North Korea's Digital Heist: Turning Stolen Crypto into Ballistic Missiles

Generated by AI AgentCoin WorldReviewed byAInvest News Editorial Team
Saturday, Oct 25, 2025 1:31 am ET1min read
Speaker 1
Speaker 2
AI Podcast:Your News, Now Playing
Aime RobotAime Summary

- North Korea bypasses UN sanctions via crypto heists and global IT workers, funneling $2.83B into weapons programs since 2024.

- $1.4B stolen from Bybit in February 2025 marks largest single breach, with stablecoins used to fund munitions and missile development.

- IT workers in 8+ countries launder funds through animation studios and crypto mixers, evading detection via nationality concealment.

- Recent hypersonic missile tests and intensified U.S. patrols highlight risks as 11-nation MSMT urges global enforcement against Pyongyang's financial networks.

North Korea is leveraging cryptocurrency and a global network of IT workers to circumvent UN sanctions, channeling illicit funds into its weapons and missile programs, according to a report by the Multilateral Sanctions Monitoring Team (MSMT). The regime has stolen at least $2.83 billion in

assets since January 2024, with $1.65 billion siphoned in the first nine months of 2025 alone, according to the . A significant portion—$1.4 billion—was taken in February 2025 from crypto exchange Bybit, marking one of the largest single breaches attributed to Pyongyang, according to .

The MSMT report highlights North Korea's use of stablecoins for procurement transactions, including the sale of military equipment and raw materials like copper, which is critical for munitions production, as noted in the SCMP report. The stolen funds are then funneled into the development of weapons of mass destruction and ballistic missile systems, defying international sanctions aimed at curbing its nuclear ambitions. Cyber operations, led by groups such as Lazarus and TraderTraitor, have become a primary revenue stream, with stolen cryptocurrency accounting for roughly one-third of North Korea's total foreign currency earnings in 2024, according to

.

The regime's evasion tactics extend beyond hacking. The MSMT found that North Korea has deployed thousands of IT workers to at least eight countries, including China, Russia, and Nigeria, to launder funds and generate income, according to

. These workers often hide their nationalities and secure contracts with international firms, including animation studios linked to projects for Amazon and HBO Max, the report adds. Additionally, the MSMT detailed a nine-step laundering process involving cryptocurrency mixers, cross-chain bridges, and Chinese over-the-counter brokers to convert stolen digital assets into fiat currency, as described by BeinCrypto.

Recent developments underscore the urgency of the issue. On October 22, 2025, North Korea tested suspected hypersonic missiles, drawing condemnation from U.S. Indo-Pacific Command, which labeled the launches "unlawful and destabilizing," according to

. The test, observed by senior officials including Pak Jong Chon, demonstrated the regime's advancing strategic deterrence capabilities. The U.S. and regional allies have intensified surveillance and coordination, with maritime patrols monitoring for sanctions violations under the Pacific Security Maritime Exchange.

The MSMT, comprising 11 countries including the U.S., South Korea, and Japan, was established in October 2024 to fill a monitoring gap left by the disbandment of the UN Security Council's 1718 Committee Panel of Experts. The group's report emphasizes the need for global accountability, urging member states to enforce sanctions and disrupt North Korea's financial networks, as reported by

.

---

Comments



Add a public comment...
No comments

No comments yet