The post U.S. DOJ Seeks $15M USDT Forfeiture in North Korean Crypto Theft Probe appeared on BitcoinEthereumNews.com. COINOTAG recommends • Exchange signup 💹 Trade with pro tools Fast execution, robust charts, clean risk controls. 👉 Open account → COINOTAG recommends • Exchange signup 🚀 Smooth orders, clear control Advanced order types and market depth in one view. 👉 Create account → COINOTAG recommends • Exchange signup 📈 Clarity in volatile markets Plan entries & exits, manage positions with discipline. 👉 Sign up → COINOTAG recommends • Exchange signup ⚡ Speed, depth, reliability Execute confidently when timing matters. 👉 Open account → COINOTAG recommends • Exchange signup 🧭 A focused workflow for traders Alerts, watchlists, and a repeatable process. 👉 Get started → COINOTAG recommends • Exchange signup ✅ Data‑driven decisions Focus on process—not noise. 👉 Sign up → North Korea crypto heists involve DPRK operatives using stolen identities to infiltrate U.S. companies via remote IT jobs, stealing millions in cryptocurrency to fund weapons programs. U.S. authorities charged five individuals and moved to forfeit $15 million tied to APT38 hacks, disrupting these multimillion-dollar schemes. U.S. DOJ charges five for aiding DPRK IT workers in infiltrating 136 companies using fake identities. Network facilitated $2.2 million transfers back to North Korea through remote work fraud. $15 million in USDT frozen from APT38 hacks on crypto exchanges in 2023, per DOJ filings. Discover how U.S. crackdown on North Korea crypto heists targets identity fraud and APT38 thefts. Learn about DOJ actions seizing $15M and global efforts against DPRK funding. Stay informed on crypto security threats today. What are North Korea crypto heists and how do they fund the regime? North Korea crypto heists refer to sophisticated cyber operations by DPRK military hackers, like APT38, targeting cryptocurrency exchanges to steal funds that bypass international sanctions. These heists, combined with remote IT infiltration using stolen identities, have generated hundreds of millions for the… The post U.S. DOJ Seeks $15M USDT Forfeiture in North Korean Crypto Theft Probe appeared on BitcoinEthereumNews.com. COINOTAG recommends • Exchange signup 💹 Trade with pro tools Fast execution, robust charts, clean risk controls. 👉 Open account → COINOTAG recommends • Exchange signup 🚀 Smooth orders, clear control Advanced order types and market depth in one view. 👉 Create account → COINOTAG recommends • Exchange signup 📈 Clarity in volatile markets Plan entries & exits, manage positions with discipline. 👉 Sign up → COINOTAG recommends • Exchange signup ⚡ Speed, depth, reliability Execute confidently when timing matters. 👉 Open account → COINOTAG recommends • Exchange signup 🧭 A focused workflow for traders Alerts, watchlists, and a repeatable process. 👉 Get started → COINOTAG recommends • Exchange signup ✅ Data‑driven decisions Focus on process—not noise. 👉 Sign up → North Korea crypto heists involve DPRK operatives using stolen identities to infiltrate U.S. companies via remote IT jobs, stealing millions in cryptocurrency to fund weapons programs. U.S. authorities charged five individuals and moved to forfeit $15 million tied to APT38 hacks, disrupting these multimillion-dollar schemes. U.S. DOJ charges five for aiding DPRK IT workers in infiltrating 136 companies using fake identities. Network facilitated $2.2 million transfers back to North Korea through remote work fraud. $15 million in USDT frozen from APT38 hacks on crypto exchanges in 2023, per DOJ filings. Discover how U.S. crackdown on North Korea crypto heists targets identity fraud and APT38 thefts. Learn about DOJ actions seizing $15M and global efforts against DPRK funding. Stay informed on crypto security threats today. What are North Korea crypto heists and how do they fund the regime? North Korea crypto heists refer to sophisticated cyber operations by DPRK military hackers, like APT38, targeting cryptocurrency exchanges to steal funds that bypass international sanctions. These heists, combined with remote IT infiltration using stolen identities, have generated hundreds of millions for the…

