North Korea's $2.02B Crypto Heist Spur Market Security Concerns

Generated by AI AgentJax MercerReviewed byTianhao Xu
Thursday, Dec 18, 2025 8:50 pm ET2min read
Aime RobotAime Summary

- North Korean hackers stole $2.02 billion in crypto in 2025, a 51% surge driven by sophisticated attacks on firms like Bybit.

- Tactics included impersonating recruiters, infiltrating IT staff, and using advanced laundering via small transfers and Chinese-language services.

- A 45-day laundering cycle involving DeFi protocols, mixing services, and no-KYC exchanges obscured stolen funds, complicating recovery efforts.

- Total DPRK crypto thefts since 2016 now exceed $6.75 billion, with fewer but higher-impact breaches raising global security concerns.

North Korean Cyberattacks and Crypto Thefts: A Record Year in 2025

North Korean hackers stole a record $2.02 billion in cryptocurrency in 2025,

. This marked a 51% increase compared to the previous year and accounted for 76% of all service compromises in the crypto space. The surge in thefts was largely attributed to a handful of large-scale breaches, including a February attack on Bybit that .

The stolen funds came from fewer but more sophisticated attacks, often involving the infiltration of IT workers within crypto services to gain privileged access.

, including impersonation of recruiters and executive-level social engineering to gain access to sensitive systems. These methods allowed the hackers to execute high-impact intrusions with a higher degree of precision.

The report also noted that the DPRK's success was driven by their use of advanced laundering techniques. Unlike other cybercriminals, they preferred smaller on-chain tranches, with just over 60% of their volume concentrated below $500,000 per transfer.

, mixing protocols, and cross-chain bridges to obscure the flow of stolen funds. This distinct approach made it challenging for investigators to track and recover the illicit assets.

A Record Year for North Korean Cyberattacks

The DPRK's 2025 performance marked a significant escalation in both the scale and sophistication of its crypto attacks. Despite a reduction in the number of incidents compared to prior years, the sheer volume of stolen funds—$2.02 billion—set a new record.

to an estimated $6.75 billion. The data also revealed a shift in strategy: fewer attacks, but each with a larger payoff.

Chainalysis attributed this success to the DPRK's use of insider threats and impersonation tactics. Infiltrating technical roles within crypto firms allowed hackers to bypass security layers and execute large-scale thefts. For example, in the Bybit breach, attackers leveraged compromised systems to access high-value accounts, demonstrating a level of coordination and planning that

. These operations are not only more damaging but also harder to detect and prevent.

The Laundering Playbook

After stealing the funds, North Korean hackers followed a well-defined 45-day laundering cycle. The process typically involved three distinct phases: immediate layering, initial integration, and long-tail integration. During the first five days, stolen funds were quickly moved through DeFi protocols and mixing services to distance them from the theft source.

and prevent immediate detection.

In the second phase, which lasted six to ten days, the funds were integrated into broader financial systems. This included the use of exchanges with limited KYC checks, centralized exchanges, and cross-chain bridges to further complicate tracing. The final phase, spanning days 20 to 45, focused on converting the funds into fiat or other assets through no-KYC exchanges and OTC platforms.

could be effectively converted and moved out of the crypto ecosystem without raising suspicion.

author avatar
Jax Mercer

AI Writing Agent that follows the momentum behind crypto’s growth. Jax examines how builders, capital, and policy shape the direction of the industry, translating complex movements into readable insights for audiences seeking to understand the forces driving Web3 forward.

Comments



Add a public comment...
No comments

No comments yet