KC Kimchi Canary

Web3 채용 리스크 데스크

김치 카나리아

DPRK 원격 IT 노동자 사기 징후를 확인하는 HR 실무 도구.

노트북 배송, 저장소 접근, 암호화폐 지급 전에 공식 자료 기반 위험 신호를 점검하세요.

FAKE RESUME PROXY BONK
가짜 이력서? 딱 걸림. 증거 먼저. 감은 나중. 미스터리 주소로 노트북 배송 금지.
15 개 검증된 출처 그룹 60 명/개 등재 인물 및 단체 20 장의 공식 사진

신뢰 원칙

국적만으로 판단하지 않습니다. 검증되지 않은 공개 비난을 허용하지 않습니다. 검토 전 증거는 비공개로 유지합니다.

증거 우선

공개 감시 목록 항목은 공식 제재, 수사기관, 법원 또는 동등한 공개 출처 근거가 필요합니다.

기본은 비공개

제보는 검토 대기열로 들어가며 충분한 증거로 승인되기 전에는 공개되지 않습니다.

공정한 스크리닝

국적 단독 판단, 민족성 대리 지표, 강제 구호, 정치적 충성 테스트를 사용하지 않습니다.

질문지

권한을 높이기 전에 관찰된 사기 징후를 점검하세요.

관찰된 사실만 선택하세요. 결과는 리스크 분류이며 공개 고발이 아닙니다.

운영 문구는 한국어로 제공되며, 법무/제재 판단에는 영어 원문과 자문을 함께 확인하세요.

신원 및 문서 독립 기록 사이에서 일치해야 하는 사실입니다.
위치, 장비, 접근 경로 사람, 노트북, 네트워크 경로가 실제로 어디에 있는지 확인합니다.
지급 및 급여 급여, 지갑, 지급 방식이 검증된 신원과 맞아야 합니다.
면접 및 계정 행동 실시간 면접 일관성, 라이브니스, 계정 통제 신호입니다.
채용 후 보안 행동 이미 환경이 노출되었을 가능성을 보여주는 신호입니다.
업체 및 스태핑 통제 스태핑, 하청, 제재 확인에 대한 제3자 통제입니다.

소프트 면접 질문

지원자의 주장과 연결될 때만 사용하세요.

일관성, 실시간성, 검증 가능한 경력을 확인합니다. 국적 테스트가 아닙니다.

한국 배경을 주장할 때

  • 현재 업무 환경, 통신사, 근무 시간, 장비 수령 주소를 구체적으로 설명하게 하세요.
  • 학교나 회사는 지원자가 준 연락처가 아니라 독립적으로 찾은 연락처로 확인하세요.

실시간 확인

  • 카메라를 켠 상태에서 최근 작업 샘플을 직접 설명하게 하세요.
  • 패션이나 외모가 아니라 동일 인물 여부와 주장 일관성만 비교하세요.

언어 검토

  • 한국어 방언, 어휘, 전문 용어가 주장한 배경과 맞는지 한국어 원어민 리뷰어에게 확인을 요청하세요.
  • 억양만으로 판단하지 말고 다른 기록과 함께 보세요.

운영 플레이북

실제 채용, 업체 검토, 사고 대응에 바로 쓰기 좋게 구성했습니다.

01

면접 전

신원, 학력, 경력, 제재 상태, 업체 통제를 독립 채널로 확인하세요.

02

장비 배송 전

검증된 주소로만 배송하고 MDM을 적용하며 무단 원격 접근과 저장소 접근을 지연하세요.

03

프로덕션 접근 전

최소 권한을 적용하고 불가능한 이동, 지급 불일치, 소스관리 활동을 점검하세요.

04

징후가 보이면

증거를 보존하고 접근을 중단한 뒤 법무/컴플라이언스와 IC3 또는 적절한 기관에 보고하세요.

비공개 제보 접수

제보는 검토 대기열로 들어가며, 공식 또는 검증 가능한 증거 없이는 공개되지 않습니다.

Need native South Korean review for Korean-language, dialect, vocabulary, or claimed-background consistency? Contact dev.koriel@gmail.com.

공식 공개 사례

공개 항목은 FBI, DOJ, OFAC 등 공식 출처로 제한됩니다.