U.S. DOJ Seeks $15M USDT Forfeiture in North Korean Crypto Theft Probe

COINOTAG recommends • Exchange signup
💹 Trade with pro tools
Fast execution, robust charts, clean risk controls.
👉 Open account →
COINOTAG recommends • Exchange signup
🚀 Smooth orders, clear control
Advanced order types and market depth in one view.
👉 Create account →
COINOTAG recommends • Exchange signup
📈 Clarity in volatile markets
Plan entries & exits, manage positions with discipline.
👉 Sign up →
COINOTAG recommends • Exchange signup
⚡ Speed, depth, reliability
Execute confidently when timing matters.
👉 Open account →
COINOTAG recommends • Exchange signup
🧭 A focused workflow for traders
Alerts, watchlists, and a repeatable process.
👉 Get started →
COINOTAG recommends • Exchange signup
✅ Data‑driven decisions
Focus on process—not noise.
👉 Sign up →
  • U.S. DOJ charges five for aiding DPRK IT workers in infiltrating 136 companies using fake identities.

  • Network facilitated $2.2 million transfers back to North Korea through remote work fraud.

  • $15 million in USDT frozen from APT38 hacks on crypto exchanges in 2023, per DOJ filings.

Discover how U.S. crackdown on North Korea crypto heists targets identity fraud and APT38 thefts. Learn about DOJ actions seizing $15M and global efforts against DPRK funding. Stay informed on crypto security threats today.

What are North Korea crypto heists and how do they fund the regime?

North Korea crypto heists refer to sophisticated cyber operations by DPRK military hackers, like APT38, targeting cryptocurrency exchanges to steal funds that bypass international sanctions. These heists, combined with remote IT infiltration using stolen identities, have generated hundreds of millions for the regime. In a recent crackdown, the U.S. Department of Justice charged facilitators and sought to forfeit $15 million in stolen USDT.

COINOTAG recommends • Professional traders group
💎 Join a professional trading community
Work with senior traders, research‑backed setups, and risk‑first frameworks.
👉 Join the group →
COINOTAG recommends • Professional traders group
📊 Transparent performance, real process
Spot strategies with documented months of triple‑digit runs during strong trends; futures plans use defined R:R and sizing.
👉 Get access →
COINOTAG recommends • Professional traders group
🧭 Research → Plan → Execute
Daily levels, watchlists, and post‑trade reviews to build consistency.
👉 Join now →
COINOTAG recommends • Professional traders group
🛡️ Risk comes first
Sizing methods, invalidation rules, and R‑multiples baked into every plan.
👉 Start today →
COINOTAG recommends • Professional traders group
🧠 Learn the “why” behind each trade
Live breakdowns, playbooks, and framework‑first education.
👉 Join the group →
COINOTAG recommends • Professional traders group
🚀 Insider • APEX • INNER CIRCLE
Choose the depth you need—tools, coaching, and member rooms.
👉 Explore tiers →

How do DPRK operatives use remote IT jobs for infiltration?

North Korean IT workers pose as U.S.-based freelancers by using stolen Social Security numbers, fake addresses, and proxy computers to secure remote positions at American companies. According to the DOJ, five individuals—four Americans and one Ukrainian—pleaded guilty to providing falsified identities and hosting laptops, enabling infiltration of 136 firms. This scheme funneled over $2.2 million to the DPRK, with workers earning up to hundreds of thousands annually per operative. Experts from the FBI note these tactics not only fund weapons programs but also pose risks to corporate networks and national security. The operations often involve evading hiring vetting through intermediaries, highlighting vulnerabilities in remote work protocols.

Frequently Asked Questions

What is APT38 and its role in North Korea crypto heists?

APT38 is a North Korean military hacking group linked to major cryptocurrency thefts from exchanges in Estonia, Panama, and Seychelles in 2023. It stole hundreds of millions, laundering funds via mixers and OTC brokers. The DOJ’s forfeiture of $15 million in USDT aims to disrupt these illicit revenue streams supporting DPRK sanctions evasion.

