U.S. Sanctions Six Individuals and Two Companies Over North Korea's $800 Million IT Worker Crypto Network
March 13, 2026
The U.S. Treasury's Office of Foreign Assets Control (OFAC) designated six individuals and two entities on March 12 for helping North Korea's government route earnings from fraudulent remote IT work into its weapons of mass destruction and ballistic missile programs. The scheme generated nearly $800 million in 2024 alone, according to Treasury's own designation documents. Twenty-one cryptocurrency addresses across Ethereum, Tron, and Bitcoin were added to the Specially Designated Nationals (SDN) list as part of the action; 11 of those 21 addresses came from an update to the existing SDN entry for previously designated individual Sim Hyon Sop, rather than from the six newly designated individuals alone.
The sanctioned network stretches from Southeast Asia to Europe, with individuals and entities operating across Vietnam, Laos, Spain, and North Korea. At its center is Nguyen Quang Viet, a Vietnamese national who ran Quangvietdnbg International Services Company Limited and converted approximately $2.5 million in earnings into cryptocurrency for North Korean IT workers between mid-2023 and mid-2025. Two other Vietnamese nationals also played supporting roles: Do Phi Khanh served as a proxy facilitating money laundering, while Hoang Van Nguyen provided bank account and cryptocurrency facilitation. Hoang Van Nguyen was also linked to a separate counterfeit cigarette deal worth more than $200,000 in 2022. Yun Song Guk, a North Korean national operating in Boten, Laos, led a local IT worker group and coordinated more than $70,000 in transactions, with two Ethereum addresses now under his designation. Hoang Minh Quang (Vietnam) facilitated IT services payments and had one Bitcoin address designated. York Louis Celestino Herrera, based in Spain, developed freelance contracts to feed workers into the network.
OFAC also designated Amnokgang Technology Development Company, a North Korean state entity that manages overseas IT worker delegations and procurement. In a concurrent action, Treasury sanctioned two additional individuals and two additional entities linked to Cheil Credit Bank: Jang Kuk Chol and Ho Jong Son, who collectively managed approximately $5.3 million in cryptocurrency for the bank, along with Ryujong Credit Bank and Korea Mangyongdae Computer Technology Company. That concurrent action added 53 more cryptocurrency addresses to the SDN list. Wallets tied to Cheil Credit Bank received roughly $12.7 million between June 2023 and May 2025, with a significant portion consisting of Tether (USDT) that was frozen during a large-scale Tether blacklisting operation in April and May 2025.
Treasury Secretary Scott Bessent framed the action as part of broader financial enforcement. "Under President Trump's leadership, Treasury will continue to follow the money to protect U.S. businesses," he said in the department's statement.
The IT worker revenue stream is one piece of a larger North Korean crypto operation. DPRK-linked hackers stole $1.34 billion across 47 incidents in 2024, accounting for 61 percent of all crypto stolen globally that year. In 2025, that figure climbed to $2.02 billion, a 51 percent year-over-year increase and a record high. The single largest crypto heist on record was the February 2025 Bybit hack, in which the Lazarus Group (also known as TraderTraitor and APT38) compromised a developer machine connected to the Safe multi-signature wallet platform and stole $1.5 billion by injecting malicious JavaScript into a cold-to-hot wallet transfer. The FBI confirmed North Korean involvement. Since 2017, identified North Korean crypto theft totals approximately $6.75 billion.
Blockchain analytics firm Chainalysis noted a shift in tactics in its 2026 Crypto Crime Report: "North Korea is achieving larger thefts with fewer incidents, often by embedding IT workers inside crypto services or using sophisticated impersonation tactics targeting executives."
The practical exposure extends well beyond the United States. The geographic corridor running through Vietnam, Laos, and China forms the operational backbone of the sanctioned network, confirming that Southeast Asian nationals are functioning as conversion points between DPRK IT teams and clean capital markets. In Africa, U.S. officials have specifically identified Nigeria, Tanzania, Equatorial Guinea, and Guinea as countries where North Korean IT workers are physically present. Developers in Kenya and Nigeria are also being actively targeted through fake recruiter profiles that deliver malware during simulated coding interviews.
For crypto platforms in South Asia and Africa, the Tron network creates a particular compliance risk. Approximately $80 billion in USDT circulated on Tron's TRC-20 network as of Q2 2025, representing roughly 51 percent of all USDT in circulation at that time. Tron-based USDT is the dominant stablecoin rail for remittances and peer-to-peer trading across both regions. Several of the newly designated addresses involve Tron, meaning exchanges and over-the-counter desks that process USDT without screening against the updated SDN list now face potential sanctions exposure. Platforms operating under the U.S. GENIUS Act, which passed in July 2025 and mandates BSA-equivalent AML and OFAC screening for stablecoin transactions touching U.S. jurisdictions, face an additional compliance obligation.
The number of companies globally that unknowingly hired North Korean developers grew by 220 percent in the 12 months leading to mid-2025, reaching more than 320 companies in that period, according to identity firm Okta as reported by Fortune in August 2025. Web3 projects and decentralized autonomous organizations with distributed contributor bases are particularly exposed, as standard identity verification practices common in traditional finance are applied inconsistently across emerging market crypto ecosystems. In South Asia, threat intelligence from security researchers has specifically named India and Pakistan as active targets for North Korean infiltration efforts, a detail that carries direct relevance for compliance teams operating in those markets.
Analysts at 38 North describe North Korea's crypto program as "a shadow national treasury that sanctions cannot touch," one that funds nuclear weapons and missile development while sustaining the loyalty networks of the Kim regime. With total theft now approaching $7 billion since 2017 and infiltration rates still climbing, Thursday's designations represent enforcement activity within what is, by most measures, an expanding operation.