{"id":757,"date":"2025-07-01T16:44:14","date_gmt":"2025-07-01T16:44:14","guid":{"rendered":"https:\/\/chaotic-bits.com\/?p=757"},"modified":"2025-07-01T16:47:01","modified_gmt":"2025-07-01T16:47:01","slug":"el-departamento-de-justicia-de-ee-uu-doj-realizo-una-gran-operacion-contra-un-esquema-de-trabajadores-de-tecnologia-de-la-informacion-ti-de-corea-del-nortenota-1","status":"publish","type":"post","link":"https:\/\/chaotic-bits.com\/index.php\/2025\/07\/01\/el-departamento-de-justicia-de-ee-uu-doj-realizo-una-gran-operacion-contra-un-esquema-de-trabajadores-de-tecnologia-de-la-informacion-ti-de-corea-del-nortenota-1\/","title":{"rendered":"El Departamento de Justicia de EE.UU. (DoJ) realiz\u00f3 una gran operaci\u00f3n contra un esquema de trabajadores de tecnolog\u00eda de la informaci\u00f3n (TI) de Corea del Norte"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"757\" class=\"elementor elementor-757\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6f1f0f1 elementor-section-full_width elementor-section-height-min-height elementor-section-height-default elementor-section-items-middle wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"6f1f0f1\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bb9d7c9\" data-id=\"bb9d7c9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4083980 elementor-widget elementor-widget-post-info\" data-id=\"4083980\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-53ece0a\" itemprop=\"datePublished\">\n\t\t\t\t\t\t<a href=\"https:\/\/chaotic-bits.com\/index.php\/2025\/07\/01\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>julio 1, 2025<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-deec4d9 elementor-widget elementor-widget-image\" data-id=\"deec4d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/chaotic-bits.com\/wp-content\/uploads\/2025\/04\/seguridad-informa\u0301tica-y-co\u0301mo-implementarla-1024x683.webp\" class=\"attachment-large size-large wp-image-295\" alt=\"\" srcset=\"https:\/\/chaotic-bits.com\/wp-content\/uploads\/2025\/04\/seguridad-informa\u0301tica-y-co\u0301mo-implementarla-1024x683.webp 1024w, https:\/\/chaotic-bits.com\/wp-content\/uploads\/2025\/04\/seguridad-informa\u0301tica-y-co\u0301mo-implementarla-300x200.webp 300w, https:\/\/chaotic-bits.com\/wp-content\/uploads\/2025\/04\/seguridad-informa\u0301tica-y-co\u0301mo-implementarla-768x512.webp 768w, https:\/\/chaotic-bits.com\/wp-content\/uploads\/2025\/04\/seguridad-informa\u0301tica-y-co\u0301mo-implementarla.webp 1339w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d9ac88 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"9d9ac88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">El Departamento de Justicia de EE.UU. (DoJ) realiz\u00f3 una gran operaci\u00f3n contra un esquema de trabajadores de tecnolog\u00eda de la informaci\u00f3n (TI) de Corea del Norte<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b532689 elementor-widget elementor-widget-text-editor\" data-id=\"2b532689\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p data-start=\"121\" data-end=\"311\">La investigaci\u00f3n result\u00f3 en:<\/p>\n<ul data-start=\"313\" data-end=\"507\">\n<li data-start=\"313\" data-end=\"363\">\n<p data-start=\"315\" data-end=\"363\">El <strong data-start=\"318\" data-end=\"360\">arresto de un ciudadano estadounidense<\/strong>,<\/p>\n<\/li>\n<li data-start=\"364\" data-end=\"409\">\n<p data-start=\"366\" data-end=\"409\">El <strong data-start=\"369\" data-end=\"406\">bloqueo de 29 cuentas financieras<\/strong>,<\/p>\n<\/li>\n<li data-start=\"410\" data-end=\"460\">\n<p data-start=\"412\" data-end=\"460\">El <strong data-start=\"415\" data-end=\"455\">cierre de 21 sitios web fraudulentos<\/strong>, y<\/p>\n<\/li>\n<li data-start=\"461\" data-end=\"507\">\n<p data-start=\"463\" data-end=\"507\">La <strong data-start=\"466\" data-end=\"506\">incautaci\u00f3n de casi 200 computadoras<\/strong>.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"509\" data-end=\"727\">Estos trabajadores norcoreanos, con ayuda de personas en EE.UU., China, Emiratos \u00c1rabes y Taiw\u00e1n, consiguieron empleos remotos en m\u00e1s de 100 empresas estadounidenses usando identidades robadas o falsas. De esta manera:<\/p>\n<ul data-start=\"729\" data-end=\"980\">\n<li data-start=\"729\" data-end=\"771\">\n<p data-start=\"731\" data-end=\"771\">Recib\u00edan pagos legales por su trabajo,<\/p>\n<\/li>\n<li data-start=\"772\" data-end=\"843\">\n<p data-start=\"774\" data-end=\"843\">Acced\u00edan a informaci\u00f3n confidencial, incluyendo tecnolog\u00eda militar,<\/p>\n<\/li>\n<li data-start=\"844\" data-end=\"980\">\n<p data-start=\"846\" data-end=\"980\">Y, en algunos casos, <strong data-start=\"867\" data-end=\"919\">robaron grandes sumas de dinero en criptomonedas<\/strong> (como los $900.000 de una empresa de blockchain en Atlanta).