COINOTAG recommends • Exchange signup
📈 Clear interface, precise orders
Sharp entries & exits with actionable alerts.
👉 Create free account →
COINOTAG recommends • Exchange signup
🧠 Smarter tools. Better decisions.
Depth analytics and risk features in one view.
👉 Sign up →
COINOTAG recommends • Exchange signup
🎯 Take control of entries & exits
Set alerts, define stops, execute consistently.
👉 Open account →
COINOTAG recommends • Exchange signup
🛠️ From idea to execution
Turn setups into plans with practical order types.
👉 Join now →
COINOTAG recommends • Exchange signup
📋 Trade your plan
Watchlists and routing that support focus.
👉 Get started →
COINOTAG recommends • Exchange signup
📊 Precision without the noise
Data‑first workflows for active traders.
👉 Sign up →

How is the U.S. responding to DPRK-linked crypto fraud?

The U.S. Department of Justice and FBI are intensifying efforts against North Korean crypto theft and identity fraud through arrests, asset seizures, and international partnerships. Recent actions include charging facilitators of remote IT schemes and forming the Scam Center Strike Force to target broader Asian cyber-fraud networks, ensuring a coordinated response to protect economic stability.

Key Takeaways

  • U.S. charges reveal depth of DPRK infiltration: Five guilty pleas expose how stolen identities enabled access to 136 companies, transferring $2.2 million to North Korea.
  • $15M forfeiture targets APT38: DOJ actions freeze laundered USDT from 2023 hacks, preventing further sanctions evasion via crypto.
  • Global crackdown escalates: U.S.-U.K. efforts and new strike forces signal ongoing operations against intermediaries in Asian fraud networks—companies should enhance remote hiring vetting now.

Conclusion

The U.S. actions against North Korea crypto heists and DPRK IT infiltration underscore a robust strategy to dismantle funding mechanisms for sanctioned programs, including APT38’s multimillion-dollar thefts. By charging facilitators and forfeiting assets, authorities are signaling zero tolerance for these threats. As enforcement evolves with international cooperation, staying vigilant on crypto security and remote work protocols will be crucial—monitor developments to safeguard against emerging risks in the digital economy.

COINOTAG recommends • Traders club
⚡ Futures with discipline
Defined R:R, pre‑set invalidation, execution checklists.
👉 Join the club →
COINOTAG recommends • Traders club
🎯 Spot strategies that compound
Momentum & accumulation frameworks managed with clear risk.
👉 Get access →
COINOTAG recommends • Traders club
🏛️ APEX tier for serious traders
Deep dives, analyst Q&A, and accountability sprints.
👉 Explore APEX →
COINOTAG recommends • Traders club
📈 Real‑time market structure
Key levels, liquidity zones, and actionable context.
👉 Join now →
COINOTAG recommends • Traders club
🔔 Smart alerts, not noise
Context‑rich notifications tied to plans and risk—never hype.
👉 Get access →
COINOTAG recommends • Traders club
🤝 Peer review & coaching
Hands‑on feedback that sharpens execution and risk control.
👉 Join the club →

U.S. authorities move to disrupt DPRK-linked identity fraud, remote IT infiltration, and multimillion-dollar crypto heists.

Key Highlights

  • The U.S. charges five individuals for helping DPRK IT workers infiltrate 136 companies.
  • The DOJ moves to forfeit $15M in crypto tied to APT38 hacks.
  • The actions widen U.S.-U.K. crackdown on Asian cyber-fraud networks.

The U.S. Department of Justice (DOJ) has announced new actions targeting how North Korea covertly raises money through stolen identities, remote tech work, and large-scale crypto theft. Schemes officials say directly help fund its sanctioned weapons programs.

Five individuals, four Americans and one Ukrainian national, pleaded guilty to helping North Korean IT workers pose as U.S.-based employees. They provided stolen or falsified identities, hosted company-issued laptops, and helped Democratic People’s Republic of Korea (DPRK) operatives bypass hiring checks. 

