Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnSquareMore
North Korea’s $2.8b crypto heist bankrolls military ambition

North Korea’s $2.8b crypto heist bankrolls military ambition

Crypto.NewsCrypto.News2025/10/21 16:00
By:By Brian DangaEdited by Jayson Derrick

North Korea relies on state-backed hacking groups like Lazarus to finance its military, with stolen crypto accounting for nearly a third of its foreign currency earnings and providing a steady, illicit cash flow immune to traditional sanctions.

Summary
  • North Korea has stolen at least $2.8 billion in cryptocurrency since 2024, with the funds supplying nearly a third of its foreign currency earnings.
  • State-backed hacker groups targeted exchanges and custody providers through advanced supply-chain and social-engineering attacks.
  • The stolen assets are laundered through mixers, cross-chain bridges, and Chinese OTC brokers, converting crypto into fiat for use in weapons and missile programs.

In an Oct. 22 report , the Multilateral Sanctions Monitoring Team said that between January 2024 and September 2025 North Korean actors orchestrated cryptocurrency thefts totaling at least $2.8 billion, through state-backed hacking groups and cyber-actors targeting the digital-assets sector.

The bulk of the haul stemmed from major incidents, including the February 2025 exploit of Bybit , which alone accounted for roughly half of the total. The report attributes these exploits to familiar North-Korean threat actors using sophisticated supply-chain, social-engineering and wallet-compromise methods.

North Korea’s sophisticated arsenal of theft and evasion

North Korea’s crypto operations revolve around a tight ecosystem of state-linked hacker groups, chief among them Lazarus , Kimsuky, TraderTraitor and Andariel, whose fingerprints appear in nearly every major digital asset breach of the past two years.

According to cybersecurity analysts, these teams operate under the Reconnaissance General Bureau, Pyongyang’s primary intelligence arm, coordinating attacks that mimic private-sector efficiency. Their primary innovation has been to bypass exchanges entirely, instead targeting the third-party digital asset custody providers that exchanges use for secure storage.

By compromising infrastructure from companies like Safe(Wallet), Ginco, and Liminal Custody, North Korean actors gained a master key to pilfer funds from clients including Bybit, Japan’s DMM Bitcoin, and India’s WazirX.

The attack on DMM Bitcoin, which led to a $308 million loss and the exchange’s eventual shutdown, was initiated months earlier when a TraderTraitor actor, posing as a recruiter on LinkedIn, tricked a Ginco employee into opening a malicious file disguised as a pre-interview test.

Other state-sponsored groups operate in concert with this main effort. The CryptoCore collective, while less sophisticated, conducts high-volume social engineering, posing as recruiters and business executives to infiltrate targets.

Meanwhile, Citrine Sleet has developed a reputation for deploying trojanized cryptocurrency trading software. In one detailed incident from October 2024, a Citrine Sleet actor posing as a trusted former contractor on Telegram delivered a malicious ZIP file to a developer at Radiant Capital, leading to a $50 million theft.

The laundering trail points back to North Korea

Once stolen, the digital assets enter a complex, nine-step laundering process designed to obscure their origin and convert them into usable fiat currency. The DPRK’s cyber actors systematically swap stolen tokens into established cryptocurrencies like Ethereum or Bitcoin, then utilize a suite of mixing services including Tornado Cash and Wasabi Wallet.

They then leverage cross-chain bridges and aggregators like THORChain and LI.FI to hop between blockchains, often converting the mixed assets into Tron-based USDT to stage them for cash-out. Investigators said this entire operation hinges on a network of over-the-counter brokers, predominantly in China, who accept the laundered USDT and deposit equivalent fiat currency into DPRK-controlled bank accounts via Chinese UnionPay cards.

This relentless campaign of digital theft has direct and grave real-world consequences. The billions siphoned from the crypto ecosystem do not vanish into a bureaucratic void. The MSMT report concludes that this revenue stream is critical for procuring materials and equipment for the DPRK’s unlawful weapons of mass destruction and ballistic missile programs .

By providing a massive, illicit cash flow that is immune to traditional financial sanctions, the global cryptocurrency industry has been weaponized, becoming an unregulated and unwilling financier of Pyongyang’s military ambitions. The heists are not merely crimes of profit; they are acts of state policy, funding a military buildup that threatens global security.

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!

You may also like

$8.8 billion outflow countdown: MSTR is becoming the abandoned child of global index funds

The final result will be revealed on January 15, 2026, and the market has already started to vote with its feet.

深潮2025/11/22 11:59
$8.8 billion outflow countdown: MSTR is becoming the abandoned child of global index funds

Deconstructing DAT: Beyond mNAV, How to Identify "Real vs. Fake HODLing"?

There is only one iron rule for investing in DAT: ignore premium bubbles and only invest in those with a genuine flywheel of continuously increasing "crypto per share."

BlockBeats2025/11/22 11:24
Deconstructing DAT: Beyond mNAV, How to Identify "Real vs. Fake HODLing"?

Empowered by AI Avatars, How Does TwinX Create Immersive Interaction and a Value Closed Loop?

1. **Challenges in the Creator Economy**: Web2 content platforms suffer from issues such as opaque algorithms, non-transparent distribution, unclear commission rates, and high costs for fan migration, making it difficult for creators to control their own data and earnings. 2. **Integration of AI and Web3**: The development of AI technology, especially AI Avatar technology, combined with Web3's exploration of the creator economy, offers new solutions aimed at breaking the control of centralized platforms and reconstructing content production and value distribution. 3. **Positioning of the TwinX Platform**: TwinX is an AI-driven Web3 short video social platform that aims to reconstruct content, interaction, and value distribution through AI avatars, immersive interactions, and a decentralized value system, enabling creators to own their data and income. 4. **Core Features of TwinX**: These include AI avatar technology, which allows creators to generate a learnable, configurable, and sustainably operable "second persona", as well as a closed-loop commercialization pathway that integrates content creation, interaction, and monetization. 5. **Web3 Characteristics**: TwinX embodies the assetization and co-governance features of Web3. It utilizes blockchain to confirm and record interactive behaviors, turning user activities into traceable assets, and enables participants to engage in platform governance through tokens, thus integrating the creator economy with community governance.

BlockBeats2025/11/22 11:23
Empowered by AI Avatars, How Does TwinX Create Immersive Interaction and a Value Closed Loop?

Aster CEO explains in detail the vision of Aster privacy L1 chain, reshaping the decentralized trading experience

Aster is set to launch a privacy-focused Layer 1 (L1) public chain, along with detailed plans for token empowerment, global market expansion, and liquidity strategies.

BlockBeats2025/11/22 11:22
Aster CEO explains in detail the vision of Aster privacy L1 chain, reshaping the decentralized trading experience