Quick Breakdown
- Sanctioned Individuals & Firms: Vitaliy Andreyev, Kim Ung Sun, Shenyang Geumpungri Network Technology, and Korea Sinjin Trading.
- Illegal Activities: Laundered stolen crypto, embedded North Korean IT operatives in foreign firms, and generated millions for Pyongyang.
- Impact: Part of North Korea’s broader cyber-financing network fueling weapons programs and bypassing international sanctions.
The United States Treasury Department has imposed sanctions on two individuals and two companies accused of laundering stolen cryptocurrency to bankroll North Korea’s weapons development efforts. The move, announced on August 27, underscores Washington’s escalating efforts to dismantle Pyongyang’s shadowy cyber-financing networks.

Treasury Targets Key Players in Fraud Network
According to the Office of Foreign Assets Control (OFAC), Russian national Vitaliy Sergeyevich Andreyev acted as a money launderer for North Korean operatives. Since December 2023, he allegedly helped move more than $600,000 in stolen cryptocurrency into U.S. dollars, channeling the funds to Chinyong Information Technology Cooperation Company, a North Korean entity already sanctioned for its ties to the Ministry of Defense.
Working alongside him was Kim Ung Sun, a North Korean trade official stationed in Russia. U.S. officials say Kim served as a diplomatic facilitator, coordinating with Andreyev to conceal the movement of stolen assets.
Chinese Shell Company Embedded North Korean IT Workers
The sanctions also hit Shenyang Geumpungri Network Technology Co., Ltd, a Chinese firm that allegedly operated as a front for Chinyong. The company reportedly generated over $1 million in profit by embedding North Korean IT operatives into foreign crypto and tech firms using false identities and forged documents.
Treasury officials warned that such front companies are central to Pyongyang’s ability to infiltrate legitimate businesses and siphon off resources for weapons development.
Sinjin’s Military Ties Exposed
Another sanctioned entity, Korea Sinjin Trading Corporation, was identified as a conduit between the scam network and the North Korean Ministry of People’s Armed Forces General Political Bureau. Authorities said Sinjin not only coordinated payments but also benefited directly from the illicit earnings.
Crackdown Continues, But Threat Persists
The latest sanctions follow similar actions last month, when Treasury blacklisted Song Kum Hyok, a North Korean national tied to the Reconnaissance General Bureau and its hacking unit Andariel, for helping operatives apply for remote jobs using stolen American identities.
If you would like to read more articles like this, visit DeFi Planet and follow us on Twitter, LinkedIn, Facebook, Instagram, and CoinMarketCap Community.
Take control of your crypto portfolio with MARKETS PRO, DeFi Planet’s suite of analytics tools.”