Key Takeaways
- Cryptocurrency investigator ZachXBT uncovered a sophisticated ring of 140 North Korean IT operatives generating approximately $1 million monthly in digital assets
- The operation accumulated more than $3.5 million since late November 2024 through fraudulent identity schemes targeting remote technology positions
- Payment coordination occurred via “luckyguys.site,” protected by the notoriously weak password “123456”
- Digital assets were laundered into traditional currency through Chinese banking channels and services including Payoneer
- Cryptocurrency wallets associated with the operation traced back to OFAC-sanctioned organizations and faced freezing by Tether
A prominent blockchain investigator ZachXBT released confidential information this week obtained from a compromised computer owned by a North Korean IT operative, uncovering an organized cryptocurrency fraud scheme that accumulated more than $3.5 million within several months.
The intelligence came from an anonymous security researcher who successfully infiltrated one of the operative’s systems. ZachXBT shared his analysis on X, outlining how approximately 140 individuals, managed by someone using the alias “Jerry,” were generating roughly $1 million monthly in cryptocurrency beginning in late November 2024.
The operatives deployed fabricated credentials to secure remote technology positions through job boards such as Indeed. Documentation revealed Jerry pursuing full-stack development and software engineering opportunities while utilizing an Astrill VPN connection to conceal geographical origins.
In one drafted but unsent message, Jerry sought a WordPress and SEO specialist role with a Texas-based apparel company, requesting $30 hourly compensation for 15 to 20 weekly hours.
Another operative, identified as “Rascal,” employed a counterfeit identity and Hong Kong mailing address on financial documentation. Rascal’s compromised files also contained imagery of an Irish passport, though its deployment remains uncertain.
Payment Infrastructure and Coordination
The collective managed financial transactions through a platform hosted at “luckyguys.site.” Numerous user profiles on this system relied on the elementary password “123456,” demonstrating inadequate operational security practices.
This platform served dual purposes as both a communication channel and financial tracking system. Operatives logged their revenue and received directives through this interface. An administrative profile designated PC-1234 validated transactions and allocated access credentials for cryptocurrency exchanges and financial technology services.
Three organizations identified in the exposed data — Sobaeksu, Saenal, and Songkwang — currently appear on US Office of Foreign Assets Control sanctions lists.
Digital currency was transformed into traditional money utilizing Chinese financial institutions and platforms such as Payoneer. A Tron wallet linked to this network was immobilized by Tether in December 2024.
Malicious Activities and Educational Resources
The compromised data additionally revealed that certain operatives were orchestrating theft operations. One communication thread mentioned targeting a venture called Arcano on GalaChain using a Nigerian intermediary, though actual execution remains unverified.
An administrator circulated 43 instructional modules addressing reverse engineering applications including Hex-Rays and IDA Pro, emphasizing disassembly techniques, debugging procedures, and malware examination.
The exposed dataset encompassed 390 user profiles, conversation records, and web browsing histories. One discovery identified 33 operatives communicating via IPMsg on an identical network infrastructure.
ZachXBT observed this collective demonstrated lower technical capabilities compared to other North Korean operations such as AppleJeus and TraderTraitor.
North Korean government-affiliated cybercriminals have plundered over $7 billion cumulatively since 2009. This particular collective was also associated with the $280 million compromise of Drift Protocol on April 1, 2025.


