News
Ethereum Foundation-Backed Program Reveals 100 North Korea
Ethereum Foundation-backed program exposes 100 North Korea operatives infiltrating crypto firms. See how the threat works and protect your business now.
An Ethereum Foundation-backed security initiative disclosed on April 16, 2026 that a stipend-funded project identified about 100 North Korean IT workers embedded in Web3 organizations and warned roughly 53 affected projects, according to the Ethereum Foundation’s ETH Rangers recap. The disclosure matters beyond Ethereum. It gives the crypto industry a rare quantified look at infiltration risk just as U.S. authorities and blockchain investigators keep tying DPRK-linked operators to remote-worker fraud, data theft, sanctions evasion, and multibillion-dollar crypto crime.
Last Updated: April 18, 2026, 00:00 UTC
Program Disclosure Date: April 16, 2026 (Ethereum Foundation blog)
Operatives Identified: Around 100 DPRK IT workers
Projects Alerted: Approximately 53 Web3 organizations
Program Window: Six-month stipend period
ETH Rangers Crosses From Grant Program to Counterintelligence Case
The headline number is stark. Around 100 suspected DPRK IT workers. About 53 projects contacted. All of it was published by the Ethereum Foundation on April 16, 2026, in its recap of the ETH Rangers program launched in late 2024 with Secureum, The Red Guild, and Security Alliance, or SEAL, to fund public-goods security work in the Ethereum ecosystem. One recipient used that stipend to build the Ketman Project, which the foundation said focused on discovering and expelling North Korean IT workers operating under fake identities. That is not a vague warning. It is a measured operational result with a count, a time window, and a remediation trail.
North Korea's 100,000-strong fake IT worker army rake in $500M a year for Kim Jong Un
byu/Logical_Welder3467 intechnology
What competitors mostly emphasized was the raw “100 operatives” figure. The more important angle is the conversion rate. If Ketman identified around 100 workers and reached out to approximately 53 projects during a six-month period, that implies a project-alert ratio of 0.53 and an average of 16.7 identified operatives per month. Put differently, the program surfaced roughly one potentially compromised project every 3.4 days over six months. That cadence suggests industrialized infiltration, not isolated fraud. It also lines up with U.S. government warnings that North Korean remote IT workers use fraudulent identities, U.S.-based facilitators, device farms, and remote-access tooling to bypass hiring controls.
Derived Metrics Analysis
| Calculated Metric | Current Value | Reference Value | Deviation | Signal |
|---|---|---|---|---|
| Project Alert Ratio | 53.0% | n/a | 53 projects / 100 workers | Broad organizational exposure |
| Monthly Identification Pace | 16.7 workers | n/a | 100 workers / 6 months | Sustained infiltration pressure |
| Project Contact Pace | 8.8 projects | n/a | 53 projects / 6 months | One alert every 3.4 days |
| DPRK Share of 2024 Crypto Theft | 60.9% | $2.2B total stolen | $1.34B / $2.2B | Threat concentration remains extreme |
Methodology: Ratios are calculated from figures published by the Ethereum Foundation on April 16, 2026 and Chainalysis reporting on 2024 crypto theft. The theft share uses $1.34 billion attributed to North Korea-linked hackers divided by roughly $2.2 billion total crypto stolen in 2024. Updated: April 18, 2026, 00:00 UTC.
WOWW!! THIS IS MASSIVE 🤯
🇰🇵 NORTH KOREA HAVE ANNOUNCED
$1.5 BILLION STRATEGIC ETHEREUM $ETH RESERVE FOR THE COUNTRY. pic.twitter.com/NnBVFv4bL6— Ash Crypto (@AshCrypto) February 21, 2025
I’ve covered enough crypto security cycles to know when a number changes the frame. This one does. Security stories usually arrive after a hack, after funds move, after mixers light up. Here, the useful signal appears earlier in the kill chain: hiring. That is where the Ketman result stands out. It turns infiltration into a measurable pre-breach indicator, something many firms still treat as an HR issue instead of a treasury and protocol-security risk.
