
Tether (USDT), as a leading stablecoin in the cryptocurrency market, has become an essential cornerstone of the digital asset ecosystem due to its price stability and high liquidity. USDT provides a value-stable medium of exchange for the crypto market through its 1:1 pegging mechanism with the US dollar. It is widely used globally for digital asset trading, cross-border payments, and value storage. However, this widespread adoption and convenience also make it a preferred tool for illegal activities.
In recent years, the misuse of USDT in areas such as sanctions evasion, money laundering, and cybercrime has become increasingly severe. Criminals exploit USDT’s anonymity, cross-border liquidity, and rapid transfer features to build complex illegal financial networks. Especially under the backdrop of international sanctions, certain countries and organizations use USDT as a key means to bypass traditional financial regulations. This not only threatens global financial security but also poses significant challenges to anti-money laundering and counter-terrorism financing efforts.
Facing strict international sanctions, North Korea has increasingly turned to cryptocurrencies like USDT to circumvent financial restrictions and fund its weapons development programs. The regime leverages the decentralized nature of digital assets and their cross-border transfer ease to successfully evade traditional financial oversight and tracking.
According to UN Security Council reports, funds obtained by North Korea through cryptocurrency-related activities have become a major source of financing for its nuclear and missile programs. Due to its stability and broad acceptance, USDT has become North Korea’s preferred digital asset tool. By converting stolen or illegally obtained cryptocurrencies into USDT, North Korea can more easily store value and transfer funds across borders, while reducing the risk of losses caused by cryptocurrency price volatility.
1. Hacking and Cryptocurrency Theft
North Korea’s advanced persistent threat group APT38 (also known as Lazarus Group) has been linked by international security agencies to multiple large-scale cryptocurrency theft incidents. These hackers employ highly sophisticated cyberattack techniques targeting crypto exchanges, blockchain projects, and financial institutions. After successful attacks, stolen funds are usually quickly converted into USDT to facilitate subsequent money laundering and transfer operations.
For example, in several recent hacking incidents involving exchanges, attackers have stolen cryptocurrencies like Bitcoin and Ethereum, then transferred the funds through multiple intermediary wallets into USDT. This conversion not only locks in the value but also leverages USDT’s high liquidity across various platforms to speed up laundering and cash-out processes.
2. IT Worker Penetration Programs
North Korea has implemented carefully planned IT worker infiltration schemes, deploying trained technical personnel to obtain remote work opportunities at global blockchain and fintech companies using forged identities. These workers are usually highly skilled and can pass rigorous technical interviews and background checks.
Their salaries are typically paid in USDT, providing North Korea with a steady source of foreign exchange income. It is estimated that thousands of North Korean IT workers are distributed worldwide, generating hundreds of millions of dollars annually for the regime. These funds are funneled back to North Korea through complex money laundering networks to support weapons development and regime stability.
Moreover, these infiltrated IT workers might exploit their access to steal sensitive company information, customer data, or conduct internal sabotage, posing serious security risks to their employers.
3. Use of Peer-to-Peer Platforms and Mixers
North Korea uses various peer-to-peer trading platforms, mixers, and cross-chain bridges to build complex money laundering networks. These technologies help effectively conceal the true origin and flow of stolen or illegally obtained USDT.
Mixer services blend funds from multiple users, breaking the transaction traceability on the blockchain. Cross-chain bridges enable transfers between different blockchain networks, further complicating tracking efforts. North Korea often combines these techniques—using multiple transfers, cross-chain movements, and mixing operations—to make law enforcement difficult to trace the ultimate destination of the funds.
The stability and high liquidity of USDT make it an ideal tool for global money laundering operations. Compared with more volatile cryptocurrencies like Bitcoin, USDT can maintain the value of funds during laundering, reducing financial risks for criminals. Its widespread acceptance on various trading platforms and P2P markets provides ample liquidity support for laundering activities.
Money laundering networks typically consist of multiple layers, including placement, layering, and integration stages. At each stage, criminals employ different techniques to obscure the origin and destination of the funds. USDT’s technical features play a vital role across all these stages.
Mixer Services and Fund Dispersal
Mixer services are among the most commonly used tools in laundering networks. They blend USDT from various sources and then send the mixed funds to new addresses as requested, breaking transaction traceability. These services usually charge a fee, but for criminals seeking to hide their origins, it’s a necessary cost.
Fund dispersers break large USDT transactions into numerous smaller transactions across hundreds or thousands of intermediary wallets. This makes the fund flow highly complex, making it difficult even for advanced blockchain analysis tools to trace the final destination. Some sophisticated laundering networks combine timing delay techniques, dispersing funds in batches at different times to further increase tracing difficulty.
