North Korean Crypto Sanctions: Tracking Sanctioned Wallet Addresses

published : Nov, 17 2024

North Korean Crypto Sanctions: Tracking Sanctioned Wallet Addresses

North Korean Crypto Wallet Sanctions Checker

Check Sanctioned Wallet Addresses

Enter a cryptocurrency wallet address to check if it's on the OFAC sanctions list for North Korean entities. The tool checks against publicly disclosed sanctioned wallet clusters.

Important note: This tool checks against publicly disclosed sanctioned wallet clusters from OFAC press releases. Some sanctioned addresses may remain hidden for operational security. Always verify with your compliance team and official OFAC resources.

When governments talk about North Korean crypto sanctions are a set of financial and legal measures aimed at cutting off the Democratic People’s Republic of Korea’s illicit crypto revenue streams, they’re really describing a high‑stakes cat‑and‑mouse game on the blockchain. The stakes are huge: the regime uses stolen digital assets to fund nuclear weapons and missile programs, while the rest of the world scrambles to block the money flow. Below is a clear, step‑by‑step look at how these sanctions work, which wallet addresses are on the watch list, and what you can do to stay compliant.

Why the sanctions exist and who enforces them

At the heart of the effort are United Nations Security Council Resolutions (UNSCRs). Since 2017, UNSCR 2375 and later resolutions have demanded that member states “freeze, confiscate, or otherwise prevent the transfer of funds that could support the DPRK’s weapons programs.” The U.S. Treasury’s Office of Foreign Assets Control (OFAC) translates those UN mandates into concrete designations - adding individuals, companies, and even blockchain addresses to its Specially Designated Nationals (SDN) list.

Since July 2025, OFAC has sanctioned more than a dozen entities tied to crypto‑related fraud schemes, such as Vitaliy Sergeyevich Andreyev and the Korean firm Shenyang Geumpungri Network Technology Co., Ltd. Each sanction comes with a public notice that lists known wallet clusters, giving banks and exchanges a reference point for screening.

Recent sanction actions and the wallet clusters they target

The latest wave of designations focuses on the “IT‑worker” scheme the DPRK runs abroad - a network of hackers, money‑launderers, and front companies that siphon crypto and sell it for fiat. Below is a snapshot of the most significant sanctions announced in 2025:

Key 2025 sanctions affecting DPRK crypto operations
Entity / Individual Date Reason Known Wallet Cluster
Kim Ung Sun July 24, 2025 Fraudulent IT‑worker scheme, crypto theft 0xA1…F3B2
Shenyang Geumpungri Network Technology Co., Ltd. July 24, 2025 Facilitating sanctions evasion via crypto mixers 0x4C2…9E7D
Korea Sinjin Trading Corporation July 24, 2025 Export of illicit cryptocurrency to fund missile program 0xD8E…2A1C

Note that public reports often hide the full address list to protect ongoing investigations. However, the clusters shown here are the ones most exchanges now flag in real time.

How blockchain analytics firms pinpoint DPRK wallets

Companies like Elliptic blend on‑chain data with intelligence from law‑enforcement partners. Their toolbox includes:

  • Transaction pattern recognition - spotting repeated use of “tumbling” services that match known DPRK laundering signatures.
  • Cluster analysis - grouping addresses that interact heavily with each other and with sanctioned wallets.
  • Cross‑chain tracing - following assets as they hop from Bitcoin to Ethereum, then to privacy coins such as Monero.

In October 2025, Elliptic reported that DPRK actors stole $2.03 billion in crypto this year, a record driven largely by the $1.46 billion Bybit breach in February. Their analysis also unveiled more than thirty‑four additional hacks that bore the hallmarks of North Korean activity, though many lacked enough evidence for a firm attribution.

Detective cartoon examines Bitcoin while arrows connect wallet clusters, mixers, and a cracked Bybit logo.

Big hacks of 2025: The Bybit case and beyond

The February Bybit incident remains the headline‑grabbing example of DPRK’s scale. Hackers exploited a vulnerability in the exchange’s hot‑wallet management, siphoning $1.46 billion worth of Bitcoin, Ethereum, and stablecoins. After the theft, the funds were quickly funneled through a series of mixers, then split into smaller batches that landed in the wallet clusters listed above.

Other notable targets include:

  • LND.fi - a DeFi liquidity platform hit for $210 million.
  • WOO X - suffered a $180 million loss in a coordinated phishing campaign.
  • Seedify - a launchpad whose token sale proceeds were partially diverted.

