The post Crypto Hacks Become a Core Revenue Stream for North Korea appeared on BitcoinEthereumNews.com. Crime What began as sporadic cybercrime has turned into The post Crypto Hacks Become a Core Revenue Stream for North Korea appeared on BitcoinEthereumNews.com. Crime What began as sporadic cybercrime has turned into

Crypto Hacks Become a Core Revenue Stream for North Korea

Crime

What began as sporadic cybercrime has turned into a highly industrialized revenue machine. In 2025, crypto-related hacking linked to the Democratic People’s Republic of Korea crossed a new threshold, transforming digital asset theft into one of the regime’s most reliable financial pipelines.

Data from Chainalysis, shared with TheBlock shows that North Korea-linked operators extracted more than $2.17 billion in crypto in just the first half of the year, already eclipsing the entirety of 2024. The pace and scale point to a system that is no longer opportunistic, but strategic.

Key Takeaways

  • North Korea-linked hackers stole over $2.17 billion in crypto in the first half of 2025 alone.
  • Laundering tactics have evolved into fast, multi-chain operations designed to overwhelm tracking efforts.
  • Industry-wide coordination, not just sanctions, is seen as critical to slowing future attacks. 

A record-breaking year for state-backed crypto theft

The most dramatic episode came in February, when attackers drained nearly $1.5 billion in Ether from Bybit, setting a new benchmark for the largest single crypto theft on record. That breach was not an outlier. It was followed by a steady stream of incidents, including a multimillion-dollar exploit at Upbit, reinforcing the view that North Korea’s cyber campaign is sustained and coordinated.

These operations are widely attributed to state-aligned groups such as Lazarus Group, which Western intelligence agencies have long linked to Pyongyang’s weapons programs. With sanctions tightening traditional funding routes, crypto has become a preferred alternative.

From hacks to ecosystems

What sets 2025 apart is not just the amount stolen, but how efficiently funds are moved and concealed. According to Chainalysis researchers, DPRK-linked actors now deploy multiple laundering methods simultaneously, rapidly splitting funds across mixers, decentralized exchanges, bridges, OTC brokers, and token swaps to overwhelm tracking efforts.

This multi-channel approach shortens response times for investigators and makes recovery increasingly difficult. Rather than relying on a single laundering path, funds are scattered and recombined across chains, often within hours of an attack.

In parallel, North Korean operators have expanded beyond direct hacks. Infiltration of tech firms has become a key tactic, with operatives posing as remote IT workers to gain access to internal systems, wallets, or sensitive infrastructure. These efforts have extended into blockchain startups, AI firms, and even defense-linked contractors.

Why sanctions are not enough

Industry experts warn that enforcement tools alone are failing to keep pace. Andrew Fierman has argued that sanctions, while important, do little to disrupt the operational mechanics of these cyber networks without coordinated action from exchanges, analytics firms, and law enforcement.

The expectation across the security community is that crypto theft will remain a core revenue stream for Pyongyang. Emerging AI tools may further enhance these capabilities by enabling more convincing fake identities and automating laundering strategies at scale.

Closing the gaps

Defensive measures are shifting toward prevention rather than recovery. Enhanced due diligence, including mandatory video verification, stricter identity checks, IP monitoring, and tighter controls on crypto-based payments, is increasingly viewed as one of the few effective ways to block North Korean-linked operatives before damage is done.

Even so, experts acknowledge that complete prevention is unrealistic. The most effective deterrent, they argue, lies in rapid information sharing and coordinated response frameworks that reduce the window of opportunity for attackers.

As crypto adoption expands globally, North Korea’s cyber campaign highlights a stark reality: digital assets are now firmly embedded in geopolitical conflict, and the battleground is evolving faster than regulation can follow.


The information provided in this article is for educational purposes only and does not constitute financial, investment, or trading advice. Coindoo.com does not endorse or recommend any specific investment strategy or cryptocurrency. Always conduct your own research and consult with a licensed financial advisor before making any investment decisions.

Author

Kosta joined the team in 2021 and quickly established himself with his thirst for knowledge, incredible dedication, and analytical thinking. He not only covers a wide range of current topics, but also writes excellent reviews, PR articles, and educational materials. His articles are also quoted by other news agencies.

Next article

Source: https://coindoo.com/crypto-hacks-become-a-core-revenue-stream-for-north-korea/

Market Opportunity
Core DAO Logo
Core DAO Price(CORE)
$0.1096
$0.1096$0.1096
-1.17%
USD
Core DAO (CORE) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

The Channel Factories We’ve Been Waiting For

The Channel Factories We’ve Been Waiting For

The post The Channel Factories We’ve Been Waiting For appeared on BitcoinEthereumNews.com. Visions of future technology are often prescient about the broad strokes while flubbing the details. The tablets in “2001: A Space Odyssey” do indeed look like iPads, but you never see the astronauts paying for subscriptions or wasting hours on Candy Crush.  Channel factories are one vision that arose early in the history of the Lightning Network to address some challenges that Lightning has faced from the beginning. Despite having grown to become Bitcoin’s most successful layer-2 scaling solution, with instant and low-fee payments, Lightning’s scale is limited by its reliance on payment channels. Although Lightning shifts most transactions off-chain, each payment channel still requires an on-chain transaction to open and (usually) another to close. As adoption grows, pressure on the blockchain grows with it. The need for a more scalable approach to managing channels is clear. Channel factories were supposed to meet this need, but where are they? In 2025, subnetworks are emerging that revive the impetus of channel factories with some new details that vastly increase their potential. They are natively interoperable with Lightning and achieve greater scale by allowing a group of participants to open a shared multisig UTXO and create multiple bilateral channels, which reduces the number of on-chain transactions and improves capital efficiency. Achieving greater scale by reducing complexity, Ark and Spark perform the same function as traditional channel factories with new designs and additional capabilities based on shared UTXOs.  Channel Factories 101 Channel factories have been around since the inception of Lightning. A factory is a multiparty contract where multiple users (not just two, as in a Dryja-Poon channel) cooperatively lock funds in a single multisig UTXO. They can open, close and update channels off-chain without updating the blockchain for each operation. Only when participants leave or the factory dissolves is an on-chain transaction…
Share
BitcoinEthereumNews2025/09/18 00:09
South Korean Court Sentences Crypto Exchange Employee for Espionage

South Korean Court Sentences Crypto Exchange Employee for Espionage

The post South Korean Court Sentences Crypto Exchange Employee for Espionage appeared on BitcoinEthereumNews.com. Key Points: Employee sentenced for espionage involving
Share
BitcoinEthereumNews2025/12/30 04:09
Trust Wallet Faces Wave of Fraudulent Claims After $7 Million Chrome Extension Hack

Trust Wallet Faces Wave of Fraudulent Claims After $7 Million Chrome Extension Hack

Trust Wallet's Christmas security breach has taken an unexpected turn. The company now faces nearly double the number of compensation claims compared to actual
Share
Brave Newcoin2025/12/30 04:32