📢 Gate广场 #MBG任务挑战# 发帖赢大奖活动火热开启!
想要瓜分1,000枚MBG?现在就来参与,展示你的洞察与实操,成为MBG推广达人!
💰️ 本期将评选出20位优质发帖用户,每人可轻松获得50枚MBG!
如何参与:
1️⃣ 调研MBG项目
对MBG的基本面、社区治理、发展目标、代币经济模型等方面进行研究,分享你对项目的深度研究。
2️⃣ 参与并分享真实体验
参与MBG相关活动(包括CandyDrop、Launchpool或现货交易),并晒出你的参与截图、收益图或实用教程。可以是收益展示、简明易懂的新手攻略、小窍门,也可以是现货行情点位分析,内容详实优先。
3️⃣ 鼓励带新互动
如果你的帖子吸引到他人参与活动,或者有好友评论“已参与/已交易”,将大幅提升你的获奖概率!
MBG热门活动(帖文需附下列活动链接):
Gate第287期Launchpool:MBG — 质押ETH、MBG即可免费瓜分112,500 MBG,每小时领取奖励!参与攻略见公告:https://www.gate.com/announcements/article/46230
Gate CandyDrop第55期:CandyDrop x MBG — 通过首次交易、交易MBG、邀请好友注册交易即可分187,500 MBG!参与攻略见公告:https://www.gate.com/announcements
Arizona woman sentenced for helping North Korea coders get US crypto jobs
An Arizona woman has been sentenced to more than eight years in federal prison for helping North Korean operatives infiltrate US cryptocurrency and tech firms using stolen identities and fraudulent documents.
According to a Thursday announcement by the US Attorney’s Office for the District of Columbia, Christina Marie Chapman was convicted of wire fraud conspiracy, aggravated identity theft and money laundering conspiracy. She was sentenced to 102 months, or roughly 8.5 years in prison.
Prosecutors said Chapman worked with operatives tied to the Democratic People’s Republic of Korea (DPRK) to obtain remote IT positions at more than 300 U.S.-based companies. The North Korean workers posed as US citizens and residents, and the scheme generated over $17 million in illicit revenue.
Chapman pleaded guilty on Feb. 11. In addition to her prison sentence, Chapman was ordered to serve three years of supervised release, forfeit more than $284,000 in funds tied to the scheme and pay nearly $177,000 in restitution.
Report: Prosecutors link Roman Storm to DPRK hackers in trial opening statements
DPRK infiltration is a growing trend
The case is one of the largest DPRK information technology worker schemes charged by the US Department of Justice. It involved the theft of 68 US persons’ identities and the defrauding of 309 US businesses and two international companies.
Still, this is far from a rare occurrence. Recent reports indicate that four North Korean individuals infiltrated a US crypto startup and a Serbian virtual token company by posing as remote IT workers, using stolen and fabricated identities, stealing over $900,000.
Earlier this month, the US Treasury sanctioned two people and four entities involved in what it says was a North Korea-run IT worker ring that would infiltrate crypto companies, aiming to exploit them. The US Treasury Department explained in an X post at the time that North Korea uses the ill-gotten funds to finance its weapons of mass destruction program.
In early April, Google Threat Intelligence Group (GTIG) adviser Jamie Collier warned that DPRK infiltrators have also been found in UK crypto companies. According to late November 2024 reports, North Korean hackers were able to infiltrate “hundreds” of large, multinational information technology firms.
Related: Researchers foil $10M DeFi backdoor in thousands of smart contracts
Legal consequences for US firms?
Some legal experts warn that companies hiring fraudulent workers could be held liable under US sanctions law, even if they were unaware of the workers’ true identities. Crypto-focused US lawyer Aaron Brogan told Cointelegraph that US sanctions regimes “are quite broad and impose a ‘strict liability’ regime.” “Anyone who engages in sanctioned activity, knowingly or not, is technically culpable.“
Niko Demchuk, head of legal at crypto compliance firm AMLBot, also told Cointelegraph that paying DPRK-based developers “is generally a breach of the US Department of the Treasury’s Office of Foreign Assets Control (OFAC).”
He said companies involved in such activities risk civil penalties, criminal fines, reputational damage, secondary sanctions, and banking or export control violations. He added that DPRK actors’ use of stolen identities is no excuse:
Still, Brogan said, OFAC is probably unlikely to pursue companies that unknowingly hired fraudulent workers.” However, he said the situation changes “if the scope of work was very sensitive and they didn’t observe reasonable identification verification procedures.”
Magazine: North Korea crypto hackers tap ChatGPT, Malaysia road money siphoned: Asia Express