The Office of Foreign Assets Control of the United States Department of the Treasury (OFAC) has taken a firm step against a social engineering and labour fraud operation linked to North Korea, which, according to the authorities, serves to generate illicit income that feeds weapons of mass destruction programmes. In its statement, the Treasury details economic sanctions against several individuals and organizations involved in what is known in the security community as the "Coral Sleet / Jasper Sleet," "PurpleDelta" or "Wagemole." For the Treasury, it is a network that uses remote jobs as a facade to steal data, wash money and pay the North Korean dictatorship, and its official note offers more context on these measures ( Treasury Department statement).
What makes this case particularly striking is not only technical sophistication, but the mixing of traditional fraud techniques with modern tools driven by artificial intelligence and anonymity services on the network. According to reports from cyber security firms, actors set up invented identities or usurp real personal data to run and get technical positions in companies around the world. A significant part of the salaries are then diverted to foreign exchange and cryptomoneda conversion networks, and in some episodes even malicious programs have been deployed to extract intellectual property or extort victims with information leaks.

The sanctioned entities include the well-known Amnokgang Technology Development Company, to which the authorities attribute the management of IT workers' delegations abroad and illegal acquisition of military and commercial technology. Intermediaries are also identified in Vietnam, such as the firm Quangvietdnbg International Services Company Limited and its director, to which they attribute fund conversion operations - including conversions to cryptomonedas for several million dollars - that would facilitate the flow of resources to Pyongyang.
The names of people involved are scattered in the research: from facilitators who open and manage bank accounts and critical wallets to coordinators who manage the remote workers themselves. These include individuals such as Nguyen Quang Viet, Do Phi Khanh and Hoang Van Nguyen for their role in financial logistics, and technical operatives such as Yun Song Guk, who would have led working groups from abroad. OFAC and other researchers have drawn up these financial and operational chains as part of the attempt to interrupt the undeclared income-generating mechanism of the North Korean regime.
The technical layer of the operation is remarkable for its pragmatism. Several security reports have documented the use of VPN services capable of removing national firewalls to mask the actual location of employees. One case pointed out by the firm LevelBlue points to the use of Astrill VPN to tuned traffic and go on the Internet by American nodes, which helps to make the start-ups seem legitimate from the perspective of the detection systems of the contracting companies ( analysis of LevelBlue).
In parallel, artificial intelligence has drastically reduced the cost and complexity of making credible digital identities. Researchers from Microsoft and other groups have warned about the use of IA models to produce work stories, write persuasive communications and, in a disturbing way, generate or manipulate face images to place them in stolen documents. Faceswap-type tools and services that allow the generation of professional portraits are being used to give a stronger appearance to curriculus and false profiles presented to recruiters or employment portals ( Microsoft report on IA as an operational technique).
But the IA does not stay in profile makeup: there are indications that malicious actors use agent capabilities to automate the creation of fake websites, refine malware and even mocking language model restrictions to act more autonomously. This combination of human persistence and automation makes these operations a low-cost and high-performance threat, capable of being infiltrated for months or years if unnoticed.
The network's internal operation also surprises its division of labour and integration with external partners. Recruiters prepare interviews and record sessions; facilitators design digital personalities and manage recruitment; Western collaborators - sometimes without knowing it, sometimes with consent - give up identities or documents that then allow false employees to overcome verifications and receive corporate equipment. A technical document shared by Flare and with contributions from IBM X-Force describes this ecosystem and details working tools ranging from time sheets to tracking requests to decentralized messaging for internal coordination ( Flare report on the threat).
Infiltration attempts do not always thrive. In one of the cases detected by a security firm, a candidate hired to work remotely on the Salesforce platform was fired shortly after the records showed persistent session starts from China and other indicators incompatible with a national worker. This episode illustrates that proper controls and surveillance over access patterns can cut malicious operations in early stages.

In the face of this phenomenon, the recommendations of the experts revolve around treating these frauds as an internal risk: that is, as if they were employed with legitimate credentials that can do sustained damage if their activity is not monitored. This requires observability at the beginning of the session, detection of "low and slow" patterns in data exfiltration, strict onboard controls and enhanced verification of identities and locations. It is also appropriate to review policies on VPNs and output nodes, as well as to develop capacities to detect IA signals in accompanying images and texts.
Ultimately, the sanctions announced by the Treasury seek to cut off the financial flow and isolate the facilitators that allow this scheme. But the broader lesson for companies and security officials is that the traditional borders between fraud, economic espionage and cybercrime have become blurred: today, a vacancy in LinkedIn may be the gateway to an intellectual property extraction network and to an illicit financing circuit with geopolitical consequences.
Monitoring, strengthened controls and an updated understanding of the role of IA in labour fraud are key to reduce exposure. Both public bodies and private industry share the responsibility to detect these techniques and to take measures to prevent remote employment from becoming covert payment systems for sanctioned regimes.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...