{"id":80026,"date":"2026-04-09T11:16:31","date_gmt":"2026-04-09T11:16:31","guid":{"rendered":"https:\/\/dogewisperer.com\/?p=80026"},"modified":"2026-04-09T11:16:31","modified_gmt":"2026-04-09T11:16:31","slug":"crypto-investigator-exposes-north-koreas-secret-1-million-a-month-scheme","status":"publish","type":"post","link":"https:\/\/dogewisperer.com\/?p=80026","title":{"rendered":"Crypto Investigator Exposes North Korea\u2019s Secret $1 Million A Month Scheme"},"content":{"rendered":"<div>\n<p>Crypto detective ZachXBT uncovered an internal North Korean payment server tied to 390+ accounts, chat logs, and transaction histories.<\/p>\n<h2>The DPRK Crypto-Infiltration Saga, Part III (From This Week Only)<\/h2>\n<p>The North Korean secret crypto-agents saga continues. The hidden network of North Korea\u2013aligned crypto hackers have been slowly exposed on the social network X these past days, following<a href=\"https:\/\/www.newsbtc.com\/news\/285m-solana-protocol-drift-largest-exploit-2026\/\" target=\"_blank\" rel=\"noopener nofollow\"> the attribution of the\u00a0April 1st $285 million attack on Drift Protocol\u00a0to UNC4736<\/a>, a North Korea\u2013aligned, state\u2011sponsored hacking group.<\/p>\n<p><a href=\"https:\/\/bitcoinist.com\/north-korean-agents-infiltrate-top-crypto-protocols\/\" target=\"_blank\" rel=\"noopener \">On Sunday<\/a>, security researcher Taylor Monahan\u00a0claimed that North Korean IT workers have quietly worked inside more than 40 DeFi projects over roughly seven years. <a href=\"https:\/\/www.newsbtc.com\/breaking-news-ticker\/crypto-trust-crisis-the-kim-jong%E2%80%91un-test-is-exposing-secret-north-korean-moles\/\" target=\"_blank\" rel=\"noopener nofollow\">Also on Sunday and Monday<\/a>, multiple crypto industry actors shared videos and stories of North Korean IT workers failing the \u201cKim Jong-Un Test\u201d.<\/p>\n<p>Now, it was ZachXBT turn to publish his findings, which he did yesterday <a href=\"https:\/\/x.com\/zachxbt\/status\/2041873508180095032?s=20\" target=\"_blank\" rel=\"noopener nofollow\">on a thread on the social network X.<\/a> The exfiltrated data, that hadn\u2019t been publicly released before, was shared with him by an anonymous source.<\/p>\n<p>The extraction of the data was possible because one of this IT workers workers from the Democratic People\u2019s Republic of Korea (DPRK) had his device infected with an infostealer (malware designed specifically to steal sensitive information). The malware exposed IPMsg chat logs, fabricated identities, and detailed browser activity.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">2\/ A DPRK IT worker had their device compromised via infostealer. Extracted data included IPMsg chat logs, fake identities, and browser history.<\/p>\n<p>Digging through the IPMsg logs revealed this site being discussed:<br \/>\nluckyguys[.]site<\/p>\n<p>An internal payment remittance platform,\u2026 <a href=\"https:\/\/t.co\/0rA1CxSmZx\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/0rA1CxSmZx<\/a><\/p>\n<p>\u2014 ZachXBT (@zachxbt) <a href=\"https:\/\/twitter.com\/zachxbt\/status\/2041873511791345774?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 8, 2026<\/a><\/p>\n<\/blockquote>\n<p>The thread walks through how DPRK IT agents, often posing as freelancers abroad, are allegedly getting paid in crypto and funneled back into regime\u2011linked channels.<\/p>\n<p>A Breakdown Of The Findings<\/p>\n<p>The website that surfaced from the data extraction was called luckyguys.site. According to the crypto detective, it appeared to function as an internal payment remittance hub: a Discord\u2011like messaging platform where DPRK IT operatives reported and reconciled their crypto payments with superiors.<\/p>\n<p>Believe it or not, the site\u2019s default login password was set to \u201c123456\u201d. At the moment of the data extraction, ten accounts were still using it unchanged.