Why Hiring Fraud Became a Direct Crypto Security Threat
The FBI said in its 2025 alert that North Korean IT workers pose a threat to U.S. businesses and use U.S.-based individuals to receive company devices, helping them evade geographic and identity controls. The Justice Department went further, saying these workers have posed as legitimate remote staff, exfiltrated sensitive company data, and in some cases earned up to $300,000 annually per worker, generating hundreds of millions of dollars collectively for the regime and entities tied to weapons programs. That matters because crypto firms often combine remote engineering, privileged infrastructure access, and fast-moving treasury operations in the same workflow. One bad hire can become an access broker.
Hackers linked to North Korea breached behind-the-scenes software that runs many common online functions in an effort to steal login information that could enable further cyber operations, Google said on Tuesday. https://t.co/fKErlb0N3b
— Reuters Legal (@ReutersLegal) March 31, 2026
Event Sequence: April 16, 2026 and Prior Context
Late 2024: Ethereum Foundation, Secureum, The Red Guild, and SEAL launch ETH Rangers to fund public-goods security work. (Ethereum Foundation)
Six-month stipend period: Ketman Project identifies around 100 DPRK IT workers and contacts about 53 projects. (Ethereum Foundation)
April 16, 2026: Ethereum Foundation publishes the ETH Rangers recap disclosing the results. (Ethereum Foundation)
March 2026: OFAC sanctions six individuals and two entities tied to DPRK IT worker fraud schemes involving crypto addresses. (Chainalysis summary of OFAC action)
Chainalysis gives the financial backdrop. North Korea-linked hackers stole $1.34 billion across 47 incidents in 2024, up from about $660.5 million across 20 incidents in 2023, a 102.88% increase in value. Chainalysis also said 2024 total crypto theft reached roughly $2.2 billion, which means DPRK-linked actors accounted for about 60.9% of all stolen value that year. In a separate 2026 report, the firm said North Korean hackers stole at least $2.02 billion in 2025, up another 51% year over year, and noted that expanded reliance on IT worker infiltration likely helped accelerate initial access and lateral movement at exchanges, custodians, and Web3 firms. That’s the bridge between fake resumes and nine-figure losses.
100 Workers Identified While the State-Backed Theft Machine Keeps Scaling
There is a second divergence here. Public discussion still focuses on Lazarus-style smash-and-grab hacks, while the data points to a blended model: insider access, social engineering, and then theft. CoinDesk reported in October 2024 that U.S. authorities had already intensified warnings about DPRK IT workers infiltrating crypto employers, and that in some cases reporting linked heists directly to suspected DPRK workers on payrolls. The Block had earlier cited U.N. Security Council figures saying more than 4,000 North Koreans had been hired by Western technology firms. The Ethereum Foundation disclosure does not prove every identified worker led to a theft event, but it does show the pipeline is active inside Web3 right now.
Yay! My talk accepted for BlackHat USA 2025 Briefings! We accessed amount of internal material on North Korean IT workers and have investigated them in unprecedented levels of detail.https://t.co/iYvL45dMYZ pic.twitter.com/eZucwyG03g
— 男性(27) (@SttyK) May 21, 2025
⚠️
Operational Risk Alert: Infiltration is a pre-hack signal, not a compliance footnote
Ethereum Foundation data published April 16, 2026 shows around 100 DPRK IT workers identified across Web3 organizations during a six-month stipend period, with approximately 53 projects alerted. DOJ guidance says individual workers have earned up to $300,000 annually, while FBI alerts describe device-routing and remote-access tactics used to bypass controls. The pattern suggests hiring fraud can evolve into data theft, wallet compromise, or extortion if firms do not isolate privileges early.
Another undercovered point: sanctions and law enforcement are moving closer to the crypto rails used by these networks. Chainalysis said OFAC’s March 2026 action designated 21 cryptocurrency addresses across multiple blockchains tied to DPRK IT worker schemes. The FBI’s wanted notice says the State Department’s Rewards for Justice program is offering up to $5 million for information that disrupts financial mechanisms supporting North Korea, including worker exportation and cyber activity. That raises the compliance cost for any firm that misses these red flags. It is no longer just a security failure. It can become a sanctions exposure problem too.
