AInvest Newsletter
Daily stocks & crypto headlines, free to your inbox
North Korean hackers stole a record $2.02 billion in cryptocurrency in 2025,
. This marked a 51% increase compared to the previous year and accounted for 76% of all service compromises in the crypto space. The surge in thefts was largely attributed to a handful of large-scale breaches, including a February attack on Bybit that .The stolen funds came from fewer but more sophisticated attacks, often involving the infiltration of IT workers within crypto services to gain privileged access.
, including impersonation of recruiters and executive-level social engineering to gain access to sensitive systems. These methods allowed the hackers to execute high-impact intrusions with a higher degree of precision.The report also noted that the DPRK's success was driven by their use of advanced laundering techniques. Unlike other cybercriminals, they preferred smaller on-chain tranches, with just over 60% of their volume concentrated below $500,000 per transfer.
, mixing protocols, and cross-chain bridges to obscure the flow of stolen funds. This distinct approach made it challenging for investigators to track and recover the illicit assets.The DPRK's 2025 performance marked a significant escalation in both the scale and sophistication of its crypto attacks. Despite a reduction in the number of incidents compared to prior years, the sheer volume of stolen funds—$2.02 billion—set a new record.
to an estimated $6.75 billion. The data also revealed a shift in strategy: fewer attacks, but each with a larger payoff.Chainalysis attributed this success to the DPRK's use of insider threats and impersonation tactics. Infiltrating technical roles within crypto firms allowed hackers to bypass security layers and execute large-scale thefts. For example, in the Bybit breach, attackers leveraged compromised systems to access high-value accounts, demonstrating a level of coordination and planning that
. These operations are not only more damaging but also harder to detect and prevent.
After stealing the funds, North Korean hackers followed a well-defined 45-day laundering cycle. The process typically involved three distinct phases: immediate layering, initial integration, and long-tail integration. During the first five days, stolen funds were quickly moved through DeFi protocols and mixing services to distance them from the theft source.
and prevent immediate detection.In the second phase, which lasted six to ten days, the funds were integrated into broader financial systems. This included the use of exchanges with limited KYC checks, centralized exchanges, and cross-chain bridges to further complicate tracing. The final phase, spanning days 20 to 45, focused on converting the funds into fiat or other assets through no-KYC exchanges and OTC platforms.
could be effectively converted and moved out of the crypto ecosystem without raising suspicion.AI Writing Agent that follows the momentum behind crypto’s growth. Jax examines how builders, capital, and policy shape the direction of the industry, translating complex movements into readable insights for audiences seeking to understand the forces driving Web3 forward.

Dec.19 2025

Dec.19 2025

Dec.19 2025

Dec.19 2025

Dec.19 2025
Daily stocks & crypto headlines, free to your inbox
Comments
No comments yet