<\/p>\n<p><img data-recalc-dims=\"1\" fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-673679 size-large\" src=\"https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/HFYuZ5Sa8AM-p4c.png?w=733&amp;resize=733%2C312\" alt=\"crypto, north korea\" width=\"733\" height=\"312\" srcset=\"https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/HFYuZ5Sa8AM-p4c.png?w=733 733w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/HFYuZ5Sa8AM-p4c.png?w=640 640w\" sizes=\"(max-width: 733px) 100vw, 733px\"><\/p>\n<p>The account roster showed roles, Korean names, locations, and internal group codes that align with known North Korean IT worker structures. ZachXBT highlighted that three of the companies referenced in the data, Sobaeksu, Saenal, and Songkwang, are already subject to OFAC sanctions.<\/p>\n<p>The crypto investigator shared a video showing direct messages from one WebMsg account, \u201cRascal\u201d, with PC\u20111234 (the server admin account) that spell out payment transfers and the use of fake identities from December 2025 to April 2026. Every payment in these chats is routed and finalized via PC\u20111234. The logs also reference Hong Kong addresses for billing and delivery of goods, although whether those details are genuine still needs to be confirmed.<\/p>\n<blockquote class=\"twitter-tweet\" data-media-max-width=\"560\">\n<p dir=\"ltr\" lang=\"en\">4\/ Here is one of the WebMsg users \u2018Rascal\u2019 and their DMs with PC-1234 detailing payment transfers and the use of fraudulent identities from December 2025 through April 2026.<\/p>\n<p>All payments are processed and confirmed through the server admin account: PC-1234.<\/p>\n<p>Addresses in Hong\u2026 <a href=\"https:\/\/t.co\/akyjmTbL5J\" rel=\"nofollow\">pic.twitter.com\/akyjmTbL5J<\/a><\/p>\n<p>\u2014 ZachXBT (@zachxbt) <a href=\"https:\/\/twitter.com\/zachxbt\/status\/2041873518577774708?ref_src=twsrc%5Etfw\" rel=\"nofollow noopener\" target=\"_blank\">April 8, 2026<\/a><\/p>\n<\/blockquote>\n<p>The findings only grow more interesting as the thread advances. Since late November 2025, more than $3.5 million has flowed into the payment wallets. The same remittance pattern shows up again and again: users either send crypto in directly from an exchange or service, or off\u2011ramp into fiat via Chinese bank accounts using platforms such as Payoneer.<\/p>\n<p>After that, PC\u20111234 acknowledges the incoming funds and hands over login credentials, which can be for different crypto exchanges or fintech payment apps, depending on the specific user.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">5\/ Since late November 2025 $3.5M+ was received across the payment wallet addresses.<\/p>\n<p>The remittance pattern was consistent across users:<\/p>\n<p>Users transfer crypto originating from an exchange or service, or convert to fiat via Chinese bank accounts through platforms like Payoneer.\u2026 <a href=\"https:\/\/t.co\/IhbqW3eKKI\" rel=\"nofollow\">pic.twitter.com\/IhbqW3eKKI<\/a><\/p>\n<p>\u2014 ZachXBT (@zachxbt) <a href=\"https:\/\/twitter.com\/zachxbt\/status\/2041873521601868112?ref_src=twsrc%5Etfw\" rel=\"nofollow noopener\" target=\"_blank\">April 8, 2026<\/a><\/p>\n<\/blockquote>\n<p>A Reconstruction Of The Network\u2019s Hierarchy<\/p>\n<p>The crypto detective reconstructed the network\u2019s entire organizational hierarchy using the full dataset and made <a href=\"http:\/\/investigation.io\/dprk-itw-breach\" target=\"_blank\" rel=\"noopener nofollow\">an interactive version of this org chart.