COINOTAG recommends • Exchange signup
📈 Clear control for futures
Sizing, stops, and scenario planning tools.
👉 Open futures account →
COINOTAG recommends • Exchange signup
🧩 Structure your futures trades
Define entries & exits with advanced orders.
👉 Sign up →
COINOTAG recommends • Exchange signup
🛡️ Control volatility
Automate alerts and manage positions with discipline.
👉 Get started →
COINOTAG recommends • Exchange signup
⚙️ Execution you can rely on
Fast routing and meaningful depth insights.
👉 Create account →
COINOTAG recommends • Exchange signup
📒 Plan. Execute. Review.
Frameworks for consistent decision‑making.
👉 Join now →
COINOTAG recommends • Exchange signup
🧩 Choose clarity over complexity
Actionable, pro‑grade tools—no fluff.
👉 Open account →

According to the official announcement, the network infiltrated 136 U.S. companies and sent more than $2.2 million back to the regime.

Justice Department Announces Nationwide Actions to Combat Illicit North Korean Government Revenue Generation pic.twitter.com/J59Tqk7cIc

— FBI (@FBI) November 14, 2025

$15 million tied to APT38 frozen

In a parallel action, the Justice Department filed two forfeiture complaints covering over $15 million in USDT seized from Advanced Persistent Threat 38 (APT38), a North Korean military hacking unit responsible for some of the world’s largest crypto exchange intrusions.

COINOTAG recommends • Members‑only research
📌 Curated setups, clearly explained
Entry, invalidation, targets, and R:R defined before execution.
👉 Get access →
COINOTAG recommends • Members‑only research
🧠 Data‑led decision making
Technical + flow + context synthesized into actionable plans.
👉 Join now →
COINOTAG recommends • Members‑only research
🧱 Consistency over hype
Repeatable rules, realistic expectations, and a calmer mindset.
👉 Get access →
COINOTAG recommends • Members‑only research
🕒 Patience is an edge
Wait for confirmation and manage risk with checklists.
👉 Join now →
COINOTAG recommends • Members‑only research
💼 Professional mentorship
Guidance from seasoned traders and structured feedback loops.
👉 Get access →
COINOTAG recommends • Members‑only research
🧮 Track • Review • Improve
Documented PnL tracking and post‑mortems to accelerate learning.
👉 Join now →

APT38 stole hundreds of millions from platforms in Estonia, Panama, and the Seychelles in 2023, then laundered the funds through mixers, bridges, and OTC brokers. Authorities intercepted part of the laundering flow, froze the assets, and now seek permanent forfeiture.

U.S. agencies have warned for years that North Korean operatives disguise themselves as freelance developers or remote workers to access corporate networks. They use stolen Social Security numbers, fake U.S. addresses, and proxy computers to appear domestic.

COINOTAG recommends • Exchange signup
🎯 Focus on process over noise
Plan trades, size positions, execute consistently.
👉 Sign up →
COINOTAG recommends • Exchange signup
🛠️ Simplify execution
Keep decisions clear with practical controls.
👉 Get started →
COINOTAG recommends • Exchange signup
📊 Make data your edge
Use depth and alerts to avoid guesswork.
👉 Open account →
COINOTAG recommends • Exchange signup
🧭 Be prepared, not reactive
Turn setups into rules before you trade.
👉 Create account →
COINOTAG recommends • Exchange signup
✍️ Plan first, then act
Entries, exits, and reviews that fit your routine.
👉 Join now →
COINOTAG recommends • Exchange signup
🧩 Consistency beats intensity
Small, repeatable steps win the long run.
👉 Sign up →

Investigators say some DPRK IT workers earn hundreds of thousands annually, generating “hundreds of millions” for the regime. The DOJ warns these infiltrations threaten both national security and economic stability.

