Core Viewpoint - The article discusses the U.S. sanctions imposed on individuals and entities involved in North Korea's IT worker fraud schemes, which are used to generate revenue for the regime's weapons programs [1][2]. Group 1: North Korea's IT Workers as Revenue Tools - North Korea is violating U.S. and UN sanctions by utilizing IT workers to generate funds for its illegal weapons programs, including weapons of mass destruction and ballistic missile projects [2]. - These IT worker teams employ forged documents, identity theft, and false identities to infiltrate legitimate businesses in the U.S. and allied countries, with the North Korean government intercepting a significant portion of their earnings [2]. - The revenue generated from these activities has reportedly amounted to hundreds of millions of dollars, with some IT workers secretly implanting malware in corporate networks to steal sensitive proprietary data [2]. Group 2: Details of the Sanctioned IT Worker Network - The sanctioned IT worker network includes a North Korean trading company, a Chinese front company, and two individuals facilitating funding for the North Korean regime [3]. - Vitaliy Sergeyevich Andreyev, a Russian citizen, has been providing payment facilitation for the sanctioned Chinyong Information Technology Cooperation Company, which is linked to the North Korean Ministry of Defense, and has assisted in transferring nearly $600,000 since December 2024 [3]. - Kim Ung Sun acts directly or indirectly on behalf of the North Korean government [3]. - Shenyang Geumpungri Network Technology Co., Ltd is identified as a Chinese front company for Chinyong, generating over $1 million in profits for the North Korean entities since 2021 [3]. - Korea Sinjin Trading Corporation is a North Korean enterprise under the sanctioned DPRK Ministry of People's Armed Forces General Political Bureau, receiving directives from government officials regarding the international deployment of IT workers [3].
OFAC制裁为朝鲜武器项目提供资金的实体,涉及中国
制裁名单·2025-08-28 01:15