Kim Kwang Jin official source photo
Kim Kwang Jin
Kang Tae Bok official source photo
Kang Tae Bok
Jong Pong Ju official source photo
Jong Pong Ju
Chang Nam Il official source photo
Chang Nam Il
Wanted by FBI; allegations unresolved unless proven in court

FBI wanted: fraudulent remote IT worker team tied to blockchain theft

DOJ says four DPRK nationals used false or stolen identities to obtain remote IT roles and allegedly stole more than $900,000 in virtual currency from two companies.

4 listed people/entities
Kim Kwang Jin aka P.S.Kang Tae Bok aka Wong Shao OnnJong Pong Ju aka Bryan ChoChang Nam Il aka Bong Chee Shen, Peter Xiao
  • False or stolen identities
  • Remote IT roles at crypto companies
  • Smart contract/source-code access
  • Tornado Cash laundering allegations
Jin Sung-Il official source photo
Jin Sung-Il
Pak Jin-Song official source photo
Pak Jin-Song
Wanted by FBI; allegations unresolved unless proven in court

FBI wanted: multi-year remote IT worker fraud case

DOJ says the defendants and co-conspirators obtained work from at least 64 U.S. companies, generated at least $866,255 from 10 companies, and laundered proceeds through a Chinese bank account.

2 listed people/entities
Jin Sung-IlPak Jin-Song
  • Forged and stolen identity documents
  • Laptop farm facilitation
  • U.S. company remote jobs
  • Money laundering allegations
Jong Song Hwa official source photo
Jong Song Hwa
Ri Kyong Sik official source photo
Ri Kyong Sik
Kim Ryu Song official source photo
Kim Ryu Song
Rim Un Chol official source photo
Rim Un Chol
Kim Mu Rim official source photo
Kim Mu Rim
Cho Chung Pom official source photo
Cho Chung Pom
Hyon Chol Song official source photo
Hyon Chol Song
Son Un Chol official source photo
Son Un Chol
Sok Kwang Hyok official source photo
Sok Kwang Hyok
Choe Jong Yong official source photo
Choe Jong Yong
Ko Chung Sok official source photo
Ko Chung Sok
Kim Ye Won official source photo
Kim Ye Won
Jong Kyong Chol official source photo
Jong Kyong Chol
Jang Chol Myong official source photo
Jang Chol Myong
Indicted; allegations unresolved unless proven in court

Fourteen DPRK nationals indicted in Yanbian Silverstar / Volasys Silverstar scheme

DOJ says the group worked for DPRK-controlled Yanbian Silverstar and Volasys Silverstar, using false, stolen, and borrowed identities to obtain remote IT work and launder revenue.

14 listed people/entities
Jong Song HwaRi Kyong SikKim Ryu SongRim Un CholKim Mu RimCho Chung PomHyon Chol SongSon Un CholSok Kwang HyokChoe Jong YongKo Chung SokKim Ye WonJong Kyong CholJang Chol Myong
  • False, stolen, and borrowed identities
  • Front companies
  • Remote work contracts
  • Revenue laundering allegations
Official record, no official photo published here
OFAC-designated sanctions target

OFAC sanctions: Chinyong Information Technology Cooperation Company and Kim Sang Man

OFAC sanctioned Chinyong and Kim Sang Man for roles tied to DPRK overseas IT worker delegations, revenue generation, and cryptocurrency payments.

2 listed people/entities
Chinyong Information Technology Cooperation Company aka Jinyong IT Cooperation CompanyKim Sang Man
  • DPRK IT worker delegations
  • Russia and Laos operations
  • Cryptocurrency payment flows
  • Sanctions designation
Official record, no official photo published here
Charged; allegations unresolved unless proven in court

DOJ charged Foreign Trade Bank representative Sim Hyon Sop in crypto laundering conspiracies

DOJ says Sim allegedly conspired with North Korean IT workers to launder proceeds from illegal IT development work at blockchain companies.

1 listed people/entities
Sim Hyon Sop aka Sim
  • Blockchain development companies
  • Stablecoin and virtual currency payments
  • FTB-linked laundering allegations
  • Sanctions evasion
Official record, no official photo published here
OFAC-designated sanctions targets

OFAC 2026 sanctions: facilitators and entities tied to DPRK IT worker fraud

OFAC designated six individuals and two entities for roles in DPRK IT worker schemes, including currency conversion, IT worker coordination, and facilitation services.

8 listed people/entities
Amnokgang Technology Development CompanyNguyen Quang VietQuangvietdnbg International Services Company LimitedDo Phi KhanhHoang Van NguyenYun Song GukHoang Minh QuangYork Louis Celestino Herrera
  • Currency conversion
  • IT worker coordination
  • Freelance IT contracts
  • Sanctions designation
Official record, no official photo published here
Sentenced after guilty pleas

DOJ sentencing: U.S.-based laptop farms that helped DPRK IT workers pose as U.S. residents

DOJ says the defendants operated laptop farms that helped North Korean remote IT workers pose as U.S. residents, use stolen identities, and obtain work from more than 100 U.S. companies.

2 listed people/entities
Kejia WangZhenxing Wang aka Danny Wang
  • Laptop farms
  • Stolen identities
  • U.S.-resident impersonation
  • More than 100 victim companies
Official record, no official photo published here
Sentenced after guilty plea

Christina Marie Chapman laptop farm scheme

DOJ says Chapman assisted DPRK IT workers posing as U.S. residents, helped them work at 309 U.S. companies, and generated more than $17 million in illicit revenue.

1 listed people/entities
Christina Marie Chapman
  • Laptop farm
  • Stolen U.S. identities
  • 309 U.S. companies
  • Payroll and check laundering
Official record, no official photo published here
Guilty pleas

U.S. facilitators who provided identities, hosted laptops, and passed vetting steps

DOJ says the defendants provided U.S. identities, hosted victim company laptops, installed remote access software, and helped overseas IT workers pass employer vetting.

3 listed people/entities
Audricus PhagnasayJason SalazarAlexander Paul Travis
  • Identity lending
  • Laptop hosting
  • Unauthorized remote access software
  • Drug-test substitution
Official record, no official photo published here
Guilty plea

Oleksandr Didenko identity and account marketplace

DOJ says Didenko stole U.S. identities and sold them to overseas IT workers, including DPRK IT workers, so they could fraudulently gain employment at 40 U.S. companies.

1 listed people/entities
Oleksandr Didenko aka Alexander Didenko
  • Stolen identity marketplace
  • Freelance platform accounts
  • Money-service accounts
  • 40 U.S. companies
Official record, no official photo published here
Indicted; one guilty plea reported by DOJ

Taggcar and facilitator indictment tied to 64-company remote IT worker scheme

DOJ says the facilitators helped obtain work for DPRK IT workers from more than 64 U.S. companies; Erick Ntekereze Prince later pleaded guilty to wire fraud conspiracy.

3 listed people/entities
Pedro Ernesto Alonso De Los ReyesErick Ntekereze PrinceEmanuel Ashtor
  • Staffing-vendor facilitation
  • False and stolen identities
  • Laptop farm
  • 64 U.S. companies
Official record, no official photo published here
OFAC-designated sanctions targets

OFAC Department 53 / Laos IT worker network

OFAC says Department 53 and front companies maintained DPRK IT worker delegations in Laos and used aliases to generate revenue from IT projects including crypto exchanges, web apps, and mobile apps.

6 listed people/entities
Department 53 of the Ministry of the People's Armed ForcesKorea Osong Shipping Co aka OsongChonsurim Trading Corporation aka ChonsurimJong In CholSon Kyong SikLiaoning China Trade Industry Co., Ltd aka Liaoning China Trade
  • Laos IT worker delegations
  • Aliases with clients
  • Crypto exchange development
  • Equipment supply network
Official record, no official photo published here
OFAC-designated sanctions targets

OFAC Korea Sobaeksu IT worker and procurement network

OFAC says Sobaeksu and associated individuals helped evade sanctions and generate revenue through fraudulent IT worker schemes and related procurement activity.

4 listed people/entities
Korea Sobaeksu Trading Company aka Sobaeksu United CorporationKim Se UnJo Kyong HunMyong Chol Min
  • IT worker deployment
  • Vietnam-linked revenue activity
  • Cryptocurrency and financial coordination
  • Sanctions evasion
Official record, no official photo published here
OFAC-designated sanctions targets

OFAC Chinyong-linked payment and front-company network

OFAC says Andreyev and Kim Ung Sun facilitated hundreds of thousands of dollars in transfers for Chinyong, while Shenyang Geumpungri and Sinjin supported DPRK IT worker revenue generation.

4 listed people/entities
Vitaliy Sergeyevich AndreyevKim Ung SunShenyang Geumpungri Network Technology Co., Ltd aka Shenyang GeumpungriKorea Sinjin Trading Corporation aka Sinjin General Trading Corporation
  • Crypto-to-cash conversion
  • Chinyong-linked front company
  • DPRK IT worker delegation
  • Sanctions designation
Official record, no official photo published here
OFAC-designated sanctions targets

OFAC bankers and KMCTC IT delegation network

OFAC says DPRK bankers helped manage cryptocurrency funds and that KMCTC operated IT worker delegations from Shenyang and Dandong using banking proxies.

5 listed people/entities
Jang Kuk CholHo Jong SonKorea Mangyongdae Computer Technology Company aka KMCTCU Yong SuRyujong Credit Bank
  • Cryptocurrency fund management
  • IT worker delegations in China
  • Banking proxies
  • Sanctions designation

출처

Primary references used for Kimchi Canary controls.

U.S. Treasury OFAC, U.S. State Department, FBI · 2022-05-16 Guidance on the Democratic People's Republic of Korea Information Technology Workers Baseline red flags and due diligence measures for avoiding inadvertent hiring of DPRK IT workers. ODNI CTIIC / FBI IC3 · 2023-10-18 North Korean Tactics, Techniques, and Procedures for Revenue Generation Updated indicators for fraudulent documents, proxy accounts, remote desktop use, and crypto payments. FBI · 2025-01-23 North Korean IT Workers Conducting Data Extortion Guidance on data theft, repository copying, session abuse, AI video, and remote hiring controls. FBI IC3 · 2025-07-23 North Korean IT Worker Threats to U.S. Businesses Public guidance on U.S.-based facilitators, laptop farms, report channels, and vendor exposure. U.S. Department of Justice · 2025-06-30 Justice Department Announces Coordinated, Nationwide Actions to Combat North Korean Remote IT Workers Charges, searches, account/domain seizures, and alleged blockchain-company crypto thefts. U.S. Treasury OFAC · 2026-03-12 Treasury Sanctions Facilitators of DPRK IT Worker Fraud Targeting U.S. Businesses Sanctions against facilitators and entities tied to DPRK IT worker fraud networks. U.S. Department of Justice · 2026-04-15 Two U.S. Nationals Sentenced for Facilitating Fraudulent Remote Information Technology Worker Scheme Sentencing announcement for U.S.-based laptop farm facilitators tied to DPRK remote IT worker fraud. U.S. Department of Justice · 2025-07-24 Arizona Woman Sentenced in $17M IT Worker Fraud Scheme Sentencing announcement for a U.S.-based laptop farm scheme involving more than 300 companies. U.S. Department of Justice · 2025-11-14 Justice Department Announces Nationwide Actions to Combat Illicit North Korean Government Revenue Generation Guilty pleas by U.S. and Ukrainian facilitators of DPRK remote IT worker schemes. U.S. Treasury OFAC · 2025-01-16 Treasury Targets IT Worker Network Generating Revenue for DPRK Weapons Programs OFAC designations for Department 53, front companies, supervisors, and equipment suppliers. U.S. Treasury OFAC · 2025-07-24 Treasury Sanctions Clandestine IT Worker Network Funding the DPRK's Weapons Programs OFAC designations for Korea Sobaeksu Trading Company and associated individuals. U.S. Treasury OFAC · 2025-08-27 Treasury Sanctions Fraud Network Funding DPRK Weapons Programs OFAC designations for a Chinyong-linked IT worker payment and front-company network. U.S. Treasury OFAC · 2025-11-04 Treasury Sanctions DPRK Bankers and Institutions Involved in Laundering Cybercrime Proceeds and IT Worker Funds OFAC designations tied to cybercrime proceeds, IT worker funds, and DPRK IT delegations. U.S. Treasury OFAC · 2023-05-23 Treasury Targets DPRK Malicious Cyber and Illicit IT Worker Activities U.S. Department of Justice · 2023-04-24 North Korean Foreign Trade Bank Representative Charged in Crypto Laundering Conspiracies