Abuse of Cross-Chain Bridges
Cross-chain bridges allow users to transfer digital assets between different blockchain networks. Criminals exploit this by moving USDT back and forth across Ethereum, TRON, Binance Smart Chain, and other networks. Each cross-chain transfer creates new transaction records and addresses, increasing the difficulty of tracing.
For example, a money launderer might first receive stolen USDT on the Ethereum network, then transfer it via cross-chain bridge to TRON, then to Binance Smart Chain, and finally back to a new Ethereum address. These cross-chain movements not only complicate tracking but also exploit the regulatory and enforcement gaps between different blockchain ecosystems.
Peer-to-Peer Exchanges
P2P exchanges allow users to trade directly without intermediaries. This facilitates laundering because parties’ identities often do not require rigorous verification.
Using these platforms, launderers can conduct self-trades or transact with other members of laundering networks, converting illicit USDT into other cryptocurrencies or fiat currencies. Some P2P platforms also offer escrow and privacy features, further reducing traceability. Their decentralized nature makes regulation and oversight challenging for authorities.
North Korea’s IT worker infiltration program is a carefully orchestrated, long-term strategic operation. It provides the regime with steady foreign exchange income and supports intelligence gathering and cyberattack activities. These workers are professionally trained, possess advanced technical skills and language proficiency, enabling them to secure jobs at global tech companies.
1. Elaborate Forged Identities
North Korean IT workers use highly realistic fake identities, including passports, educational certificates, and work experience documents. These are often fabricated through professional forgery networks, capable of passing standard background checks. They also study target countries’ cultures and behaviors to avoid detection during interviews and daily work.
They often claim origins from third countries such as China, Japan, or Southeast Asia to reduce suspicion. Some even use genuine third-country passports obtained through illegal channels. To handle video interviews, they might employ deepfake technology or hire foreign agents to attend on their behalf.
2. Remote Work Opportunities
The rise of global remote work trends provides excellent opportunities for North Korean IT workers. They focus on high-paying roles in blockchain development, fintech, cybersecurity, and related fields. Remote work allows them to avoid on-site identity verification while maintaining contact with North Korea.
Once employed, these workers often demonstrate high competence and dedication to sustain long-term employment. They might access sensitive systems, client data, and trade secrets. In some cases, they exploit their permissions for data theft, implant backdoors, or prepare for future cyberattacks.
3. Complex Income Laundering Networks
North Korean IT workers are typically paid in USDT into cryptocurrency wallets. These funds are later funneled through complex money laundering networks back into North Korea. The process usually involves multiple steps: first, hiding the source with mixers; then transferring through multiple intermediary wallets; finally, converting to fiat or other assets via P2P or underground banks.
It is estimated that these workers generate billions annually for the regime. These funds support weapons development, sustain regime operations, and enrich elites. Importantly, this income source remains relatively stable and difficult to disrupt via sanctions, making it a significant method for North Korea to evade international sanctions.
The U.S. Department of Justice (DOJ) has taken an active stance against illegal activities involving USDT. Through civil forfeiture, criminal charges, and international cooperation, DOJ has successfully seized and confiscated large amounts of USDT linked to criminal activities. These law enforcement actions not only disrupt criminal networks but also send a strong deterrent message to potential offenders.
Civil Forfeiture Proceedings
DOJ frequently uses civil forfeiture procedures to seize USDT related to North Korean money laundering, cybercrime, and other illegal activities. Civil forfeiture’s advantage lies in its ability to forgo criminal charges against individuals, focusing instead on assets associated with crime. This approach is especially effective in transnational cases where suspects may be located abroad, making criminal prosecution difficult.
In civil forfeiture proceedings, DOJ submits detailed evidence to courts linking specific USDT addresses or wallets to illegal activities. Once courts approve forfeiture orders, these assets are frozen and ultimately confiscated. The proceeds are usually used to compensate victims or fund the government treasury.
Close Cooperation with Private Sector
DOJ collaborates with Tether and major crypto exchanges to quickly freeze and recover stolen or illicit USDT. When identifying USDT addresses involved in criminal activity, DOJ can request Tether to blacklist those addresses, preventing further transfers.
Tether has actively cooperated, freezing assets worth hundreds of millions of dollars linked to criminal cases. This public-private partnership significantly enhances law enforcement efficiency, shortening the time from discovery to asset freeze. Major exchanges also cooperate, providing transaction records and user info.
Advanced Blockchain Tracking Technologies
DOJ employs sophisticated digital forensics and blockchain analysis tools to trace USDT transactions. These technologies analyze vast amounts of on-chain data to identify suspicious patterns and flows. Using machine learning and AI algorithms, analysis tools automatically flag transactions related to known criminal addresses, greatly improving investigation speed.