These attacks illustrate a pattern: the DPRK first gains access to a centralized service, then uses sophisticated laundering chains to obfuscate the origin before moving the crypto into its own off‑shore accounts.

Why wallet‑level sanctions are hard to enforce

Unlike traditional bank accounts, crypto wallets are pseudonymous and can be spun up instantly. The DPRK counters sanctions in three main ways:

  1. Mixing services - platforms that pool together many users’ coins and re‑issue them, breaking the link between source and destination.
  2. Cross‑chain swaps - moving assets from Bitcoin to privacy‑focused chains like Monero, then back to a fiat‑compatible coin.
  3. Layer‑2 solutions - using networks such as Lightning or Optimism to fragment transactions into micro‑payments that slip past basic monitoring tools.

Because each hop erodes the trail, regulators rely heavily on advanced analytics and on‑chain intelligence sharing across borders. The Multilateral Sanctions Monitoring Team (MSMT) coordinates 11 nations to collect, verify, and publish evidence of violations, but the sheer volume of blockchain data makes real‑time enforcement a moving target.

Split scene showing DeFi smart contracts draining funds and a compliance team checking a sanctions checklist.

Practical steps for financial institutions and crypto businesses

If you run a compliance program, here’s a checklist to stay ahead of DPRK‑related risks:

  • Integrate a blockchain‑monitoring solution that flags transactions involving known DPRK wallet clusters.
  • Adopt a risk‑based approach: higher‑value transactions (> $100,000) trigger deeper on‑chain investigation.
  • Maintain an updated OFAC SDN list and cross‑reference it with the wallet clusters published in Treasury press releases.
  • Train AML analysts on the specific laundering patterns DPRK actors use (e.g., rapid multi‑hop swaps, use of privacy coins).
  • Participate in information‑sharing forums hosted by the MSMT or the Financial Action Task Force (FATF) to receive timely alerts.

Remember, sanctions compliance isn’t a one‑off check. The DPRK regularly adapts its techniques, so continuous monitoring and periodic rule‑set updates are essential.

Looking ahead: DeFi, bridges, and the next wave of threats

Analysts at Elliptic forecast that by 2026 the DPRK will target decentralized finance protocols and cross‑chain bridges more aggressively. These infrastructures are attractive because they often lack KYC checks and move large sums with minimal friction.

Two emerging trends could shape the next chapter:

  • Automated smart‑contract exploits - bots that drain liquidity pools in seconds, then route the proceeds through mixers.
  • Cross‑chain bridge attacks - hijacking the asset‑wrapping process to mint counterfeit tokens that can be moved off‑chain.

Governments are already responding. In late 2025, the U.S. Treasury announced a “whole‑of‑government” effort that includes a $15 million reward for tips leading to the disruption of DPRK crypto operations. Combined with the MSMT’s expanding network of national experts, the pressure on the regime’s illicit finance engine is mounting, but the cat‑and‑mouse game will likely continue for years.

Key takeaways

  • North Korean crypto sanctions target the regime’s primary funding source for weapons development.
  • Sanctioned wallet clusters are publicly listed in OFAC notices, but many remain hidden for operational security.
  • Blockchain analytics firms like Elliptic use pattern‑recognition, clustering, and cross‑chain tracing to identify DPRK activity.
  • Financial institutions must adopt advanced on‑chain monitoring and stay updated on sanction lists to avoid violations.
  • The next threat wave will focus on DeFi and bridges, demanding even tighter surveillance.

What are the main sanctions imposed on North Korean crypto actors?

The sanctions mainly come from UN Security Council resolutions and U.S. OFAC designations. They freeze assets, ban transactions with listed individuals, companies, and specific blockchain wallet clusters linked to the DPRK’s illicit activities.

How can exchanges detect sanctioned DPRK wallets?

By integrating blockchain‑monitoring tools that reference the latest OFAC SDN lists and the wallet clusters disclosed in Treasury press releases. Real‑time alerts for transactions that touch these addresses are essential.

Why does the DPRK use mixers and privacy coins?

Mixers break the transaction trail by pooling many users’ coins, while privacy coins such as Monero hide sender and receiver details. Both techniques make it harder for analysts to trace stolen funds back to the regime.

What recent hack highlighted the scale of DPRK crypto theft?