Can Crypto Firms Contain the Threat Before It Becomes the Next Breach?
The answer depends on whether firms treat identity verification, endpoint control, and privilege segmentation as core security infrastructure. The Ethereum Foundation’s recap did not detail Ketman’s detection methods, and that omission is understandable. Publishing tradecraft would reduce its usefulness. But the disclosed output is enough to support one conclusion: the industry has a measurable insider-risk problem. Data verification is strong on the central claim. Cointelegraph’s April 2026 report matches the Ethereum Foundation’s figures of around 100 DPRK IT workers and roughly 53 projects contacted, with the foundation blog serving as the primary source. Variance: effectively zero on the headline numbers.
The broader significance is bigger than Ethereum. If one foundation-backed stipend project can surface 100 suspected operatives in six months, the true addressable problem across exchanges, infrastructure providers, market makers, and protocol teams is likely larger. That is an inference, not a disclosed total. Still, it is a reasonable one when placed beside FBI alerts, DOJ enforcement, OFAC sanctions, and Chainalysis estimates showing DPRK-linked actors remain the dominant nation-state threat in crypto. The industry keeps talking about smart-contract risk. Fair enough. But the more uncomfortable truth is that some of the next breaches may start in the interview process.
Frequently Asked Questions
What did the Ethereum Foundation-backed program actually reveal?
On April 16, 2026, the Ethereum Foundation said a stipend recipient in its ETH Rangers program built the Ketman Project, which identified around 100 DPRK IT workers operating within Web3 organizations during a six-month period and contacted approximately 53 projects about possible exposure. Cointelegraph reported the same figures the same week, matching the foundation’s recap.
Why are North Korean IT workers such a serious threat to crypto firms?
The FBI says DPRK IT workers use fraudulent identities, U.S.-based facilitators, and remote-access methods to evade hiring controls. DOJ says they have posed as legitimate remote workers, stolen sensitive data, and in some cases earned up to $300,000 annually each, generating hundreds of millions of dollars collectively for the regime. In crypto, that access can intersect with wallets, code repositories, and treasury systems.
How large is the broader DPRK-linked crypto threat?
Chainalysis said North Korea-linked hackers stole about $1.34 billion across 47 incidents in 2024, up from roughly $660.5 million across 20 incidents in 2023. It also said total crypto theft in 2024 was about $2.2 billion, implying DPRK-linked actors accounted for around 60.9% of stolen value. In 2025, Chainalysis estimated at least $2.02 billion stolen by North Korean hackers.
Is this only an Ethereum ecosystem issue?
No. The Ethereum Foundation funded the project, but the issue spans the wider crypto and tech sectors. The FBI warning applies to U.S. businesses broadly, and prior reporting from CoinDesk and The Block described DPRK-linked infiltration across crypto firms and Western technology companies. The Ethereum disclosure is best read as a visible sample of a larger industry problem.
What should crypto companies do first?
Public guidance points to stricter identity checks, device-shipping verification, endpoint monitoring, least-privilege access, and separation between engineering access and treasury controls. The FBI specifically warns about U.S.-based intermediaries receiving devices and unauthorized remote-access software. Firms should also screen for sanctions exposure because OFAC has already targeted DPRK IT worker schemes involving crypto addresses.
Disclaimer: This article is for informational purposes only and does not constitute legal, cybersecurity, or investment advice. Cryptocurrency businesses face operational, regulatory, and sanctions-related risks. Companies should conduct independent due diligence and consult qualified legal and security professionals.
Anthony Hill is a seasoned general expert with over 12 years of professional experience. Anthony specializes in content strategy, digital media, and audience engagement, bringing deep industry knowledge and practical insights to every piece of content.With credentials including Professional Journalist Certification and Bachelor's Degree in Communications, Anthony has established a reputation for delivering accurate, well-researched, and actionable information. Anthony's work has been featured in leading general publications and trusted by thousands of readers seeking reliable expertise.Anthony is committed to maintaining the highest standards of accuracy and transparency, ensuring all content is thoroughly fact-checked and based on credible sources and current industry best practices. Connect: Twitter | LinkedIn | Website