Additionally, DOJ partners with blockchain analysis firms like Chainalysis and Elliptic, utilizing their specialized tools and databases to track complex laundering networks. Even when criminals use mixers, cross-chain bridges, and other obfuscation techniques, these tools can analyze transaction patterns and temporal data to trace funds.
Although Bitcoin was the first and most well-known cryptocurrency and was once the primary tool for cybercrime, in recent years, USDT has surpassed Bitcoin in criminal activity usage. This shift reflects criminals’ rational choice of tools and increased risk management awareness.
1. Price Stability for Risk Control
USDT’s value is pegged 1:1 to the US dollar, meaning criminals do not need to worry about drastic asset value fluctuations. In contrast, Bitcoin’s price can fluctuate significantly in a short period, posing additional financial risks. For example, a criminal holding Bitcoin might suffer major losses if the price drops before cashing out.
This price stability is especially important for long-term holdings or complex laundering processes. Funds may need to transfer across multiple wallets and platforms over days or weeks. Using USDT ensures the value remains stable throughout the process.
2. Superior Liquidity and Widespread Acceptance
USDT is one of the most traded cryptocurrencies worldwide, accepted on nearly all major and minor exchanges. Its high liquidity enables criminals to quickly convert USDT into other cryptocurrencies or fiat currencies without impacting prices or attracting attention due to low liquidity.
In P2P markets, USDT is also a preferred medium of exchange. Criminals can easily find counterparts willing to trade USDT for other assets, goods, or services. This widespread acceptance greatly reduces difficulties in fund transfer and cashing out.
3. Relative Anonymity and Privacy
Though USDT transaction records are publicly visible on the blockchain, criminals can effectively hide transaction participants and sources using mixers, multiple wallets, and P2P platforms. Unlike traditional banking systems, USDT transactions do not require detailed personal info, providing a degree of anonymity for criminal activities.
Furthermore, USDT is issued on multiple blockchain networks (Ethereum, TRON, Binance Smart Chain, etc.), facilitating cross-chain transfers. Criminals exploit regulatory discrepancies and enforcement gaps between different blockchains to further complicate tracking efforts.
USDT is not only used for high-level cybercrimes and sanctions evasion but also extensively in various scams and political corruption cases. Its convenience, anonymity, and cross-border transfer capabilities make it an ideal tool for scammers and corrupt officials to move illegal funds.
Romance Scams and Pig-butchering
Romance scams involve criminals deceiving victims into believing false emotional relationships to extract money. Perpetrators contact victims via social media, dating apps, etc., building trust over time. After gaining trust, they request USDT transfers under various pretexts—investment opportunities, emergencies, business needs, etc.
This type of scam often crosses borders, with perpetrators abroad exploiting USDT’s cross-border transfer convenience. Due to USDT’s irreversibility, once victims transfer funds, recovery is nearly impossible. Recently, such scams have led to losses of millions of dollars per victim.
Fake Investments and Ponzi Schemes
Fake investment schemes promise high returns to attract USDT investments. These may imitate crypto mining, quantitative trading, DeFi projects, etc. Perpetrators use early investors’ funds to pay later investors, creating a false appearance of profitability and attracting more participants.
Using USDT for such scams offers multiple advantages: first, the regulatory ambiguity of crypto investments in many regions; second, USDT’s cross-border liquidity allowing easy fund transfers; third, victims’ general lack of crypto knowledge, making them more susceptible to high-return promises.
Political Corruption and Bribery
In some countries, corrupt officials use USDT to hide embezzled funds and bribe money. Compared to cash or bank transfers, USDT offers higher concealment and convenience. Officials can convert illegal gains into USDT, store in digital wallets, and avoid detection by traditional financial regulators.
USDT also facilitates cross-border bribery. Bribe payers transfer USDT to foreign recipients, bypassing cumbersome procedures and regulatory scrutiny. Its concealment makes anti-corruption investigations more difficult. Some political donations and campaign funds are also transferred via USDT to evade election finance regulations.
The development of artificial intelligence and deepfake technologies introduces new dimensions to crypto scams. These tools make scams more realistic and harder to detect, significantly increasing success rates and harm. Law enforcement and security experts face unprecedented challenges.
1. Deepfake Videos in Identity Fraud
Deepfake technology can generate highly realistic fake videos and audio. Scammers use this to impersonate job candidates in remote interviews or corporate executives in negotiations. For example, North Korean IT workers might produce deepfake videos matching target identities to pass interview screenings and secure jobs.
In more sophisticated cases, criminals may use deepfakes to impersonate CEOs or senior executives via video calls, requesting financial transfers USDT. These videos and audios are so convincing that victims find it hard to recognize them as scams. Such frauds, known as “CEO fraud” or “business email compromise,” have caused billions in losses.