<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"982\" data-end=\"1326\">El detenido principal, <strong data-start=\"1005\" data-end=\"1030\">Zhenxing \u00abDanny\u00bb Wang<\/strong>, habr\u00eda ganado m\u00e1s de <strong data-start=\"1053\" data-end=\"1068\">$5 millones<\/strong> ayudando a los trabajadores norcoreanos. Junto a \u00e9l, hay ocho c\u00f3mplices m\u00e1s (seis chinos y dos taiwaneses) que participaron del fraude. Usaban empresas falsas para canalizar los pagos y conectaban remotamente a los trabajadores a trav\u00e9s de dispositivos KVM.<\/p>\n<p data-start=\"1328\" data-end=\"1507\">Por otro lado, cuatro norcoreanos fueron acusados de fraude y lavado de dinero por robar criptoactivos y transferirlos usando identidades falsas y servicios como <strong data-start=\"1490\" data-end=\"1506\">Tornado Cash<\/strong>.<\/p>\n<p data-start=\"1509\" data-end=\"1778\">Las autoridades advierten que estas operaciones no solo generan ingresos para el r\u00e9gimen norcoreano, sino que <strong data-start=\"1619\" data-end=\"1660\">ponen en riesgo la seguridad nacional<\/strong>, ya que los trabajadores infiltrados pueden robar informaci\u00f3n sensible, fondos, e incluso extorsionar a las empresas.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05c63b8 elementor-widget elementor-widget-wpr-post-navigation\" data-id=\"05c63b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-post-navigation.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"wpr-post-navigation-wrap elementor-clearfix wpr-post-nav-static-wrap\"><div class=\"wpr-post-nav-prev wpr-post-navigation wpr-post-nav-static\"><a href=\"https:\/\/chaotic-bits.com\/index.php\/2025\/07\/01\/u-s-arrests-facilitator-in-north-korean-it-worker-scheme-seizes-29-domains-and-raids-21-laptop-farms\/\" class=\"elementor-clearfix\"><div class=\"wpr-posts-navigation-svg-wrapper\"><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\" viewBox=\"0 0 303.3 512\" style=\"enable-background:new 0 0 303.3 512;\" xml:space=\"preserve\"><g><polygon class=\"st0\" points=\"94.7,256 303.3,464.6 256,512 47.3,303.4 0,256 47.3,208.6 256,0 303.3,47.4 \"\/><\/g><\/svg><\/div><div class=\"wpr-post-nav-labels\"><span>Anterior<\/span><\/div><\/a><\/div><div class=\"wpr-post-nav-next wpr-post-navigation wpr-post-nav-static\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>La investigaci\u00f3n result\u00f3 en: El arresto de un ciudadano estadounidense, El bloqueo de 29 cuentas financieras, El cierre de 21 sitios web fraudulentos, y La incautaci\u00f3n de casi 200 computadoras. Estos trabajadores norcoreanos, con ayuda de personas en EE.UU., China, Emiratos \u00c1rabes y Taiw\u00e1n, consiguieron empleos remotos en m\u00e1s de 100 empresas estadounidenses usando identidades robadas o falsas. De esta manera: Recib\u00edan pagos legales por su trabajo, Acced\u00edan a informaci\u00f3n confidencial, incluyendo tecnolog\u00eda militar, Y, en algunos casos, robaron grandes sumas de dinero en criptomonedas (como los $900.000 de una empresa de blockchain en Atlanta). El detenido principal, Zhenxing \u00abDanny\u00bb Wang, habr\u00eda ganado m\u00e1s de $5 millones ayudando a los trabajadores norcoreanos. Junto a \u00e9l, hay ocho c\u00f3mplices m\u00e1s (seis chinos y dos taiwaneses) que participaron del fraude. Usaban empresas falsas para canalizar los pagos y conectaban remotamente a los trabajadores a trav\u00e9s de dispositivos KVM. Por otro lado, cuatro norcoreanos fueron acusados de fraude y lavado de dinero por robar criptoactivos y transferirlos usando identidades falsas y servicios como Tornado Cash. Las autoridades advierten que estas operaciones no solo generan ingresos para el r\u00e9gimen norcoreano, sino que ponen en riesgo la seguridad nacional, ya que los trabajadores infiltrados pueden robar informaci\u00f3n sensible, fondos, e incluso extorsionar a las empresas. Anterior<\/p>\n","protected":false},"author":1,"featured_media":295,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[6],"tags":[],"class_list":["post-757","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-es"],"_links":{"self":[{"href":"https:\/\/chaotic-bits.com\/index.php\/wp-json\/wp\/v2\/posts\/757","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chaotic-bits.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/chaotic-bits.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/chaotic-bits.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/chaotic-bits.com\/index.php\/wp-json\/wp\/v2\/comments?post=757"}],"version-history":[{"count":5,"href":"https:\/\/chaotic-bits.com\/index.php\/wp-json\/wp\/v2\/posts\/757\/revisions"}],"predecessor-version":[{"id":762,"href":"https:\/\/chaotic-bits.com\/index.php\/wp-json\/wp\/v2\/posts\/757\/revisions\/762"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/chaotic-bits.com\/index.php\/wp-json\/wp\/v2\/media\/295"}],"wp:attachment":[{"href":"https:\/\/chaotic-bits.com\/index.php\/wp-json\/wp\/v2\/media?parent=757"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/chaotic-bits.com\/index.php\/wp-json\/wp\/v2\/categories?post=757"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/chaotic-bits.com\/index.php\/wp-json\/wp\/v2\/tags?post=757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}