1/ My recent investigation uncovered more than $16.58M in payments since January 1, 2025 or $2.76M per month has been sent to North Korean IT workers hired as developers at various projects & companies.
To put this in perspective payments range from $3K-8K per month meaning they have infiltrated 345 jobs on the low end or 920 jobs on the high end.
2/ Here’s a look into one of the six clusters I have been monitoring and was able to attribute 8 different DPRK ITWs that obtained roles at 12+ projects.
I traced out the payment addresses from the table to two consolidation addresses.
3/ Sandy Nguyen (@bullishgopher) a DPRK ITW from this cluster was spotted via OSINT next to the North Korea flag at an event in Russia.
A small group of people still believe North Korean devs are just a conspiracy despite all of the IOCs, research, etc widely available.
4/ Other indicators from this cluster after speaking with teams displayed immediate red flags.
>ITW refused to meet up irl with team member but claimed to live in same city
>Three ITWs referred each another for role at the same project
>Russian IPs for ITW supposedly from California
>Changing Github usernames / deleted LinkedIn
>payments for multiple ITWs flow to same address
>failed routine KYC check
5/ USDC was sent directly from Circle accounts to three addresses in this cluster.
It’s 1 hop from an address blacklisted by Tether in April 2023 tied to Hyon Sop Sim.
Other DPRK ITW clusters currently have decent sized quantities of USDC sitting.
I think it’s misleading Circle markets themselves as the most compliant stablecoin that puts security first when they do not have proper channels to report illicit activity and do not engage in incident response during major exploits.
6/ I am closely monitoring five other larger clusters of DPRK ITWs but will not share those addresses publicly since they are active.
One thing to note is the number does not include exploits conducted by them on projects (LND, ChainSaw, Favrr, Munchables, Dream, etc)
They typically take on multiple roles at once and frequently get fired due to under performance so turnover is high.
Once they infiltrate a team and take ownership of contracts your project becomes at risk of an incident.
7/ A few key trends I have observed:
A common misconception is that US exchanges have more rigorous KYC/AML requirements than offshore competitors.
DPRK ITWs have an increasing number of accounts tied to US exchanges like Coinbase or Robinhood
MEXC remains a popular choice by ITWs for laundering funds onchain.
A few years ago Binance was widely used by ITWs but now it is rare due to improvements in detection and private industry collaboration that lead to seizures.
8/ Another misconception is crypto projects have the most DPRK ITWs when in reality the issue is just as bad if not worse at traditional tech companies.
The downside of fiat is you cannot trace funds back to the company to alert them whereas when ITWs are paid with crypto it makes all activity onchain traceable.
The rise of neobanks/fintech with stablecoin integrations has allowed DPRK ITWs to easily on-ramp fiat -> crypto.
9/ I believe that when a team hires multiple DPRK ITWs it is a decent indicator for determining that startup will be a failure.
Unlike other threats to the industry DPRK ITWs have little sophistication so it’s mainly the result of a team’s own negligence.
I think the prevalence of them is due to being cheap and the lack of available talent as well as high valuations that resulted in incompetent founders who received funding.
Update: Sandy Nguyen changed his X username after my post from ‘bullishgopher’ to ‘dddxxxssseaeff’
X user ID: 1532495241038778387
• • •
Missing some Tweet in this thread? You can try to
force a refresh
1/ I uncovered a coordinated network of 10+ accounts manufacturing viral panic about war and politics to drive traffic to crypto scams.
Strategy:
>Purchase accounts with followers
>Doompost multiple times per day
>Repost content from alt accounts
>Promote fake giveaway or scam
>Change username
2/ Example: @wanglaurentceo
They started by purchasing an account with followers and use AI to create a fake Asian version of Mario Nawfal.
(User ID 1804235884826333184)
3/ Here’s related accounts reposting to boost the reach of posts about exaggerated or fake news.
This causes them to go viral each day with millions of views and thousands of likes / replies.
1/ Meet @WheresBroox (Broox Bauer), one of the multiple @AxiomExchange employees allegedly abusing the lack of access controls for internal tools to lookup sensitive user details to insider trade by tracking private wallet activity since early 2025.
2/ Axiom is a crypto trading platform founded by Mist & Cal in 2024. After going through Y-Combinator's Winter 2025 batch, it quickly became one of the most profitable companies in the space, generating $390M+ in revenue to date.
I was retained to investigate allegations of misconduct at Axiom after receiving reports.
3/ Broox is a current Axiom senior BD employee based in New York.
In the clip Broox states he can track any Axiom user via ref code, wallet, or UID and claims he can "find out anything to do with that person".
He also describe researching 10-20 wallets initially and slowly increasing over time "so it does not look that suspicious"
In a separate clip from the same recording, Broox sets ground rules for how to request lookups from him and then says he'll send the full list of wallets.
The full recording is a private call of the group members strategizing.
1/ Meet the threat actor John (Lick), who was caught flexing $23M in a wallet address directly tied to $90M+ in suspected thefts from the US Government in 2024 and multiple other unidentified victims from Nov 2025 to Dec 2025.
2/ Earlier today John got into a heated argument with another threat actor known as Dritan Kapplani Jr. in a group chat to see who had more funds in crypto wallets.
In 'The Com' this is known as a band for band (b4b).
However the entire interaction was fully recorded.
3/ In part 1 of the recording Dritan mocks John however John screenshares Exodus Wallet which shows the Tron address below with $2.3M:
TMrWCLMS3ibDbKLcnNYhLggohRuLUSoHJg
1/ Meet Haby (Havard), a Canadian threat actor who has stolen $2M+ via Coinbase support impersonation social engineering scams in the past year blowing the funds on rare social media usernames, bottle service, & gambling.
2/ On Dec 30, 2024 Haby posted a screenshot in a group chat showing off a 21K XRP ($44K) theft from a Coinbase user.
rN7ddvk4DrGHZUrBfNARJEEAbPkky9Mwcz
3/ On Jan 3, 2025 Haby posted a screenshot from his Exodus wallet showing his Telegram & IG accounts.
I matched up the historical balances to the screenshot and found the XRP address linked to two other Coinbase user thefts for ~$500K total.