📢 Gate广场 #创作者活动第一期# 火热开启,助力 PUMP 公募上线!
Solana 爆火项目 Pump.Fun($PUMP)现已登陆 Gate 平台开启公开发售!
参与 Gate广场创作者活动,释放内容力量,赢取奖励!
📅 活动时间:7月11日 18:00 - 7月15日 22:00(UTC+8)
🎁 活动总奖池:$500 USDT 等值代币奖励
✅ 活动一:创作广场贴文,赢取优质内容奖励
📅 活动时间:2025年7月12日 22:00 - 7月15日 22:00(UTC+8)
📌 参与方式:在 Gate 广场发布与 PUMP 项目相关的原创贴文
内容不少于 100 字
必须带上话题标签: #创作者活动第一期# #PumpFun#
🏆 奖励设置:
一等奖(1名):$100
二等奖(2名):$50
三等奖(10名):$10
📋 评选维度:Gate平台相关性、内容质量、互动量(点赞+评论)等综合指标;参与认购的截图的截图、经验分享优先;
✅ 活动二:发推同步传播,赢传播力奖励
📌 参与方式:在 X(推特)上发布与 PUMP 项目相关内容
内容不少于 100 字
使用标签: #PumpFun # Gate
发布后填写登记表登记回链 👉 https://www.gate.com/questionnaire/6874
🏆 奖励设置:传播影响力前 10 名用户,瓜分 $2
DOJ charges 4 North Koreans in $1M crypto theft from blockchain startup
Four North Korean nationals have been charged in Georgia for wire fraud and money laundering after posing as remote IT workers at US and Serbian blockchain companies and stealing almost $1 million in crypto, prosecutors announced Monday.
According to the US Department of Justice (DOJ), Kim Kwang Jin, Kang Tae Bok, Jong Pong Ju, and Chang Nam Il posed as remote IT developers using fake and stolen identities to conceal their North Korean citizenship.
The group initially operated from the United Arab Emirates in 2019 before securing jobs at an Atlanta-based blockchain startup and a Serbian virtual token company between late 2020 and mid-2021.
Prosecutors said Kim and Jong submitted fraudulent documents, including stolen and fabricated IDs, to secure these positions, a tactic US Attorney Theodore S. Hertzberg called a “unique threat” to businesses hiring remote IT workers.
Related: North Korea targets crypto workers with new info-stealing malware
Four North Koreans steal $915,000 in crypto
Once inside, the defendants used their privileged access to steal substantial sums. In February 2022, Jong siphoned approximately $175,000 in crypto. The following month, Kim exploited the source code of smart contracts to steal an additional $740,000.
The stolen funds were then laundered through mixers and sent to exchange accounts controlled by Kang and Chang, all set up using fraudulent Malaysian IDs, investigators said.
“These schemes target and steal from US companies and are designed to evade sanctions and fund the North Korean regime’s illicit programs, including its weapons programs,” said John A. Eisenberg, assistant attorney general for national security.
The case was part of the DOJ’s DPRK RevGen: Domestic Enabler Initiative, a program launched in 2024 targeting North Korea’s illicit revenue streams and US-based enablers.
Related: North Korean hackers set up 3 shell companies to scam crypto devs
DOJ cracks down on North Korean crypto fraud
In another incident, federal agents also conducted coordinated raids across 16 states, seizing nearly 30 financial accounts, over 20 fraudulent websites, and roughly 200 computers from so-called “laptop farms” that enabled North Korean operatives to appear as though they were working from the US.
Last month, the DOJ filed a civil forfeiture complaint to seize $7.74 million in crypto allegedly earned by North Korean IT workers posing as remote blockchain contractors using fake identities.
Magazine: North Korea crypto hackers tap ChatGPT, Malaysia road money siphoned: Asia Express