DOJ Seizes $15 Million From North Korean Crypto Heists While Securing New Convictions
The U.S. Department of Justice continues its aggressive pursuit of North Korean cybercriminals. Federal authorities announced the seizure of over $15 million in cryptocurrency linked to North Korean hacking operations on Friday. The seized assets consist of Tether’s USDT stablecoin and are connected to cyber heists orchestrated by Advanced Persistent Threat 38, a hacking group allegedly tied to the North Korean military.
This enforcement action represents another milestone in the government’s ongoing battle against cryptocurrency-related crimes. The seized funds will eventually be returned to their rightful owners, providing some relief to victims of these sophisticated cyber attacks.
North Korean Crypto Heists Target Multiple Platforms
The seized cryptocurrency stems from four separate virtual currency heists that occurred in 2023. These attacks targeted overseas cryptocurrency platforms resulting in hundreds of millions of dollars in stolen digital assets.
The heists included a July 2023 theft of approximately $37 million from an Estonia-based virtual currency payments processor. That same month, attackers stole roughly $100 million from a Panama-based virtual currency payment processor.
The attacks escalated in November 2023 with a theft of approximately $138 million from a Panama-based virtual currency exchange. Another November 2023 attack on a Seychelles-based virtual currency exchange netted approximately $107 million in stolen cryptocurrency.
The DOJ’s ability to track and freeze these assets demonstrates growing sophistication in blockchain forensics. Law enforcement agencies are developing advanced tools to follow cryptocurrency trails across multiple platforms and jurisdictions.
Five Guilty Pleas in North Korean IT Worker Scheme
Beyond the cryptocurrency seizures, the DOJ secured five guilty pleas connected to a separate but related scheme. These individuals facilitated North Korean actors in obtaining remote IT employment with U.S. companies by providing false or stolen identities.
The facilitators hosted company-provided laptops at residences across the United States to create the false appearance that IT workers were operating domestically. These fraudulent employment schemes impacted more than 136 U.S. companies.
Three U.S. nationals pleaded guilty to wire fraud conspiracy for providing U.S. identities to remote North Korean IT workers. The scheme allowed North Korean operatives to earn legitimate paychecks while maintaining their hidden identities.
One participant, Erick Ntekereze Prince, ran a company called Taggcar that supplied allegedly certified IT workers to U.S. companies. Prince earned more than $89,000 for his role in the scheme.
A Ukrainian national, Oleksandr Didenko, also pleaded guilty to wire fraud conspiracy and aggravated identity theft. These convictions highlight the international nature of North Korean revenue generation schemes.
FBI Exposes North Korean Sanctions Evasion Campaign
FBI Assistant Director Roman Rozhavsky stated that ongoing probes continue to expose North Korea’s relentless campaign to evade U.S. sanctions. The regime generates millions of dollars through these schemes to fund its authoritarian government and weapons programs.
North Korea faces extensive international sanctions designed to limit its access to global financial systems. Cryptocurrency provides an avenue to circumvent these restrictions and generate revenue for prohibited activities.
The combination of cyber heists and fraudulent IT worker schemes creates a sophisticated revenue stream. These operations allow North Korea to access Western companies and financial systems despite international isolation.
Broader Implications for Crypto Security
This enforcement action sends a clear message about the government’s commitment to combating cryptocurrency crimes. The successful seizure demonstrates that blockchain transactions are not anonymous when law enforcement agencies deploy proper investigative tools.
For legitimate cryptocurrency users, these actions should provide reassurance. Authorities are actively working to identify and remove bad actors from the ecosystem. This ultimately strengthens trust in digital assets and their underlying infrastructure.
The DOJ also announced a Scam Center Strike Force earlier this week to target pig-butchering scams. Authorities seized another $80 million in stolen funds related to these operations.
Questions remain about how seized cryptocurrency funds might relate to U.S. strategic reserve plans. President Donald Trump has expressed interest in establishing cryptocurrency reserves as long-term investments for the country.
Federal authorities continue developing their capabilities to combat cryptocurrency-related crimes. These enforcement actions likely signal more aggressive pursuit of state-sponsored hacking groups and criminal organizations operating in the digital asset space.
Conclusion
The North Korean regime’s sophisticated cyber operations pose ongoing security challenges. However, successful seizures like this demonstrate that law enforcement can effectively counter these threats through international cooperation and advanced blockchain analysis techniques.

