North Korean IT Warriors Exposed: The $5 Million Bounty Comedy Club
The U.S. State Department offers up to $5 million for information on North Korean front companies Yanbian Silverstar and Volasys Silverstar, which use remote IT work to funnel millions back to Pyongyang. These “IT warriors” employ stolen identities to deceive employers, violating sanctions and fueling North Korea’s missile programs.

Hot Take:
Who knew that the “Kim Jong-un School of IT” was cranking out so many remote work ninjas? Forget Silicon Valley—Pyongyang’s got its own IT startup scene, complete with nuclear ambitions and shady LinkedIn profiles! In a world where catfishing goes corporate, these North Korean “IT warriors” are turning identity theft into a lucrative side hustle, tricking businesses faster than you can say “VPN.”
Key Points:
- The U.S. State Department is offering up to $5 million for information on North Korean IT fraud schemes.
- Two companies, Yanbian Silverstar and Volasys Silverstar, are at the center of these operations.
- North Korean IT workers earn up to $300,000 each annually by scamming businesses worldwide.
- 14 North Korean operatives have been indicted for various crimes, including identity theft and money laundering.
- Some “IT warriors” even resort to extortion when fired, threatening to leak sensitive information.
When Freelancing Goes Rogue
Move over Fiverr, there’s a new gig economy in town, and it’s headquartered in… North Korea? Yes, you heard it right. The U.S. State Department is on the hunt for information that could bring down a North Korean freelancing empire that’s a little more “Mission: Impossible” than “Upwork.” With a cool $5 million up for grabs, this is one bounty hunt that even Dog the Bounty Hunter might want to get in on. So how did we get here? Well, it turns out that some companies, like China’s Yanbian Silverstar and Russia’s Volasys Silverstar, have been moonlighting as talent agencies for North Korean IT pros, who are basically scamming their way into remote jobs. Think of it as a digital Trojan horse, but with more kimchi.
Fake It Till You Make It (In Pyongyang)
Now, you might be wondering how these IT wizards manage to pull off such high-flying heists. Simple: they borrow, steal, and—even more audaciously—buy U.S. identities like they’re shopping for socks at Target. Armed with these fresh personas, they slide into remote IT gigs, raking in up to $300,000 each per year. With over 130 “IT warriors” in the field, North Korea is practically rolling in dough, which they then launder and funnel back to support their nuclear programs. If only they put this kind of effort into developing a decent search engine!
The Long Arm of the Law (Finally) Catches On
But don’t worry, the FBI, DOJ, and State Department are on it. In a move that sounds straight out of a Jason Bourne movie, they’ve indicted 14 of these digital mercenaries, led by a mastermind named Jong Song Hwa. To date, they’ve seized millions in illicit funds and shut down internet domains faster than a game of whack-a-mole. But like a bad rash, these “IT warriors” just keep coming back. Even after being fired, they resort to extortion, threatening to leak sensitive info online. It’s like a bad breakup, only with more hacking and fewer Taylor Swift songs.
When Your Co-Worker Is Actually an International Spy
In a plot twist worthy of a Hollywood blockbuster, a North Korean hacker even managed to get hired as a Principal Software Engineer at a cybersecurity company called KnowBe4. Not content with just a corner office, they immediately tried to install malware on company devices. How did they manage this sneak attack? Through a combination of stolen identity, AI-assisted charm, and possibly some next-level video call filters. It’s a cautionary tale for all companies: trust, but verify… and maybe run a few extra background checks.
From Laptop Farms to Pyongyang Palaces
Meanwhile, the U.S. has been busy dismantling North Korean “laptop farms” in China and even in the home of a woman in Arizona. These covert operations were essentially IT sweatshops, where North Korean hackers worked undercover while appearing to be logging in from places like Nashville. It’s the ultimate remote work fantasy—if your fantasy involves breaking international sanctions and helping fund a nuclear program. Sorry, WeWork, but these guys have taken the concept of a “flexible workspace” to a whole new level.
In the end, the saga of the North Korean IT warriors is a reminder that sometimes, the most dangerous hackers aren’t the ones lurking in the dark web, but the ones sitting at a virtual desk, pretending to be your next favorite co-worker. So next time you get a request from “Bob in Accounting,” maybe double-check Bob’s LinkedIn profile—just in case he’s actually Kim Jong-un in disguise.