post: Cisco Firewall Vulnerability Used for Ransomware Attacks
Next Post: XBOW Secures $120M to Enhance AI Security Platform

Related Posts

APT28 Deploys BEARDSHELL and COVENANT in Ukraine Espionage APT28 Deploys BEARDSHELL and COVENANT in Ukraine Espionage The Hacker News
Interlock Ransomware Exploits Cisco Flaw for Root Access Interlock Ransomware Exploits Cisco Flaw for Root Access The Hacker News
Cisco Confirms Active Exploits Targeting ISE Flaws Enabling Unauthenticated Root Access Cisco Confirms Active Exploits Targeting ISE Flaws Enabling Unauthenticated Root Access The Hacker News
Why Built-In Protections Aren’t Enough for Modern Data Resilience Why Built-In Protections Aren’t Enough for Modern Data Resilience The Hacker News
Qualcomm Fixes 3 Zero-Days Used in Targeted Android Attacks via Adreno GPU Qualcomm Fixes 3 Zero-Days Used in Targeted Android Attacks via Adreno GPU The Hacker News
Malicious Chrome Extensions Threaten Business Security Malicious Chrome Extensions Threaten Business Security The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Manifold Secures $8 Million to Enhance AI Security
  • UIDAI Initiates Bug Bounty to Enhance Aadhaar Security
  • Preemptive Security Urged as Cyber Threats Accelerate
  • Enhancing SOC Triage Efficiency with ANY.RUN
  • EU Imposes Sanctions on Firms Linked to Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Manifold Secures $8 Million to Enhance AI Security
  • UIDAI Initiates Bug Bounty to Enhance Aadhaar Security
  • Preemptive Security Urged as Cyber Threats Accelerate
  • Enhancing SOC Triage Efficiency with ANY.RUN
  • EU Imposes Sanctions on Firms Linked to Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark