The Ketman Project Found Something Venture Capital Missed
In March 2024, a research program funded by the Ethereum Foundation released findings that should have triggered immediate portfolio reviews among institutional crypto investors. The Ketman Project — named after the concept of crypto-Islamic dissimulation — identified 100 North Korean IT workers embedded across 53 active cryptocurrency projects. Not startups that folded. Not abandoned Discord servers. Active platforms handling user funds.
This is not theoretical. This is infrastructure risk that trading systems and compliance officers were not pricing in.
How North Korean Labor Infiltrated Web3
The mechanism is straightforward enough that it should have been obvious. North Korea lacks hard currency and cutting-edge technology. Western crypto firms need developers cheap and without questions asked. The match was predictable.
According to the Ketman Project’s research, DPRK operatives typically:work remotely under false identities, funnel cryptocurrency earnings back to Pyongyang through cryptocurrency mixers and exchange accounts, operate across multiple projects simultaneously to distribute risk, and exploit decentralized finance platforms specifically because they lack human-centric identity verification.
What made this infiltration possible was a regulatory gap that still exists. Most crypto projects conduct background checks through third-party screening services. Those services rely on government databases, sanctions lists, and public records. North Korean workers do not appear in those systems. They appear on the internet as contractors from Vietnam or freelancers from Eastern Europe, complete with fabricated portfolios on GitHub.
The Scale Matters More Than You Think
One hundred workers across fifty-three projects is not a rounding error. It is infrastructure presence.
To contextualize: the 2023 Chainalysis report on sanctions evasion documented approximately 14.5 billion dollars in cryptocurrency moving to sanctioned entities that year. The Ketman Project’s findings suggest that a meaningful portion of the technical capacity enabling that flow was built, maintained, and monitored by DPRK state operatives embedded inside projects that American and European investors funded.
The operational implication is severe. If one DPRK operative maintains code access to a smart contract, that operative can potentially insert backdoors, redirect funds, or exfiltrate private keys. The probability of discovery drops significantly if the operator has months or years of trusted history within the organization.
What does this mean for institutional risk models?
Algorithmic trading systems and quantitative hedge funds have begun incorporating geopolitical risk scoring into their position-sizing models. Systems that managed crypto exposure in Q1 2024 — after the Ketman Project disclosure — had to recalibrate their counterparty risk algorithms. A protocol with embedded DPRK infrastructure carries legal and reputational tail risk that models trained on historical price action alone do not capture.
BlackRock and Fidelity, which launched spot bitcoin ETFs in January 2024, had to address this in their compliance frameworks. Neither firm has publicly disclosed how they weighted nation-state labor infiltration into their due diligence models. But the fact that neither the Ethereum Foundation nor major institutional investors published immediate withdrawal announcements suggests the market absorbed this information without pricing a correction. That asymmetry is worth noting for portfolio construction.
The Compliance Systems Failed Before Ketman Found the Problem
Here is the uncomfortable part: nobody in the crypto industry’s existing compliance infrastructure caught this. Not the exchanges processing transactions. Not the venture capital firms that funded these projects. Not the wallet security firms. The Ethereum Foundation had to pay for a separate investigation to expose what should have been obvious to KYC vendors.
Chainalysis, the firm that crypto exchanges rely on for sanctions screening, did not publish a dedicated DPRK labor infiltration report until after the Ketman Project disclosed its findings. Elliptic, another major blockchain intelligence provider, followed with similar warnings weeks later. The fact that both firms were reactive rather than proactive is a signal about how crypto compliance has been structured: it is built to catch obvious financial flows, not employment networks.
According to Reuters reporting on the Ketman disclosure, multiple projects that were identified removed DPRK-linked developers from their teams within 48 hours of the report’s release. That velocity suggests the developers were not hidden deeply. They were there. The industry simply was not looking.
Why Algorithmic Trading Systems Are Scrambling
Systematic traders use layer-by-layer risk signals. The traditional layers are: price momentum, volatility regime, order book structure, correlation with macro events, and counterparty solvency. Geopolitical risk has historically been a secondary consideration for crypto trading systems because regulatory enforcement was perceived as unpredictable and slow.
The Ketman Project disclosure changed that calculation. If a protocol has embedded nation-state labor, the risk of regulatory enforcement moves from low-probability to high-probability and from slow-moving to immediate. Protocols identified in the report saw outflows. Some saw price pressure in the weeks following disclosure.
Systematic funds that managed crypto allocations had to retrofit their risk models to include a new variable: embedded geopolitical risk. That is not trivial. It means recalibrating correlation matrices and position sizing logic for something that does not have a long historical dataset.
The Counterargument: This Might Overstate the Threat
To be fair, the Ketman Project researchers did not prove that all one hundred workers were actively performing espionage or facilitating sanctions evasion. Some may have been legitimate developers who happened to be North Korean and working remotely for cryptocurrency — which is economically rational behavior for someone in a sanctioned nation with access to internet infrastructure.
The distinction matters legally. Being North Korean and working in crypto is not automatically the same as being an operative of the DPRK state. Some of the identified workers may have been defectors, dissidents, or simply people trying to survive economically under regime constraints. The Ketman Project’s designation of all one hundred as nation-state operatives conflates presence with intent.
However — and this is a significant however — the probability distribution still shifted. Even if only 20 percent of those workers were actively coordinating with state intelligence services, that is still two dozen nation-state operatives embedded in crypto infrastructure. That is enough to enable significant operational damage.
What Happens Next
The immediate aftermath has been bureaucratic. The Ethereum Foundation published recommendations for project screening. Coinbase and other major exchanges tightened their developer onboarding processes. Some projects proactively published statements about their technical team composition.
The longer-term impact depends on enforcement. If the U.S. Treasury or European regulators begin issuing sanctions against projects identified in the Ketman research, the cost of employing DPRK workers rises sharply. If nothing happens — if protocols face no legal consequences — then the incentive for future infiltration actually increases.
One specific data point to monitor: the Office of Foreign Assets Control (OFAC) sanctions list is public and updated regularly. If any of the fifty-three projects identified in the Ketman report appear on OFAC’s SDN list or on the Specially Designated Nationals list in the six months following this writing, that signals regulatory enforcement is moving forward. As of the end of Q1 2024, no major protocols from the Ketman disclosure had been formally sanctioned, which suggests either slow-moving enforcement or deliberate restraint.
Frequently Asked Questions
What is the Ketman Project?
The Ketman Project is a research initiative funded by the Ethereum Foundation that investigates nation-state labor infiltration in cryptocurrency projects. The project published findings in March 2024 identifying 100 North Korean IT workers across 53 active crypto platforms, using advanced threat intelligence and forensic analysis of employment networks and digital signatures.
How did North Korean workers get hired by crypto projects?
DPRK operatives typically applied as remote contractors from false locations (Vietnam, Eastern Europe) and provided fabricated portfolios on platforms like GitHub. Crypto projects often hire remotely without rigorous background verification, making it easy for applicants to misrepresent their nationality and affiliation with state intelligence services.
Could this affect my bitcoin or ethereum holdings?
Not directly. Bitcoin and Ethereum themselves are decentralized protocols not identified in the Ketman findings. Risk applies to specific altcoins and DeFi projects named in the report. If you hold altcoins from those fifty-three projects and they face regulatory sanctions, liquidity and price impact could be severe.
Why didn’t crypto exchanges catch this earlier?
Existing compliance systems like those provided by Chainalysis focus on detecting financial flows and sanctioned entities, not employment networks. North Korean workers operating under false identities do not appear in public databases or government sanctions lists, so traditional KYC screening missed them entirely.
Is the U.S. government investigating the projects named in the report?
The Ketman Project forwarded its findings to relevant authorities, but as of mid-2024, no formal OFAC sanctions had been issued against the fifty-three identified projects. Whether enforcement proceeds depends on whether Treasury determines the projects were knowingly employing DPRK operatives versus being unaware of misrepresented applicant identities.
The Bottom Line
The Ketman Project’s disclosure that fifty-three active cryptocurrency projects employ North Korean operatives is not a price-moving event. It is a risk infrastructure event. It proves that the crypto industry’s compliance ecosystem is reactive, not proactive, and that nation-states have successfully infiltrated decentralized finance at the developer level.
For portfolio managers: this is a tail risk that should appear in your scenario modeling. For traders: mark any protocol identified in the Ketman findings as carrying elevated regulatory risk and price-shock probability. For the industry itself: the absence of immediate enforcement action is not evidence of safety. It is evidence that regulatory capacity is still catching up to the threat.
The specific finding is this: one hundred workers, fifty-three projects, zero confirmed sanctions. That gap is the real story.
Related Reading
The information provided on SmartCapitalLog is for educational and informational purposes only and does not constitute financial, investment, or trading advice. Past performance is not indicative of future results. Always conduct your own research and consult with a qualified financial advisor before making any investment decisions. SmartCapitalLog and its authors are not liable for any financial losses resulting from decisions made based on the content published on this site.






