Ethereum Foundation Project Exposes 100 North Korean Crypto Workers

The Ketman Project, backed by Ethereum Foundation funding, has identified 100 DPRK IT workers and flagged 53 cryptocurrency projects employing North Korean operatives.

Ethereum Foundation Project Exposes 100 North Korean Crypto Workers

The cryptocurrency industry faces an ongoing challenge from state-sponsored actors seeking to exploit blockchain technology for financial gain and sanctions evasion. A significant breakthrough in identifying and exposing these activities has come from an unexpected source: the Ketman Project, an Ethereum Foundation-funded initiative that has successfully identified approximately 100 North Korean IT workers embedded within cryptocurrency projects and alerted 53 organizations about the presence of Democratic People's Republic of Korea (DPRK) operatives in their ranks.

This discovery represents a substantial escalation in transparency efforts within the crypto ecosystem and demonstrates how blockchain communities can mobilize resources to counter state-level threats. The project's findings underscore the complex security challenges facing the decentralized finance space and highlight the critical importance of due diligence when vetting team members and contractors.

The Ketman Project: A Novel Approach to Identifying State Actors

The Ketman Project represents an innovative application of Ethereum Foundation resources toward a pressing security matter within the broader cryptocurrency landscape. Named after a concept from author Czesław Miłosz describing the art of concealment under oppressive regimes, the project specifically focuses on identifying operatives working for the North Korean government who have infiltrated technology companies and cryptocurrency ventures.

The initiative combines open-source intelligence gathering, blockchain analysis, and human intelligence to construct profiles of suspected DPRK workers. Unlike traditional cybersecurity firms that operate behind closed doors, the Ketman Project operates with transparency and community collaboration, releasing findings to affected organizations and the public. This approach aligns with broader Ethereum community values regarding decentralization and information accessibility.

The Ethereum Foundation's decision to fund this project reflects growing institutional recognition that state-sponsored threats pose genuine risks to cryptocurrency infrastructure and the broader digital economy. Rather than viewing such threats as purely a government matter, the crypto community is taking proactive steps to identify and mitigate these risks independently.

Understanding DPRK's Crypto Activities and Motivations

North Korea's interest in cryptocurrency extends beyond simple criminal enterprise. The regime faces severe international sanctions that restrict its access to traditional financial systems, making digital assets an attractive alternative for moving value across borders and converting sanctioned assets into usable capital. Cryptocurrency's pseudonymous nature and lack of centralized control make it particularly appealing for circumventing financial restrictions.

The DPRK has demonstrated considerable sophistication in its approach to cryptocurrency operations:

  • Talent Acquisition: The regime actively recruits IT professionals and offers them employment opportunities at competitive salaries, often disguising their role as work for legitimate technology companies or startups
  • Social Engineering: DPRK operatives frequently use false identities, stolen credentials, and elaborate backstories to gain employment at cryptocurrency projects and exchanges
  • Theft Operations: Once embedded, these workers facilitate theft of digital assets, market manipulation, and creation of backdoors for future attacks
  • Infrastructure Development: The regime invests in developing domestic cryptocurrency mining operations and blockchain research capabilities
  • Sanctions Evasion: Cryptocurrency facilitates the movement of funds across borders while avoiding traditional banking surveillance and sanctions enforcement

Estimates suggest that North Korea has stolen billions of dollars in cryptocurrency through various hacks and scams, making this a substantial revenue stream for the isolated regime. The identification of 100 active operatives suggests the scale of this infiltration effort is far larger than previously recognized by most of the industry.

The Alert to 53 Cryptocurrency Projects: Implications and Responses

The Ketman Project's decision to alert 53 specific cryptocurrency projects about the presence of suspected DPRK operatives on their teams or among their contractors represents a direct intervention in the operations of multiple companies. This action carries significant implications for workplace practices, security protocols, and international cooperation within the crypto industry.

Projects receiving these alerts face difficult decisions regarding investigation, termination of suspected operatives, and forensic analysis of potential damage. Some considerations include:

Investigation Burden: Verifying the identity and intentions of individuals identified by external researchers requires substantial resources and expertise. Companies must balance thoroughness with operational continuity.

Legal Exposure: Organizations terminating individuals based on nationality or suspected government affiliation face potential legal challenges, making verification and documentation critical.

Forensic Requirements: Projects must investigate what access these individuals had, what systems they touched, and whether they facilitated theft, altered code, or created vulnerabilities that persist after their departure.

Reputational Impact: Public disclosure of infiltration can damage investor confidence and user trust, even when the organization is itself a victim rather than a collaborator.

Broader Implications for Crypto Security and Due Diligence

The Ketman Project's findings highlight critical gaps in hiring and security practices throughout the cryptocurrency industry. Many crypto projects, particularly those operating with lean teams and rapid development cycles, may not conduct thorough background verification of employees and contractors. This creates opportunities for infiltration by sophisticated state-sponsored actors.

The revelations should prompt comprehensive reassessment of security practices within the crypto ecosystem. Organizations should implement enhanced due diligence procedures, including verification of employment history, cross-referencing of educational credentials, and ongoing monitoring of team member behavior and system access patterns.

Blockchain analytics firms and security companies are likely to experience increased demand for verification services as projects seek to audit their existing teams and establish stronger vetting procedures for future hires. This could create a new market segment focused specifically on identifying fraudulent identities and state-sponsored infiltration.

The Future of Countering State-Sponsored Threats in Crypto

The Ketman Project's success demonstrates that cryptocurrency communities can effectively mobilize resources to counter state-level threats without relying solely on government agencies. This distributed approach to security intelligence gathering may represent a model for future initiatives addressing other categories of organized threats.

However, the project also raises questions about the appropriate role of community-led security initiatives, the reliability of open-source intelligence gathering, and the potential for false positives. Ongoing dialogue between the crypto industry, security professionals, and law enforcement will be essential for establishing best practices and preventing both infiltration and wrongful targeting.

The identification of 100 DPRK workers and the alerting of 53 cryptocurrency projects mark a significant moment in the crypto industry's maturation as a sector capable of addressing sophisticated geopolitical threats. As the ecosystem continues to expand and becomes increasingly important to global finance, such proactive security measures will likely become standard practice rather than exceptional efforts.

This article was last reviewed and updated in May 2026.