2. Automated Phishing and Social Engineering Attacks
AI tools can automatically generate highly personalized phishing emails and fake websites. By analyzing targets’ social media, work info, and interests, these tools craft tailored scam content. Compared to traditional mass phishing, AI-generated messages are more realistic and harder to detect.
For example, AI can analyze a crypto investor’s social media activity, understand their investment preferences and risk appetite, then produce fake promotional emails for targeted investment schemes. This high level of personalization greatly boosts success rates.
3. New Challenges in Scam Detection and Prevention
The use of AI complicates traditional scam detection methods. Deepfake videos can pass basic authenticity checks, and AI-generated phishing content can evade spam filters. This requires security experts to develop advanced detection tools, including AI-based anti-fraud systems.
Law enforcement faces new hurdles as well. Investigating cases involves verifying the authenticity of videos, audios, and other evidence, requiring specialized analysis. Criminals may also use AI-generated fake identities and backgrounds, making tracking and identification more difficult.
Given the increasing complexity of cryptocurrency crimes, the efforts of individual countries or agencies are insufficient. International cooperation and public-private collaboration are crucial. By sharing intelligence, coordinating law enforcement actions, and leveraging technology, the global community is building more effective anti-crypto crime networks.
Rapid Response Mechanisms for Freezing Illicit Assets
Tether has established a rapid response system with global law enforcement, capable of swiftly freezing involved USDT addresses upon receiving legitimate requests. This cooperation significantly shortens the time from crime discovery to asset freezing, effectively preventing criminals from transferring stolen funds. To date, Tether has frozen over $1 billion worth of involved USDT.
Other major crypto exchanges have built similar cooperation mechanisms, including KYC (Know Your Customer), AML (Anti-Money Laundering) procedures, monitoring suspicious transactions, and reporting abnormal activities to authorities. This public-private partnership forms a vital foundation for combating crypto crimes.
Cross-border Law Enforcement Coordination and Intelligence Sharing
Governments worldwide enhance cooperation through organizations like INTERPOL and FATF, sharing intelligence, coordinating investigations, and extraditing suspects. For example, the US, South Korea, and Japan have established close cooperation in fighting North Korean crypto crimes.
International cooperation also involves standardizing regulations. FATF’s crypto regulatory guidelines have been adopted by many countries, providing a basis for global regulatory coordination. These guidelines require crypto service providers to implement strict KYC and transaction monitoring procedures.
Public Education and Awareness Campaigns
Educating the public on recognizing and preventing crypto scams is vital. Governments, law enforcement, and industry groups conduct widespread awareness campaigns, including alerts, educational videos, and seminars. These efforts help people understand common scam tactics, identify suspicious activities, and protect their digital assets.
Crypto exchanges and wallet providers also offer security education, warning users of common scams. Some platforms mandate basic security training before new users start trading.
As the world’s largest stablecoin, USDT plays an irreplaceable role in the crypto market. It provides a stable medium for digital asset trading and promotes the growth and maturity of the crypto industry. However, these very features—price stability, high liquidity, cross-border convenience—also make USDT an ideal tool for criminal activities.
The widespread misuse of USDT in sanctions evasion, money laundering, scams, and corruption highlights the urgent need to establish comprehensive regulatory frameworks. Effective regulation must balance innovation and risk prevention. Overly strict rules might stifle technological progress and market development, while lax oversight could enable crime.
International cooperation is key to countering transnational crypto crimes. Due to the borderless and decentralized nature of cryptocurrencies, unilateral regulation often falls short. Only through coordinated international standards, law enforcement partnership, and industry responsibility can effective fight against crypto crime be achieved. The crypto industry must also take social responsibility, cooperate with authorities, and strengthen internal compliance.
Technological advances are a double-edged sword. While AI and deepfake tech provide new tools for criminals, they also enable the development of more sophisticated detection and prevention systems. Blockchain analysis tools have made tracking crypto transactions easier, offering strong support to law enforcement.
Looking ahead, with improved regulatory frameworks, stronger international cooperation, and advancing technologies, combating USDT-related crimes will become more effective. Public awareness will also reduce scam success rates. Nonetheless, this remains a long-term effort requiring joint efforts from governments, industry, and the public. Only through multi-party collaboration can we enjoy the benefits of crypto while effectively mitigating its misuse for crime.
USDT’s high liquidity, widespread cross-chain deployment, large trading volume, and traceability challenges, coupled with price stability, make it a useful tool for bypassing sanctions.
Cryptocurrencies feature fast cross-border transfers, difficulty in tracing transaction histories, and decentralization, which can be exploited to evade financial regulation, conceal sources of funds, and facilitate illegal transfers. Authorities have strengthened regulations to address these challenges.
Through identity verification, transaction monitoring, AML compliance, and freezing suspicious accounts, along with alert systems, blockchain analysis, and cooperation with law enforcement, to prevent misuse.