The new actions follow a rapid escalation in U.S. enforcement targeting Asian cyber-fraud networks. This week, the government launched the Scam Center Strike Force, a new unit aimed at combating Southeast Asian “pig-butchering” schemes that have drained billions from Americans. Last month, the U.S. and U.K. jointly sanctioned major crime syndicates in Cambodia and Laos tied to crypto laundering.

COINOTAG recommends • Premium trading community
🏛️ WAGMI CAPITAL — Premium Trading Community
Strategic insights, exclusive opportunities, professional support.
👉 Join WAGMI CAPITAL →
COINOTAG recommends • Premium trading community
💬 Inner Circle access
See members share real‑time PnL and execution notes in chat.
👉 Apply for Inner Circle →
COINOTAG recommends • Premium trading community
🧩 Turn theses into trades
Reusable templates for entries, risk, and review—end to end.
👉 Join the club →
COINOTAG recommends • Premium trading community
💡 Long‑term mindset
Patience and discipline over noise; a process that compounds.
👉 Get started →
COINOTAG recommends • Premium trading community
📚 Education + execution
Courses, playbooks, and live market walkthroughs—learn by doing.
👉 Get access →
COINOTAG recommends • Premium trading community
🔒 Members‑only research drops
Curated analyses and private briefings—quality over quantity.
👉 Join WAGMI CAPITAL →

Together, these efforts reflect a clear shift: U.S. agencies are no longer pursuing only individual hackers but also the infrastructure and intermediaries that enable global crypto-enabled crime.

What comes next

The Justice Department says more arrests, seizures, and cross-border operations are coming. The Federal Bureau of Investigation (FBI) is urging U.S. companies to tighten vetting for remote tech workers and watch for suspicious logins or data access.

COINOTAG recommends • Exchange signup
🧱 Execute with discipline
Watchlists, alerts, and flexible order control.
👉 Sign up →
COINOTAG recommends • Exchange signup
🧩 Keep your strategy simple
Clear rules and repeatable steps.
👉 Open account →
COINOTAG recommends • Exchange signup
🧠 Stay objective
Let data—not emotion—drive actions.
👉 Get started →
COINOTAG recommends • Exchange signup
⏱️ Trade when it makes sense
Your plan sets the timing—not the feed.
👉 Join now →
COINOTAG recommends • Exchange signup
🌿 A calm plan for busy markets
Set size and stops first, then execute.
👉 Create account →
COINOTAG recommends • Exchange signup
🧱 Your framework. Your rules.
Design entries/exits that fit your routine.
👉 Sign up →

Assistant Attorney General John A. Eisenberg said the U.S. will use “every available tool” to disrupt DPRK revenue streams. With North Korea leaning on crypto theft and remote-work fraud to evade sanctions, officials say this is only the beginning.

Also read: Dubai Court Freezes $456M Linked to Justin Sun’s TrueUSD Bailout

Follow The COINOTAG on Google News to Stay Updated!    

COINOTAG recommends • Members‑only research
📌 Curated setups, clearly explained
Entry, invalidation, targets, and R:R defined before execution.
👉 Get access →
COINOTAG recommends • Members‑only research
🧠 Data‑led decision making
Technical + flow + context synthesized into actionable plans.
👉 Join now →
COINOTAG recommends • Members‑only research
🧱 Consistency over hype
Repeatable rules, realistic expectations, and a calmer mindset.
👉 Get access →
COINOTAG recommends • Members‑only research
🕒 Patience is an edge
Wait for confirmation and manage risk with checklists.
👉 Join now →
COINOTAG recommends • Members‑only research
💼 Professional mentorship
Guidance from seasoned traders and structured feedback loops.
👉 Get access →
COINOTAG recommends • Members‑only research
🧮 Track • Review • Improve
Documented PnL tracking and post‑mortems to accelerate learning.
👉 Join now →

Source: https://en.coinotag.com/u-s-doj-seeks-15m-usdt-forfeiture-in-north-korean-crypto-theft-probe/

Market Opportunity
Union Logo
Union Price(U)
$0.002877
$0.002877$0.002877
-0.44%
USD
Union (U) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.