wp-plugin-hostgator
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114ol-scrapes
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114Source:https:\/\/techcrunch.com\/2023\/05\/24\/us-government-targets-north-koreas-illicit-it-workforce-with-new-sanctions\/<\/a><\/br> The U.S. government announced new sanctions against North Korea related to its army of illicit IT workers that have fraudulently gained employment to finance the regime\u2019s weapons of mass destruction programs.<\/p>\n North Korea maintains thousands of \u201chighly skilled\u201d IT workers around the world, primarily in China and Russia, which \u201cgenerate revenue that contributes to its unlawful weapons of mass destruction and ballistic missile programs,\u201d according to an announcement from the U.S. Treasury Department<\/a> on Tuesday.<\/p>\n These individuals, which in some cases earn upwards of $300,000 a year, deliberately obfuscate their identities, locations and nationalities using stolen identities and falsified documentation to apply for jobs with employers located in \u201cwealthier countries.\u201d They have secretly worked in various positions and industries, including the fields of \u201cbusiness, health and fitness, social networking, sports, entertainment, and lifestyle,\u201d the announcement read.<\/p>\n While these individuals tend to engage in legitimate IT work unrelated to malicious cyber activity, mainly on cryptocurrency<\/a> projects, they use virtual currency exchanges and trading platforms to launder illicitly obtained funds back to the DPRK, according to the announcement.<\/p>\n The Treasury on Tuesday announced sanctions against four entities employing \u201cthousands\u201d of North Korean IT workers. One of these is the Pyongyang University of Automation, which the Treasury described as one of North Korea\u2019s \u201cpremier cyber instruction institutions.\u201d The institution is said to have been training cybercriminals who go on to work in cyber units tied to the Reconnaissance General Bureau (RGB) \u2014 the country\u2019s primary intelligence agency.<\/p>\n The Treasury also sanctioned the Technical Reconnaissance Bureau and its 110th Research Center, which lead the DPRK\u2019s development of offensive cyber tactics and tools. The center is also believed to have trained operatives of the notorious Lazarus Group, which was linked to the theft of $625 million in cryptocurrency<\/a> from Ronin, an Ethereum<\/a>-based sidechain made for the popular play-to-earn game Axie Infinity<\/a>.<\/p>\n Sanctions were also announced against the Chinyong Information Technology Cooperation Company and an individual named King San Man in relation to their IT worker activities.<\/p>\n \u201cToday\u2019s action continues to highlight the DPRK\u2019s extensive illicit cyber and IT worker operations, which finance the regime\u2019s unlawful weapons of mass destruction and ballistic missile programs,\u201d said Under Secretary of the Treasury for Terrorism and Financial Intelligence Brian E. Nelson. \u201cThe United States and our partners remain committed to combatting the DPRK\u2019s illicit revenue generation activities and continued efforts to steal money from financial institutions, virtual currency exchanges, companies, and private individuals around the world.\u201d<\/p>\n
\nUS government targets North Korea\u2019s illicit IT workforce with new sanctions<\/br>
\n2023-05-24 21:59:24<\/br><\/p>\n