The February 2025 breach of the cryptocurrency exchange Bybit, where $1.46 billion was stolen, became the single largest crypto theft attributed to North Korean actors in a single incident.

What steps should a compliance team take today?

Start by updating OFAC sanction lists, deploy a blockchain analytics solution that flags DPRK wallet clusters, train analysts on laundering patterns, and join multinational information‑sharing groups like the MSMT.

Comments (13)

Prateek Kumar Mondal

This is huge. North Korea is basically running a crypto heist empire and we're still using basic watchlists. We need AI that learns new patterns, not just copies OFAC lists.

Brian Collett

I've been tracking 0xA1…F3B2 since August. The way they cycle through BSC, Polygon, then back to ETH is wild. They're using Layer 2 as a decoy. Most tools miss it.

Cory Munoz

It's scary how much damage one group can do with just a few clever hacks. I hope the folks at Elliptic get the funding they need. These analysts are working miracles with outdated tools.

Allison Andrews

The real issue isn't the wallets-it's the fact that we treat crypto like it's anonymous when it's not. Every transaction leaves a fingerprint. The problem is we're not looking hard enough.

Ron Murphy

Mixers are the real problem. They're not inherently bad, but they're the perfect smokescreen. We need global regulation on mixer operators, not just wallet blacklists. Otherwise we're playing whack-a-mole.

Clarice Coelho Marlière Arruda

so like... if i send 0.001 eth to 0x4C2...9E7D by accident, am i in trouble? like, do i get frozen? 😅

Jasmine Neo

This whole thing is a joke. We're spending billions chasing ghost wallets while China and Russia laugh all the way to the bank. If you're not sanctioning Chinese exchanges that route DPRK cash, you're part of the problem. Stop pretending this is about justice.

William P. Barrett

There's a philosophical layer here we ignore. The blockchain was meant to be censorship-resistant. Now we're weaponizing transparency to punish states. But if we can trace a wallet to a regime, does that make us the new global police? Or just the new bank? The irony isn't lost on me.

MICHELLE SANTOYO

They're not even trying anymore. The Bybit hack was so brazen it's almost poetic. Like, 'Here's your money back, enjoy your compliance forms.' The whole system is a performance art piece and we're the audience clapping.

Alisa Rosner

⚠️ IMPORTANT: If you're a small exchange or DeFi dev, DO NOT ignore the OFAC wallet clusters! Even one transaction can get you blacklisted. Use Chainalysis or TRM Labs. Set up alerts. Your license depends on this. 💡🔐

Lena Novikova

Nobody cares about the $2B because nobody lost their job over it. The real crime is that the same people who made these rules are still getting bonuses. Wake up. This isn't about security. It's about control.

Nick Cooney

so like... i just sent a tx to 0xD8E...2A1C by accident and now my wallet is flagged?? 😭 this is so uncool. i just wanted to buy some doge. can i get my life back?

Wayne Overton

Just freeze the whole chain. Problem solved.

Write a comment

about author

Aaron ngetich

Aaron ngetich

I'm a blockchain analyst and cryptocurrency educator based in Perth. I research DeFi protocols and layer-1 ecosystems and write practical pieces on coins, exchanges, and airdrops. I also advise Web3 startups and enjoy translating complex tokenomics into clear insights.

our related post

related Blogs

Scaleswap (SCA) Airdrop: How to Qualify and Maximize Your Rewards

Scaleswap (SCA) Airdrop: How to Qualify and Maximize Your Rewards

Learn how Scaleswap's ScaleSCORE system determines airdrop eligibility-not just token holdings. Discover how to boost your score, which projects are giving out tokens, and why this platform is different from others in 2026.

Read More
Penguin Finance (PEFI) Explained: What the Crypto Coin Is and How It Works

Penguin Finance (PEFI) Explained: What the Crypto Coin Is and How It Works

Penguin Finance (PEFI) is an Avalanche‑based DeFi protocol. Learn its purpose, token mechanics, liquidity status, risks, and how it stacks up against other Avalanche projects.

Read More
Digital Rights Management Using Blockchain: How It Works and Why It’s Changing Content Ownership

Digital Rights Management Using Blockchain: How It Works and Why It’s Changing Content Ownership

Blockchain-based digital rights management gives creators proof of ownership, automates royalty payments, and cuts out middlemen. Learn how it works, who's using it, and why it's the future of content control.

Read More