Cryip
  • Home
  • News
  • Research & Analysis
  • Reviews & Comparisons
  • Learn Crypto
  • Features
No Result
View All Result
Cryip
  • Home
  • News
  • Research & Analysis
  • Reviews & Comparisons
  • Learn Crypto
  • Features
No Result
View All Result
Cryip
No Result
View All Result
Home News Security & Hacks

ZachXBT Exposes DPRK Crypto Payment Network Processing $3.5M in Illicit Remittances

Leaked internal server data uncovers North Korea’s global IT worker network, exposing crypto remittance flows, laundering channels, operational hierarchy, and critical security weaknesses in state-linked financial operations.

by Saravana Kumar Mahendran
April 9, 2026
in Security & Hacks
0 0
ZachXBT Exposes DPRK Crypto Payment

Source: Freepik Modified by Cryip

Share on FacebookShare on Twitter

Blockchain investigator ZachXBT has released a comprehensive forensic breakdown of data stolen from an internal North Korean payment server. The dataset, obtained from a compromised DPRK IT worker’s device via an unnamed source, includes 390 user accounts, detailed chat logs, and full cryptocurrency transaction records. The operation successfully processed more than $3.5 million in crypto inflows since late November 2025, funnelling funds through fraudulent identities and layered fiat conversion channels at an average rate of roughly $1 million per month.

ZachXBT Leaks Internal DPRK IT Payment Server
ZachXBT Leaks Internal DPRK IT Payment Server

Luckyguys.site: DPRK’s Internal Remittance Hub

The core of the operation was luckyguys[.]site, a self-hosted messaging platform built to resemble Discord. DPRK IT workers used it exclusively to report and confirm remittances to their handlers. The server operated with the default password 123456, which remained unchanged for at least ten accounts. User profiles contained Korean names, operational cities, assigned roles, and internal group codes consistent with known DPRK overseas IT worker structures.

ZachXBT
ZachXBT

Three entities appearing in the records, Sobaeksu, Saenal, and Songkwang, are already designated by the U.S. Treasury’s Office of Foreign Assets Control (OFAC). All financial movements were centrally routed through the admin account PC-1234, which issued temporary login credentials for crypto exchanges and fintech platforms on a per-user basis. Direct messages between user “Rascal” and PC-1234 from December 2025 to April 2026 explicitly discuss payment confirmations and the use of Hong Kong addresses for both billing and procurement of physical goods.

Remittance Mechanics and Fiat Off-Ramps

Workers typically received cryptocurrency payments directly from client exchanges or converted earnings into fiat using Chinese bank accounts and platforms such as Payoneer. The admin account PC-1234 would then verify receipt before issuing new credentials. ZachXBT published an interactive organizational chart mapping the complete hierarchy with per-user and per-group payment totals covering December 2025 to February 2026.

Fiat Off-Ramps
Fiat Off-Ramps

On-chain analysis connects the payment flows to previously identified DPRK IT worker clusters. The dataset also reveals systematic use of forged legal documents and multiple fabricated identities for securing remote freelance and full-time positions.

Technical Infrastructure and Operational Practices

Technical Infrastructure
Technical Infrastructure

Administrators distributed 43 Hex-Rays and IDA Pro training modules between November 2025 and February 2026, focusing on disassembly, decompilation, debugging, and hostile PE unpacking techniques. Devices compromised by infostealer malware showed consistent use of Astrill VPN, IPMsg, and internal Slack channels, with one captured log indicating 33 DPRK workers operating simultaneously on the same network. Internal chats also referenced a planned theft attempt from the GalaChain game Arcano using a Nigerian proxy, along with the circulation of deepfake job-applicant blog posts to bypass recruitment screening. ZachXBT assessed the group as lower-tier compared to elite DPRK operations such as AppleJeus or TraderTraitor, noting their reliance on weak default credentials and basic operational security. The luckyguys[.]site domain was taken offline shortly after ZachXBT published his thread on April 8, although the complete dataset had already been archived.

Key Security Observations

  • Default password hygiene remains dangerously weak even within state-linked financial operations.
  • Payoneer and Chinese fintech services continue to function as primary fiat conversion channels for DPRK remittances.
  • Infostealer infections on worker devices represent the most valuable entry point for external researchers.
  • Internal server data provides significantly stronger attribution signals than on-chain analysis alone.

This leak offers rare operational visibility into the financial backbone of North Korea’s overseas IT revenue program. ZachXBT indicated he will continue expanding the public dashboard at investigation.io with additional findings from the dataset.

Disclaimer: Cryip is an independent media and research outlet providing news, data, and analysis on the cryptocurrency industry. Content is for informational and research purposes only and does not constitute financial, legal, tax, or investment advice. Cryptocurrency markets are volatile and past performance is not indicative of future results. References to specific assets, platforms, or incidents are for journalistic purposes only and do not imply endorsement, and readers assume full responsibility for their decisions.
Tags: Crypto Hacks

Related Posts

Wasabi Protocol Hit by Multi-Chain Exploit
Security & Hacks

Wasabi Protocol Hit by Multi-Chain Exploit, Over $5 Million Drained

by Saravana Kumar Mahendran
April 30, 2026

Wasabi Protocol, a decentralized perpetuals and leveraged trading platform, has suffered a major security breach with funds stolen across Ethereum,...

Read moreDetails
Aftermath Finance Exploit

Aftermath Finance Exploit: $1.14M USDC Drained from Sui Perpetuals Protocol

April 29, 2026
ZetaChain GatewayEVM Hack

ZetaChain GatewayEVM Hack: $300K Loss from Team Wallets, Cross-Chain Transactions Paused

April 28, 2026
North Korean AI Hack on Zerion

North Korean AI Hack Hits Zerion, $100K Lost in Social Engineering Attack

April 15, 2026
Polkadot Bridge Exploit

Polkadot Bridge Exploit Technical Incident Analysis

April 13, 2026
Hyperbridge Exploit

Polkadot Bridge Exploit: 1B Fake DOT Minted on Ethereum

April 13, 2026
SubQuery Staking Contract Exploit

SubQuery Staking Contract Exploit Triggers Withdrawals Pause

April 13, 2026
Next Post
Bitcoin Depot Reports $3.6M Crypto Theft in Cyber Breach

Bitcoin Depot Reports $3.6M Crypto Theft in Cyber Breach

Cryip focuses on crypto research and on-chain analysis, supported by coverage of markets, regulation, security events, and blockchain ecosystems.

Recent Posts

  • Blockworks Raises Series A Extension at $192M Valuation Amid Push for Crypto Market Transparency
  • Wasabi Protocol Hit by Multi-Chain Exploit, Over $5 Million Drained
  • Tether Leads $14 Million Investment in Argentine Crypto Firm Belo

Categories

  • AI × Crypto
  • Data & Dashboards
  • Market Updates
  • On-Chain Analysis
  • OpSec
  • Policy & Regulation
  • Post Mortems
  • Reports
  • Scams & Fraud
  • Security & Hacks
  • Stablecoins
  • Tokenomics
  • VC & Funding

Company

  • About Us
  • Contact Us
  • Editorial Standards & Integrity
  • Our Team
  • Privacy Policy
  • Review Methodology
  • Terms and Conditions
  • Trust, Disclosures & Independence

© 2026 Cryip - Research-Driven Crypto Analysis & News by Hashlays.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Home
  • News
  • Research & Analysis
  • Reviews & Comparisons
  • Learn Crypto
  • Features

© 2026 Cryip - Research-Driven Crypto Analysis & News by Hashlays.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.