
- A detailed report on North Korea’s electronic crime operations revealed The internal business and the structure behind the Kim Jong U plan to develop a very profitable scheme as trained technology workers infiltrate American and European companies. North Korea’s information technology workers are almost completely sent their salaries to the home to finance the system’s nuclear weapons program, using artificial intelligence as a major tool. Meanwhile, North Korea incited its information technology workers against each other to stimulate competition and confuse more money.
The crime union was built in the United States “around it”Five families“That famous war with each other against money and power. Electronic crime operations are similar in North Korea, except for the presence of only one family and it belongs to the authoritarian leader Kim Jong Un.
“Stop looking at North Korea’s electronic program as a government program like other major country programs and similar to the mafia of one family and the lines begin to cancel the circumvention,” a report From the Cyber Security Company DTEX.
The report flows to the organization and structure of the Democratic People’s Republic of Korea (DPRK) and vast-and Prosperity– Piplinen is a trained activist who has infiltration Fortune 500 companies with IT workers a plan. This year, North Korea has presented the strategy to a new stage, where they employed 90 graduates of the Amnesty International Research Center and demanding a multiplication of their monthly profits from each worker – even when the teams worked in a feverish in washing $ 1.5 billion Stole In penetration of the exchange of cryptocurrency after the beginning of the year.
For context, the crime union involves DPRK worldwide The plan in which technology scientists were trained from North Korea Deployed By thousands. The workers have Personality impersonate or Stole American identities for illegal distant jobs. They send their salaries to North Korea to finance the nuclear weapons of Kim and the aspirations of ballistic missiles.
IT workers are nothing but one fork in the electronic kartel of the system; They share intelligence with the continuous advanced actors in North Korea (APT), which operates under the army of Korean peoples. according to and Estimates, that IT workers are born reliably born between $ 250 million to $ 600 million per year, while their Apts have Stole At least 3 billion dollars in Encryption.
“This is the mafia,” said Michael Barnnhart, a DPRK’s DPRK efforts, said. luck.
The economic structure guarantees that the money travels to the series, extends over multiple criminal companies, and is based on coherent but competitive internal relationships. Proverb SopranoHe said that the mob coach, Tony Soprano, is called the shots, while a nightmare like Christopher Multisante offers everything he needs.
The report, written by Barnhart, says: “The profits – from ransom programs, theft of cryptocurrency, financial fraud, and infiltration from the inside – flow up to the financing of weapons development and sanctions on evasion,” says the report, written by Barnhart. (He is the author, but he notes that he obtained his intelligence from a large -scale global alliance for investigators.)
“His brothers network”
According to the report, many information technology workers and appropriate actors know each other. As part of this scheme, children who show the promise in mathematics and science in primary schools are drained from an early age to obtain training as a military worker or a information technology worker. They study in elite schools such as Kim Song Military University and Komsung Academy together and learn advanced computer science in the continuous talent pipeline.
Barshart explained that the cyber investigators call him “his brothers’ network”, and they found talks between workers who tend to the old school friends to know how to earn more money. A picture of two information technology workers published by DTEX youth shows young people who are happy with the wonderful watches and equipment that carries the Nike brand. Barnhart said that many of the participants who managed a successful theft a decade ago are now in administrative positions or working as consultants and professors of the new generation of IT workers.
However, the images do not show a particularly brutal development in the scheme: various workers’ delegations from four or five men are encouraged to compete against each other.
Barnhart described it as “a dog world that eats dogs where the real winners are the Kim Jong Un family and the North Korean elites.” Barnhart said that while many revenues that have achieved money and weapons, some of them go to buy luxury goods for Kim and his family.
In 2025, North Korea doubled the monthly financial shares of China, and the report was revealed, and Barnhart said that all workers – otherwise – have continued the same new requirements to keep foreign money flowing on the system. Workers face a woman, 16 hours to six days a week, with any barely restrooms. Thus, the friendly “Bor Network operates on the basis of each case separately, as Barnhart pointed out.
It surpasses survival
Competition is exacerbated by the need to bring more money and encryption. On average, workers retain less than 20 % of their profits and they have to finance operations, equipment and servers with their own money. In one of the documented examples in the report, the worker got $ 5,000 a month and was allowed to keep $ 200.
“These shares also enhance the culture of competition within the teams, as workers seek to obtain advantages on their colleagues to receive their services and allow them to send more money to their families,” Barnhart wrote. “They were also encouraged to report each other about” non -national behavior. “
This is one of the reasons why technology founders in the United States to request Applicants to express a negative comment about Kim’s mind or weight before applying to an official interview. IT workers will not risk the arrest of the authorization of the authoritarian leader – and he will be known to do so.
“Every man is outside the same” and workers are beaten if they do not earn enough money.
He said, “It is a harsh life.” “If they cannot make their shares, we sometimes see them mention (beating).”
Another image of information technology workers has shown in a narrow space working on doctoral identifiers and WhatsApp conversations with a wall installed to monitor government. Barnhart said that the competition to work on independent work platforms, as IT workers find intense new opportunities. It has been estimated that it takes almost three hours to obtain a North Korea’s IT worker to apply for a job if it is associated with the development of encryption and programs.
Some workers have even resorted to reporting each other on independent platforms, as one of the workers call another “deception” in response to a post of information technology agent looking for a job. The report states that the pressure on workers to generate revenues led to the emergence of side rocks, which are allowed as long as they continue to increase their profits.
It is very similar to the mafia, financial gain, fear, violence and identity drivers of the IT plan, but Barnhart wrote that what distinguishes DPRK is “the incentive structure based on survival in the heart of its engine.”
He wrote: “Online activists do not defend an ideology, but rather material necessities: food, shelter, health care and education for their families.” “Loyalty is not the primary driver. Stay alive.”
Read more about North Korea IT plan:
North Korea’s IT plan infiltrated into a US electoral campaign site
Nashville was accused of helping thousands of North Koreans in obtaining remote job jobs in that
This story was originally shown on Fortune.com
https://fortune.com/img-assets/wp-content/uploads/2025/05/GettyImages-2157765734-e1747447137980.jpg?resize=1200,600
Source link