CrowdStrike Report Reveals DPRK Stole Billions in Crypto as Financial Sector Intrusions Spike 43%

CrowdStrike: North Korea Stole Billions in Crypto, Financial Sector Attacks Up 43%

CRITICAL
May 21, 2026
4m read
Threat ActorThreat IntelligenceData Breach

Impact Scope

People Affected

423 financial services organizations named on leak sites

Industries Affected

FinanceTechnology

Geographic Impact

North KoreaCanadaPhilippinesIndonesiaBrazil (global)

Related Entities

Threat Actors

PRESSURE CHOLLIMAGOLDEN CHOLLIMAMUTANT SPIDER HOLLOW PANDAMURKY PANDA

Organizations

Full Report

Executive Summary

The CrowdStrike 2026 Financial Services Threat Landscape Report, released on May 20, 2026, paints a dire picture of the threats facing the global financial sector. The report highlights a 43% global increase in hands-on-keyboard intrusions against financial institutions over the past two years. State-sponsored actors from the Democratic People’s Republic of Korea (DPRK) are leading the charge, having stolen billions in cryptocurrency in 2025. The DPRK group PRESSURE CHOLLIMA was responsible for the largest single financial theft ever recorded at $1.46 billion, achieved via a supply chain compromise. Concurrently, organized eCrime syndicates like MUTANT SPIDER are scaling their operations, using vishing and a network of initial access brokers to fuel ransomware attacks. Attackers are evolving their tactics, focusing on the exploitation of trusted identities and SaaS applications to circumvent traditional security measures.

Threat Overview

The report identifies several key trends and threat actors targeting the financial industry:

  • DPRK-Nexus Adversaries: North Korean groups remain the most formidable state-sponsored financial threat.

    • PRESSURE CHOLLIMA: Conducted a record-breaking $1.46 billion cryptocurrency theft by compromising a software supply chain with a trojanized application.
    • GOLDEN CHOLLIMA: Utilized sophisticated social engineering lures, including fake job recruitment offers, to compromise fintech companies in Southeast Asia and Canada, gaining access to cloud environments and diverting cryptocurrency.
    • AI-Powered Deception: These groups are now using AI to enhance their social engineering campaigns, making them more believable and effective.
  • eCrime Syndicates: Financially motivated criminal groups are increasing the volume and sophistication of their attacks.

    • MUTANT SPIDER: A major contributor to the surge in intrusions, this group specializes in vishing (voice phishing) to gain initial access and obtain credentials, which are then sold to ransomware operators.
    • Data Leak Sites: 423 financial services organizations were named on dedicated data leak sites, a 27% increase year-over-year, indicating a rise in successful data exfiltration and extortion campaigns.

Technical Analysis

Attackers are focusing on identity and trusted relationships to bypass defenses:

  • T1195.002 - Compromise Software Supply Chain: As demonstrated by PRESSURE CHOLLIMA, compromising a single piece of software used by many financial institutions can lead to a massive, widespread breach.
  • T1566.003 - Spearphishing via Service: GOLDEN CHOLLIMA's use of recruitment-themed lures on platforms like LinkedIn is a classic example of this technique.
  • T1648 - Vishing: MUTANT SPIDER's primary initial access method, where they call employees pretending to be IT support to trick them into giving up credentials or MFA codes.
  • T1078 - Valid Accounts: The end goal of many of these initial access techniques is to obtain legitimate credentials, which are then used to access SaaS applications and cloud environments, blending in with normal user activity.

Impact Assessment

The financial impact of these campaigns is staggering, with billions of dollars in cryptocurrency stolen. This not only causes direct financial loss but also undermines trust in the digital asset ecosystem. The 43% increase in hands-on intrusions indicates that attackers are spending more time within victim networks, allowing for deeper compromise and greater data theft. The targeting of SaaS applications is particularly concerning, as these often hold a company's most sensitive data and are managed outside the traditional network perimeter, making them a blind spot for some security teams.

Detection & Response

  • Identity Threat Detection and Response (ITDR): Deploy ITDR solutions to monitor for anomalous authentication events, privilege escalations, and unusual access patterns, especially in cloud and SaaS environments.
  • Monitor for Vishing Indicators: Train help desk staff to be aware of vishing tactics. Monitor for an unusual number of MFA push notification rejections or password resets for a single user, as this can indicate a vishing attack in progress.
  • Supply Chain Auditing: Regularly audit the security of third-party software and service providers, especially those integrated into critical financial transaction systems.

Mitigation

  • Phishing-Resistant MFA: Implement FIDO2-based MFA to protect against credential theft and vishing-based MFA bypass attempts.
  • SaaS Security Posture Management (SSPM): Use SSPM tools to gain visibility into the configuration of SaaS applications, enforce security policies, and detect threats within these environments.
  • User Training: Conduct regular, targeted training on social engineering tactics, including vishing and AI-powered spear-phishing. Use simulations to test employee awareness.
  • Limit Access: Enforce the principle of least privilege for all accounts, especially in cloud and SaaS environments, to limit the blast radius of a compromised identity.

Timeline of Events

1
January 1, 2025
Throughout 2025, DPRK-linked actors stole billions in digital assets.
2
May 20, 2026
CrowdStrike releases its 2026 Financial Services Threat Landscape Report.
3
May 21, 2026
This article was published

MITRE ATT&CK Mitigations

Implement phishing-resistant MFA (FIDO2) to defend against vishing and other credential theft techniques.

Train employees to recognize sophisticated social engineering attacks, including vishing and AI-powered lures.

Audit

M1047enterprise

Use ITDR and SSPM tools to audit and monitor identity and SaaS environments for signs of compromise.

D3FEND Defensive Countermeasures

To counter the 43% spike in hands-on-keyboard intrusions, which rely on compromised identities, financial institutions must implement robust account monitoring, particularly within their cloud and SaaS environments. This goes beyond standard logging. It involves using an Identity Threat Detection and Response (ITDR) solution to baseline normal user behavior and detect anomalies. For example, the system should alert if a user account that has always logged in from the US suddenly authenticates from North Korea, or if an account attempts to access a sensitive SaaS application for the first time. It should also flag impossible travel scenarios, concurrent sessions from different locations, and unusual privilege escalations. This is critical for detecting when legitimate credentials, stolen via vishing or other means, are being abused by an attacker.

The success of MUTANT SPIDER's vishing campaigns highlights the need for advanced user behavior analysis. IT and security teams should monitor for patterns indicative of a vishing attack. This includes a user suddenly making multiple, frantic password reset requests, or a sequence of repeated, rejected MFA push notifications over a short period. These patterns suggest an attacker is on the phone with the user, pressuring them to approve an MFA prompt ('MFA fatigue') or provide a code. An automated system that detects this sequence of events (e.g., >3 MFA rejections in 5 minutes for one user) should trigger an alert and potentially temporarily lock the account, giving the security team time to intervene and contact the user through a separate channel to verify their identity.

Timeline of Events

1
January 1, 2025

Throughout 2025, DPRK-linked actors stole billions in digital assets.

2
May 20, 2026

CrowdStrike releases its 2026 Financial Services Threat Landscape Report.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

CrowdStrikeDPRKNorth KoreaPRESSURE CHOLLIMAMUTANT SPIDERCryptocurrencyFinancial ServicesThreat IntelligenceVishing

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.