📢 Gate廣場 #创作者活动第一期# 火熱開啓,助力 PUMP 公募上線!
Solana 爆火項目 Pump.Fun($PUMP)現已登入 Gate 平台開啓公開發售!
參與 Gate廣場創作者活動,釋放內容力量,贏取獎勵!
📅 活動時間:7月11日 18:00 - 7月15日 22:00(UTC+8)
🎁 活動總獎池:$500 USDT 等值代幣獎勵
✅ 活動一:創作廣場貼文,贏取優質內容獎勵
📅 活動時間:2025年7月12日 22:00 - 7月15日 22:00(UTC+8)
📌 參與方式:在 Gate 廣場發布與 PUMP 項目相關的原創貼文
內容不少於 100 字
必須帶上話題標籤: #创作者活动第一期# #PumpFun#
🏆 獎勵設置:
一等獎(1名):$100
二等獎(2名):$50
三等獎(10名):$10
📋 評選維度:Gate平台相關性、內容質量、互動量(點讚+評論)等綜合指標;參與認購的截圖的截圖、經驗分享優先;
✅ 活動二:發推同步傳播,贏傳播力獎勵
📌 參與方式:在 X(推特)上發布與 PUMP 項目相關內容
內容不少於 100 字
使用標籤: #PumpFun # Gate
發布後填寫登記表登記回鏈 👉 https://www.gate.com/questionnaire/6874
🏆 獎勵設置:傳播影響力前 10 名用戶,瓜分 $2
DOJ charges 4 North Koreans in $1M crypto theft from blockchain startup
Four North Korean nationals have been charged in Georgia for wire fraud and money laundering after posing as remote IT workers at US and Serbian blockchain companies and stealing almost $1 million in crypto, prosecutors announced Monday.
According to the US Department of Justice (DOJ), Kim Kwang Jin, Kang Tae Bok, Jong Pong Ju, and Chang Nam Il posed as remote IT developers using fake and stolen identities to conceal their North Korean citizenship.
The group initially operated from the United Arab Emirates in 2019 before securing jobs at an Atlanta-based blockchain startup and a Serbian virtual token company between late 2020 and mid-2021.
Prosecutors said Kim and Jong submitted fraudulent documents, including stolen and fabricated IDs, to secure these positions, a tactic US Attorney Theodore S. Hertzberg called a “unique threat” to businesses hiring remote IT workers.
Related: North Korea targets crypto workers with new info-stealing malware
Four North Koreans steal $915,000 in crypto
Once inside, the defendants used their privileged access to steal substantial sums. In February 2022, Jong siphoned approximately $175,000 in crypto. The following month, Kim exploited the source code of smart contracts to steal an additional $740,000.
The stolen funds were then laundered through mixers and sent to exchange accounts controlled by Kang and Chang, all set up using fraudulent Malaysian IDs, investigators said.
“These schemes target and steal from US companies and are designed to evade sanctions and fund the North Korean regime’s illicit programs, including its weapons programs,” said John A. Eisenberg, assistant attorney general for national security.
The case was part of the DOJ’s DPRK RevGen: Domestic Enabler Initiative, a program launched in 2024 targeting North Korea’s illicit revenue streams and US-based enablers.
Related: North Korean hackers set up 3 shell companies to scam crypto devs
DOJ cracks down on North Korean crypto fraud
In another incident, federal agents also conducted coordinated raids across 16 states, seizing nearly 30 financial accounts, over 20 fraudulent websites, and roughly 200 computers from so-called “laptop farms” that enabled North Korean operatives to appear as though they were working from the US.
Last month, the DOJ filed a civil forfeiture complaint to seize $7.74 million in crypto allegedly earned by North Korean IT workers posing as remote blockchain contractors using fake identities.
Magazine: North Korea crypto hackers tap ChatGPT, Malaysia road money siphoned: Asia Express