Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
OFAC Sanctions North Korean IT Network Exploiting Remote Jobs

OFAC Sanctions North Korean IT Network Exploiting Remote Jobs

Posted on March 18, 2026 By CWS

The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) has imposed sanctions on six individuals and two entities linked to a scheme operated by the Democratic People’s Republic of Korea (DPRK). This network of information technology (IT) workers is accused of defrauding U.S. businesses to generate funds for North Korea’s weapons of mass destruction (WMD) programs.

Sanctioned Entities and Individuals

According to the Treasury, North Korean IT operatives target American companies by using deceptive tactics to extract payments, manipulating sensitive data, and engaging in extortion. The fraudulent operation, known by names such as Coral Sleet and PurpleDelta, uses fake documents and identities to secure employment in legitimate firms, channeling a significant portion of the earnings back to North Korea for illicit activities.

Among those sanctioned is the Amnokgang Technology Development Company, responsible for managing overseas IT workers and engaging in illegal procurement of military technology. Also targeted is Nguyen Quang Viet, CEO of a Vietnamese firm that converted millions into cryptocurrency, facilitating transactions for North Koreans.

Cybersecurity Concerns and International Operations

These operations are often supported by malware that steals proprietary information and demands ransoms to prevent data leaks. The tactics involve leveraging VPN services like Astrill to bypass geographic barriers, allowing operatives to appear as domestic employees by routing traffic through U.S. nodes.

Security experts highlight the network’s use of Astrill VPN to operate clandestinely from countries like China, where internet infrastructure is more reliable. These VPN services help mask the true origin of the operatives, contributing to their ability to conduct unrestricted global operations.

Role of Artificial Intelligence in Threat Operations

The network’s sophistication extends to the use of artificial intelligence (AI) in creating convincing digital personas and fake company websites. AI tools like Faceswap are employed to fabricate identities, enhancing the credibility of job applications with realistic digital headshots.

This technological edge allows North Korean IT workers to maintain extended and trusted access within organizations. The threat actors exploit AI to streamline operations, including malware development and social engineering, heightening the challenge for cybersecurity defenses worldwide.

Reports by cybersecurity firms Flare and IBM X-Force reveal a complex operational structure behind the IT worker scheme, involving recruiters, facilitators, and collaborators. These roles collectively enable North Korean operatives to infiltrate organizations and evade detection, contributing to the DPRK’s broader revenue-generation efforts.

The involvement of Western collaborators, often recruited through platforms like LinkedIn and GitHub, further bolsters the scheme’s reach and effectiveness, underscoring the pervasive nature of North Korea’s IT worker operations in circumventing international sanctions.

The Hacker News Tags:AI in cybercrime, Cybersecurity, fraudulent employment, identity theft, malware deployment, North Korean IT workers, OFAC sanctions, sanctions evasion, VPN usage, WMD funding

Post navigation

Previous Post: Cisco Firewall Vulnerability Used for Ransomware Attacks
Next Post: XBOW Secures $120M to Enhance AI Security Platform

Related Posts

Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware The Hacker News
AI Browsers Vulnerable to Phishing Attacks: A Security Concern AI Browsers Vulnerable to Phishing Attacks: A Security Concern The Hacker News
Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware The Hacker News
GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections The Hacker News
How Continuous Exposure Management Transforms Security Operations How Continuous Exposure Management Transforms Security Operations The Hacker News
Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO Countries Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO Countries The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • EU Imposes Sanctions on Firms Linked to Cyber Attacks
  • DarkSword iOS Exploit Targets iPhone Users Worldwide
  • XBOW Secures $120M to Enhance AI Security Platform
  • OFAC Sanctions North Korean IT Network Exploiting Remote Jobs
  • Cisco Firewall Vulnerability Used for Ransomware Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • EU Imposes Sanctions on Firms Linked to Cyber Attacks
  • DarkSword iOS Exploit Targets iPhone Users Worldwide
  • XBOW Secures $120M to Enhance AI Security Platform
  • OFAC Sanctions North Korean IT Network Exploiting Remote Jobs
  • Cisco Firewall Vulnerability Used for Ransomware Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark