CrimeOwl AI logoCrimeOwl AI
CasesBlogPricingAbout
  1. Home
  2. /
  3. Cases
  4. /
  5. FRAUDULENT REMOTE IT WORKERS FROM DPRK
Back to CasesMore Cases
Two unnamed U.S. companies and their virtual currency holdings

The person at the center of this case

Two unnamed U.S. companies and their virtual currency holdings

Case
#962
SourceFBI WantedUpdated Mar 15, 2026
Federal Bureau of Investigation (FBI); U.S. District Court, Northern District of Georgia
Cold Case · Open
312 days waiting

FRAUDULENT REMOTE IT WORKERS FROM DPRK

Justice for Two unnamed U.S. companies and their virtual currency holdings — the trail went cold in 2025, but the truth hasn't.

Start here

Key leads to think about

🎯
suspect
Lead #1

Where are the four suspects currently located given their known ties to UAE and Laos?

🔍
evidence
Lead #2

What specific virtual currency was stolen and to which wallets or exchanges were the proceeds laundered?

👁️
witness
Lead #3

Which two companies were targeted and what employees may have noticed suspicious activity from the fraudulent workers?

Four North Korean nationals allegedly posed as remote IT workers and infiltrated two U.S. companies in 2022, stealing over $900,000 in virtual currency using fraudulent identities and employment documents. The men worked as a coordinated team to exploit their system access and launder the stolen proceeds through international channels. Federal arrest warrants were issued in June 2025, but the suspects remain at large with known ties to the UAE and Laos, making this an active international cybercrime investigation.

Case
#962
SourceFBI WantedUpdated Mar 15, 2026
Federal Bureau of Investigation (FBI); U.S. District Court, Northern District of Georgia

Try asking

Claim this imported case

A one-time $10 claim transfers this imported case workspace to your account. You get 10 uploads for this case, 25 daily AI questions for this case, and public tips with files route to you.

10 uploads25 AI questions/day

This does not start a subscription. When the included limits are reached, the Personal plan unlocks more workspace capacity.

More leads to consider

Beyond the top three above — each detail below could be the thread that pulls this case open.

💡
clue
Lead #4

How did the North Korean operatives obtain the fraudulent identification documents and establish legitimate employment histories?

📞
contact
Lead #5

Have any financial institutions or cryptocurrency exchanges identified suspicious transactions linked to these individuals?

Have information about any of these leads?

Even the smallest detail could be the key to solving this case.

Official wording

Source Narrative

Wire Fraud Conspiracy; Wire Fraud; Money Laundering Conspiracy Caution: Kim Kwang Jin, Kang Tae Bok, Jong Pong Ju, and Chang Nam Il, are wanted for their alleged involvement with a scheme to steal virtual currency from two companies, valued at over $900,000 at the time of the theft, and to launder the proceeds of those thefts in 2022. Using fraudulent names and identification documents, the men allegedly gained employment at two companies as Remote IT Workers.

With these roles, these individuals allegedly abused their access at the companies to steal virtual currency. The individuals worked and travelled together as a team.

Federal arrest warrants were issued for the men on June 24, 2025, in the United States District Court, Northern District of Georgia, Atlanta, Georgia, after they were charged with Wire Fraud Conspiracy, Wire Fraud, and Money Laundering Conspiracy. The men speak English and Korean and have ties to the United Arab Emirates and Laos.

Kim Kwang Jin is described as an Asian male, Date of Birth: January 24, 1998, with brown hair and brown eyes. He has an alias of “P.S.” Kang Tae Bok is described as an Asian male, Date of Birth: February 22, 1997, with brown hair and brown eyes.

He has an alias of “Wong Shao Onn.” Jong Pong Ju is described as an Asian male, Date of Birth: January 25, 1997, with brown hair and brown eyes. He has an alias of “Bryan Cho.” Chang Nam IL is described as an Asian male, date of Birth: October 7, 1999, with brown hair and brown eyes.

He has aliases of “Bong Chee Shen” and “Peter Xiao.”

Timeline of Events

📋
2022

Virtual currency theft occurred

Kim Kwang Jin, Kang Tae Bok, Jong Pong Ju, and Chang Nam Il allegedly stole over $900,000 in virtual currency from two companies while employed as remote IT workers using fraudulent identities.

🕵️
2025-06-24

Federal arrest warrants issued

Warrants issued in U.S. District Court, Northern District of Georgia for Wire Fraud Conspiracy, Wire Fraud, and Money Laundering Conspiracy.

Key Locations
Interactive map showing important locations related to this case

Case Information

Incident:January 1, 2022
Last Updated:April 29, 2026

Up to $5 Reward

For information leading to the resolution of this case

Leave a comment

Comments

Case Information

Incident:January 1, 2022
Last Updated:April 29, 2026

Up to $5 Reward

For information leading to the resolution of this case