<\/a><\/p>\n<p><img loading=\"lazy\" data-recalc-dims=\"1\" decoding=\"async\" class=\"aligncenter wp-image-673681 size-large\" src=\"https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/HFYu67yaUAA2rPw.jpeg?w=847&amp;resize=847%2C660\" alt=\"Crypto, DPRK\" width=\"847\" height=\"660\" srcset=\"https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/HFYu67yaUAA2rPw.jpeg?w=2100 2100w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/HFYu67yaUAA2rPw.jpeg?w=539 539w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/HFYu67yaUAA2rPw.jpeg?w=768 768w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/HFYu67yaUAA2rPw.jpeg?w=847 847w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/HFYu67yaUAA2rPw.jpeg?w=1536 1536w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/HFYu67yaUAA2rPw.jpeg?w=2048 2048w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/HFYu67yaUAA2rPw.jpeg?w=750 750w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/HFYu67yaUAA2rPw.jpeg?w=1140 1140w\" sizes=\"auto, (max-width: 847px) 100vw, 847px\"><\/p>\n<p>When the investigator followed the internal payment wallets on\u2011chain, he found connections to several already\u2011attributed DPRK IT worker clusters. <a href=\"https:\/\/x.com\/zachxbt\/status\/2041873530862899349?s=20\" target=\"_blank\" rel=\"noopener nofollow\">The Tron\u2011based wallet was frozen by Tether in December 2025<\/a>.<\/p>\n<p>Other interesting findings show that the compromised device, which belonged to someone called \u201cJerry\u201d, still had Astrill VPN in use, along with multiple fabricated identities being used to apply for jobs. Inside an internal Slack workspace, a user named \u201cNami\u201d shared a blog post about a deepfake job applicant linked to DPRK IT workers. One colleague asked if the story was about them, while another reminded the group they weren\u2019t allowed to post external links.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">8\/ Jerry\u2019s compromised device shows usage of Astrill VPN and various fake personas applying for jobs.<\/p>\n<p>An internal Slack showed \u2018Nami\u2019 sharing a blog post about a DPRK IT worker deepfake job applicant. A second user asked if it was them, while a third noted they aren\u2019t allowed to\u2026 <a href=\"https:\/\/t.co\/7ZdGbX91WT\" rel=\"nofollow\">pic.twitter.com\/7ZdGbX91WT<\/a><\/p>\n<p>\u2014 ZachXBT (@zachxbt) <a href=\"https:\/\/twitter.com\/zachxbt\/status\/2041873539998085555?ref_src=twsrc%5Etfw\" rel=\"nofollow noopener\" target=\"_blank\">April 8, 2026<\/a><\/p>\n<\/blockquote>\n<p>Jerry exchanged messages with another North Korean IT worker about plans to steal from a project, using a Nigerian proxy to target Arcano, a GalaChain game. If that attack was ever carried out or not is unclear.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">9\/ Jerry actively discussed stealing from a project with another DPRK IT worker via Nigerian proxy targeting Arcano, a GalaChain game.<\/p>\n<p>However, it remains unclear if the attack later materialized. <a href=\"https:\/\/t.co\/p9QQLHbB91\" rel=\"nofollow\">pic.twitter.com\/p9QQLHbB91<\/a><\/p>\n<p>\u2014 ZachXBT (@zachxbt) <a href=\"https:\/\/twitter.com\/zachxbt\/status\/2041873543420662180?ref_src=twsrc%5Etfw\" rel=\"nofollow noopener\" target=\"_blank\">April 8, 2026<\/a><\/p>\n<\/blockquote>\n<p>The admin also distributed 43 Hex-Rays\/IDA Pro training materials to the group between November 2025 and February 2026. These sessions focused on disassembly, decompilation, both local and remote debugging, and a range of cybersecurity techniques. <a href=\"https:\/\/x.com\/zachxbt\/status\/2041873546813829588?s=20\" target=\"_blank\" rel=\"noopener nofollow\">One link shared on November 20<\/a> was explicitly titled: \u201cusing-ida-debugger-to-unpack-an-hostile-pe-executable\u201d.<\/p>\n<p>Final Thoughts<\/p>\n<p><img loading=\"lazy\" data-recalc-dims=\"1\" decoding=\"async\" class=\"aligncenter wp-image-673682 size-large\" src=\"https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/HFYvt63bcAAMJzx.jpeg?w=622&amp;resize=622%2C350\" alt=\"Crypto, ZachXBT \" width=\"622\" height=\"350\"><\/p>\n<p>ZachXBT concluded that this DPRK IT worker cluster appears relatively unsophisticated compared with outfits like AppleJeus and TraderTraitor, which run much tighter operations and pose a far greater systemic threat to the crypto industry. His earlier estimated that North Korean IT workers collectively pull in several million dollars a month is reinforced by this dataset.