Important News

U.S. Highlights MSMT Report on DPRK Cyber and IT Worker Evading of UN Sanctions

Interesting: 0/0 • Support: 0/0Log in to vote

Key takeaways

  • MSMT published a 140-page report using previously non-public information from 11 UN member states and nine private sector companies documenting DPRK sanctions violations.
  • The report says DPRK cyber actors stole at least $2.8 billion in cryptocurrency from Jan. 2024–Sept. 2025 and that DPRK stole an additional $400 million in the three months since the report’s release, bringing 2025 thefts to over $2 billion.
  • DPRK cyber units target defense companies across North America, Europe, and Asia, and critical infrastructure worldwide to support WMD and ballistic missile programs.
  • DPRK facilitator networks in China, Russia, Cambodia, Vietnam, and the UAE assist with laundering and procurement; at least 19 Chinese banks have been used to launder funds.
  • DPRK has IT workers operating in at least eight countries (including China, Russia, Laos, Cambodia, Equatorial Guinea, Guinea, Nigeria, and Tanzania), with 1,000–1,500 known in China and plans to send up to 40,000 laborers, including IT workers, to Russia.
  • Over-the-counter traders in China are reported as key to converting stolen cryptocurrency into fiat currency.

Follow Up Questions

What is the Multilateral Sanctions Monitoring Team (MSMT) and which countries participate?Expand

The Multilateral Sanctions Monitoring Team (MSMT) is an 11‑country mechanism, created in October 2024 after Russia’s veto ended the UN 1718 Panel of Experts, to investigate and publicly report violations and evasion of UN Security Council sanctions on North Korea, especially related to weapons of mass destruction (WMD), missiles, and associated financing (including cyber and IT‑worker activity). The participating states are: Australia, Canada, France, Germany, Italy, Japan, the Netherlands, New Zealand, the Republic of Korea (South Korea), the United Kingdom, and the United States.

Which specific UN Security Council resolutions does the MSMT say the DPRK violated?Expand

Public MSMT statements do not publish an exhaustive list of specific resolutions, but they repeatedly say North Korea’s cyber operations and IT‑worker schemes violate and evade “relevant” DPRK‑related UN Security Council resolutions, especially those that: (1) impose an asset freeze on designated DPRK entities (notably UNSCR 1718 (2006)); and (2) prohibit overseas DPRK labor and related revenue‑generating activities (for example UNSCR 2371 (2017), 2375 (2017), and 2397 (2017)). MSMT communiqués explicitly cite UNSCR 1718’s asset‑freeze provisions as being violated by DPRK intelligence organs conducting these operations.

How do DPRK IT workers stationed abroad generate revenue for North Korea’s WMD and missile programs?Expand

DPRK IT workers based abroad secretly work for foreign companies (often via online freelancing platforms or front firms), earning salaries in hard currency, which they are required to remit back to the North Korean state. According to the MSMT and US Treasury, these workers: (1) pose as non‑North Korean nationals (using forged or borrowed identities, VPNs, and front companies); (2) win contracts in fields like software development, blockchain, mobile apps, and AI; (3) route payments through foreign bank accounts, crypto wallets, or money‑service businesses controlled by DPRK facilitators; and (4) have a large portion of their earnings confiscated by DPRK agencies, which channel the funds into WMD and missile programs alongside proceeds of cyber‑enabled theft.

How do over-the-counter (OTC) traders in China convert stolen cryptocurrency into fiat currency in practice?Expand

Over‑the‑counter (OTC) crypto traders in China typically help DPRK operators cash out stolen cryptocurrency by:

  1. Receiving stolen coins from DPRK‑controlled wallets, often split across many addresses and chains;
  2. Using mixing services, swaps, and chain‑hopping (e.g., converting to stablecoins or other tokens on different blockchains) to obscure origin; and
  3. Privately matching buyers who want crypto with sellers who provide fiat (often RMB or USD), settling via bank transfers, payment apps, or cash. These OTC brokers thus absorb the tainted coins and deliver clean fiat to DPRK intermediaries or accounts in China and elsewhere, bypassing compliant exchanges’ AML/KYC controls.
How do investigators attribute specific cryptocurrency thefts to DPRK actors and verify the dollar amounts reported?Expand

Investigators attribute crypto thefts to DPRK in two main ways: • Blockchain and technical forensics: Firms and governments analyze on‑chain patterns (re‑used wallets, timing, transaction flows, use of particular mixers/bridges) plus malware, infrastructure, and phishing techniques that match known DPRK groups like Lazarus and Kimsuky. Clusters of addresses are labeled as DPRK‑linked and reused across operations. • Intelligence and law‑enforcement data: Arrests, seized servers, and classified signals/human intelligence help confirm which state actors control given wallets or infrastructure.

Dollar amounts are estimated by tracing all transfers from a hacked entity to identified attacker‑controlled wallets and valuing the assets at the time they were moved or laundered; firms such as Chainalysis, along with UN and MSMT analysts, cross‑check these flows to produce loss totals (e.g., the multibillion‑dollar figures cited for 2024–25 DPRK hacks).

What steps can the United States or other UN member states take diplomatically or legally when a country is found to be evading UN sanctions via cyber means?Expand

When another state is found to be enabling DPRK sanctions evasion via cyber means, the United States and other UN members generally rely on national and collective measures rather than new UN sanctions (which can be vetoed). Tools include: • Unilateral or coordinated sanctions: Designating foreign banks, companies, facilitators, and individuals that launder DPRK cyber proceeds or host DPRK IT workers; freezing assets and cutting them off from the US and allied financial systems. • Criminal and civil enforcement: Indicting hackers, money‑launderers, and complicit intermediaries; seizing crypto and fiat assets linked to DPRK operations; and using civil forfeiture. • Diplomatic démarches and pressure: Formally protesting to the host government, publishing attributions and advisories to raise reputational costs, and threatening secondary sanctions against entities that continue to enable DPRK activity. • Regulatory and technical cooperation: Sharing intelligence, indicators of compromise, and typologies with other governments and with the private sector to improve enforcement of existing UNSCRs.

What measures can companies and cryptocurrency platforms take to protect against the types of DPRK cyber intrusions described in the report?Expand

To reduce exposure to DPRK‑style intrusions and fraud, companies and crypto platforms can: • Strengthen cybersecurity: Implement multi‑factor authentication, strict access controls, network segmentation, prompt patching, phishing‑resistant login methods, and robust monitoring for unusual logins and transfers. • Harden crypto custody: Use hardware security modules and multi‑sig wallets; keep most assets in offline cold storage; enforce withdrawal limits, time‑locks, and manual review of large or anomalous transfers. • Enhance vetting and compliance: Conduct rigorous KYC/AML checks, screen customers and counterparties against sanctions lists and DPRK red‑flags, and scrutinize remote IT hires or contractors for signs of North Korean origin (VPN‑masked locations, reused identities, mismatched documents). • Share and use threat intelligence: Consume up‑to‑date indicators of compromise and typologies from governments and reputable cybersecurity firms, participate in information‑sharing groups, and rehearse incident‑response plans tailored to DPRK tactics.

Comments

Only logged-in users can comment.
Loading…