📢 Gate廣場 #MBG任务挑战# 發帖贏大獎活動火熱開啓!
想要瓜分1,000枚MBG?現在就來參與,展示你的洞察與實操,成爲MBG推廣達人!
💰️ 本期將評選出20位優質發帖用戶,每人可輕鬆獲得50枚MBG!
如何參與:
1️⃣ 調研MBG項目
對MBG的基本面、社區治理、發展目標、代幣經濟模型等方面進行研究,分享你對項目的深度研究。
2️⃣ 參與並分享真實體驗
參與MBG相關活動(包括CandyDrop、Launchpool或現貨交易),並曬出你的參與截圖、收益圖或實用教程。可以是收益展示、簡明易懂的新手攻略、小竅門,也可以是現貨行情點位分析,內容詳實優先。
3️⃣ 鼓勵帶新互動
如果你的帖子吸引到他人參與活動,或者有好友評論“已參與/已交易”,將大幅提升你的獲獎概率!
MBG熱門活動(帖文需附下列活動連結):
Gate第287期Launchpool:MBG — 質押ETH、MBG即可免費瓜分112,500 MBG,每小時領取獎勵!參與攻略見公告:https://www.gate.com/announcements/article/46230
Gate CandyDrop第55期:CandyDrop x MBG — 通過首次交易、交易MBG、邀請好友註冊交易即可分187,500 MBG!參與攻略見公告:https://www.gate.com/announcements
Arizona woman sentenced for helping North Korea coders get US crypto jobs
An Arizona woman has been sentenced to more than eight years in federal prison for helping North Korean operatives infiltrate US cryptocurrency and tech firms using stolen identities and fraudulent documents.
According to a Thursday announcement by the US Attorney’s Office for the District of Columbia, Christina Marie Chapman was convicted of wire fraud conspiracy, aggravated identity theft and money laundering conspiracy. She was sentenced to 102 months, or roughly 8.5 years in prison.
Prosecutors said Chapman worked with operatives tied to the Democratic People’s Republic of Korea (DPRK) to obtain remote IT positions at more than 300 U.S.-based companies. The North Korean workers posed as US citizens and residents, and the scheme generated over $17 million in illicit revenue.
Chapman pleaded guilty on Feb. 11. In addition to her prison sentence, Chapman was ordered to serve three years of supervised release, forfeit more than $284,000 in funds tied to the scheme and pay nearly $177,000 in restitution.
Report: Prosecutors link Roman Storm to DPRK hackers in trial opening statements
DPRK infiltration is a growing trend
The case is one of the largest DPRK information technology worker schemes charged by the US Department of Justice. It involved the theft of 68 US persons’ identities and the defrauding of 309 US businesses and two international companies.
Still, this is far from a rare occurrence. Recent reports indicate that four North Korean individuals infiltrated a US crypto startup and a Serbian virtual token company by posing as remote IT workers, using stolen and fabricated identities, stealing over $900,000.
Earlier this month, the US Treasury sanctioned two people and four entities involved in what it says was a North Korea-run IT worker ring that would infiltrate crypto companies, aiming to exploit them. The US Treasury Department explained in an X post at the time that North Korea uses the ill-gotten funds to finance its weapons of mass destruction program.
In early April, Google Threat Intelligence Group (GTIG) adviser Jamie Collier warned that DPRK infiltrators have also been found in UK crypto companies. According to late November 2024 reports, North Korean hackers were able to infiltrate “hundreds” of large, multinational information technology firms.
Related: Researchers foil $10M DeFi backdoor in thousands of smart contracts
Legal consequences for US firms?
Some legal experts warn that companies hiring fraudulent workers could be held liable under US sanctions law, even if they were unaware of the workers’ true identities. Crypto-focused US lawyer Aaron Brogan told Cointelegraph that US sanctions regimes “are quite broad and impose a ‘strict liability’ regime.” “Anyone who engages in sanctioned activity, knowingly or not, is technically culpable.“
Niko Demchuk, head of legal at crypto compliance firm AMLBot, also told Cointelegraph that paying DPRK-based developers “is generally a breach of the US Department of the Treasury’s Office of Foreign Assets Control (OFAC).”
He said companies involved in such activities risk civil penalties, criminal fines, reputational damage, secondary sanctions, and banking or export control violations. He added that DPRK actors’ use of stolen identities is no excuse:
Still, Brogan said, OFAC is probably unlikely to pursue companies that unknowingly hired fraudulent workers.” However, he said the situation changes “if the scope of work was very sensitive and they didn’t observe reasonable identification verification procedures.”
Magazine: North Korea crypto hackers tap ChatGPT, Malaysia road money siphoned: Asia Express