<\/p>\n<p>Today, the investigator posted an update explaining that the internal DPRK payment portal has been pulled offline following the publication of his findings. All of the data was fully captured and archived beforehand.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">Update: The internal DPRK payment site has since been taken down after my post.<\/p>\n<p>However all data was archived in advance. <a href=\"https:\/\/t.co\/9cRdopal5g\" rel=\"nofollow\">pic.twitter.com\/9cRdopal5g<\/a><\/p>\n<p>\u2014 ZachXBT (@zachxbt) <a href=\"https:\/\/twitter.com\/zachxbt\/status\/2042076218506539413?ref_src=twsrc%5Etfw\" rel=\"nofollow noopener\" target=\"_blank\">April 9, 2026<\/a><\/p>\n<\/blockquote>\n<p>Crypto is now deeply embedded in geopolitical shadow economies. On\u2011chain transparency cuts both ways for users and adversaries.<\/p>\n<p>It wouldn\u2019t be surprising if markets start to price higher compliance costs for CEXs and OTC desks, or if there is more friction for stablecoin flows in sanctioned regions. The North Korean saga surely raises the odds of more aggressive enforcement against cross\u2011border flows, privacy tools, and high\u2011risk venues.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-673683 size-large\" src=\"https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/BTCUSDT_2026-04-09_11-18-31.png?w=980&amp;resize=980%2C636\" alt=\"Bitcoin, BTC, BTCUSDT\" width=\"980\" height=\"636\" srcset=\"https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/BTCUSDT_2026-04-09_11-18-31.png?w=2580 2580w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/BTCUSDT_2026-04-09_11-18-31.png?w=640 640w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/BTCUSDT_2026-04-09_11-18-31.png?w=768 768w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/BTCUSDT_2026-04-09_11-18-31.png?w=980 980w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/BTCUSDT_2026-04-09_11-18-31.png?w=1536 1536w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/BTCUSDT_2026-04-09_11-18-31.png?w=2048 2048w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/BTCUSDT_2026-04-09_11-18-31.png?w=750 750w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/BTCUSDT_2026-04-09_11-18-31.png?w=1140 1140w\" sizes=\"auto, (max-width: 980px) 100vw, 980px\"><\/p>\n<p>Cover image from Perplexity. BTCUSDT chart from Tradingview.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Crypto detective ZachXBT uncovered an internal North Korean payment server tied to 390+ accounts, chat logs, and transaction histories. The DPRK Crypto-Infiltration Saga, Part III (From This Week Only) The North Korean secret crypto-agents saga continues. The hidden network of North Korea\u2013aligned crypto hackers have been slowly exposed on the social network X these past [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"iawp_total_views":0,"footnotes":""},"categories":[2],"tags":[3,4,5],"class_list":["post-80026","post","type-post","status-publish","format-standard","hentry","category-news","tag-crypto","tag-doge","tag-news"],"_links":{"self":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts\/80026","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=80026"}],"version-history":[{"count":0,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts\/80026\/revisions"}],"wp:attachment":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=80026"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=80026"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=80026"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}