Eight arrests made in Korean KRW70 billion igaming operation
Police in South Korea have arrested eight members of a criminal group accused of operating illegal igaming platforms that processed about KRW70 billion (US$48 million)1 KRW = 0.0007 USD
2026-03-09Powered by CMG CurrenShift in wagers, according to Korea JoongAng Daily.
The Ulsan Metropolitan Police Agency arrested the people, including the alleged ringleader, mid-level managers, and customer service staff. Seven of those arrested were detained on charges related to operating illegal gambling websites.
Authorities say the group ran two gambling platforms, including one called Top Cafe, between January 2020 and this February. Investigators say the sites attracted more than 1,000 users.
According to police, the operation functioned like a company, with members assigned to roles including site management, promotion, payment processing, money laundering, and customer service.
The group allegedly recruited agents across several regions, including Gyeonggi Province, to promote the sites and even installed gambling software in adult-only internet cafes.
Users reportedly accessed the platforms through websites disguised as computer game portals. After depositing money into designated bank accounts, the money was converted into site credits that could be used to play casino games, and winnings were returned to players’ bank accounts.
Police said the group used burner phones, bank accounts under false names, and frequently moved rented offices to avoid detection, while hosting the gambling servers overseas.
Authorities also seized about KRW62 million (US$42,293)1 KRW = 0.0007 USD
2026-03-09Powered by CMG CurrenShift in suspected criminal proceeds and several luxury watches. Investigators added that efforts are underway to recover additional illegal profits.
Last month, the Korea Basketball Organization also suspended Lotte Giants players for alleged illegal igaming.
Dig Deeper
The Backstory
Inside the latest South Korea bust
South Korea’s police say they dismantled an operation that ran like a company, complete with roles for managers, promoters and launderers. Alleged operators used burner phones, false-name bank accounts and rotating rented offices while hosting servers offshore. The scale and structure fit a broader pattern authorities have flagged for years: illegal online casinos acting as shadow tech firms, moving fast across borders and platforms while pulling in billions of won.
The Ulsan arrests underscore how these networks blend low-profile distribution with local reach. Investigators say agents seeded access points in adult-only internet cafes, then funneled players through game portal lookalikes. The model minimizes friction, masks payouts as routine transfers and exploits fragmented oversight. The resulting cat-and-mouse game, with domestic users and overseas infrastructure, has become a central test for Korean law enforcement, banks and telecoms.
The stakes are rising. Police have warned that illicit gambling is drawing in younger users while criminal groups professionalize. The case also highlights a priority shift: beyond stopping bettors, the focus is moving up the chain to promoters, payment handlers and cross-border partners who give these sites scale and resilience.
A yearlong sweep sets the stage
The latest arrests land amid a sustained national crackdown. Over the past year, a Korean National Police operation led to a sweep that arrested 5,196 people and recovered KRW123.5 billion. Police said more than half of suspects were in their 20s or 30s, with teenagers representing 7% of cases. Authorities identified 7,153 minors who had gambled illegally, often steering them to education or warnings rather than prosecution.
The scope shows why authorities are targeting operators and financial pipelines. As sites multiply and migrate servers abroad, police have prioritized shutting down core facilitators and recouping proceeds. The national operation is slated to run through October 2026 with emphasis on overseas-based rings and the intermediaries that bridge them to Korean users.
These efforts have evolved from sporadic raids into coordinated campaigns with cyber units, banks and regulators. Seizures and account freezes now complement site takedowns, a recognition that disrupting payments can be as decisive as grabbing servers.
Cross-border threat and North Korean ties
Enforcement also runs through national security lines. In a high-profile case, prosecutors charged a South Korean middleman linked to North Korean hackers with selling 71 domains tied to 16 illegal gambling sites to domestic operators. Authorities said the scheme generated up to $17 million over three years, with roughly 30% allegedly flowing to the North Korean regime.
The case showed how gambling infrastructure doubles as a revenue engine for sanctioned states and a training ground for cyber tactics. It sharpened the government’s view that illicit gaming isn’t only a consumer harm or tax issue but a vector for hostile finance. Prosecutors moved to seize proceeds and stressed that they will act against anyone who aids foreign cyber operations under the guise of commerce.
For police, that means mapping relationships across domain registrars, hosting providers and over-the-counter crypto hubs. For banks, it raises red flags around small-dollar, high-frequency transfers that cycle through mule accounts. The result is closer coordination between cybercrime squads and national security teams, which accelerates investigations but also broadens the aperture of who gets scrutinized.
Playbooks of evasion meet tighter controls
Operators lean on familiar tactics: frequent rebrands, agents in regional hubs, disposable phones and front accounts. They disguise deposits as credits and automate withdrawals to mimic e-commerce refunds. They seed apps in cafes to normalize access, then migrate users to mirror sites when blocks arrive. All of it exploits cross-border hosting and the lag between detection and takedown.
Authorities are answering with layered defenses. Police have focused on promoters who recruit players and on payment processors who convert deposits into in-game credits. They are also chasing upstream enablers by targeting registrars and domain brokers who recycle addresses to keep sites live. Seizures of watches or cash grab headlines, but the harder work is tracing layered transfers and preserving assets for forfeiture before they vanish into crypto or cash couriers.
The Ulsan case reflects that pivot. Investigators emphasized roles inside the ring, not just front-end site traffic. That approach aims to make recruitment riskier, raise costs for laundering and shrink the pool of capable middle managers. If sustained, it can slow the rinse-and-repeat cycle that lets illegal casinos reappear after each bust.
Global signals: blocking and licensing shape the market
South Korea’s campaign fits a broader global split between hard enforcement and formal licensing. In Australia, the federal media regulator has moved to cut off access at the source. The Australian Communications and Media Authority recently blocked eight illegal gambling websites and reminded players that unlicensed sites lack basic protections. Since 2017, ACMA says it has banned more than 1,100 illegal platforms and affiliates, with hundreds more exiting the market after warnings.
Brazil is taking the other path by growing a regulated market to crowd out illicit play. The Secretariat of Prizes and Bets has granted full licenses to eight operators covering 18 brands, extending terms through late 2029 for most. The country’s legal betting market opened in January 2025 and has since expanded in batches, bringing the total of fully licensed brands into the hundreds. The bet is that supervised operators, clear tax rules and know-your-customer standards can redirect demand from offshore sites.
For Korea, both models carry lessons. Domain blocks and ISP cooperation can choke access in the short term, but durable impact often follows when lawful alternatives exist and payments to gray operators are starved. The policy balance will hinge on how quickly enforcement can disrupt cross-border hosting and how financial controls can deny launderers stable rails.
What’s next
Expect more arrests aimed at operational roles, not just bettors, as the national crackdown runs toward 2026. Police have signaled that minors and first-time users will often be diverted to guidance while managers face detention and asset freezes. Investigators are likely to push for faster domain takedowns, tighter monitoring of mule accounts and more joint work with foreign hosts.
The North Korea-linked domain case hints at where attention will intensify: the nexus of gambling platforms with sanctioned entities, crypto cash-outs and malware-enabled fraud. Any sign that site proceeds flow to hostile state coffers will draw sharper prosecutorial responses and longer sentences under security laws.
The Ulsan arrests fit a pattern that is becoming more visible and more international. Whether Korea can blunt the business model behind illegal igaming will depend on speed—of tracing funds, pulling down infrastructure and flipping mid-level operatives—before networks can rebrand and respawn. The next test is how consistently authorities can turn high-profile busts into durable disruption of the pipelines that keep the industry alive.









