North Korean Hackers Shatter Records, Stealing $2 Billion in Crypto in 2025

North Korean State-Sponsored Hackers Steal Record-Breaking $2 Billion in Cryptocurrency Assets in 2025

HIGH
October 12, 2025
5m read
Threat ActorCyberattackMalware

Impact Scope

Affected Companies

Bybit

Industries Affected

Finance

Related Entities

Threat Actors

Organizations

North Korea

Other

Bybit

Full Report

Executive Summary

According to a report from October 11, 2025, state-sponsored hackers from the Democratic People's Republic of Korea (North Korea) have stolen more than $2 billion in cryptocurrency assets during 2025. This figure represents a new annual record for the nation's illicit cyber activities and demonstrates a significant escalation in its campaigns targeting the digital asset ecosystem. A single attack against the Bybit cryptocurrency exchange in February 2025 accounted for $1.46 billion of this total. These cyber-heists are a primary tool for the North Korean regime to generate revenue, bypass stringent international sanctions, and finance its strategic objectives, including its weapons development programs. The continued success of these operations poses a systemic risk to the global cryptocurrency market.


Threat Overview

North Korean threat actors, such as the Lazarus Group and its various subgroups (e.g., APT38, Kimsuky), have become the world's most prolific and successful cyber thieves. Their operations have shifted heavily towards the cryptocurrency sector due to the potential for large payouts and the perceived anonymity of digital assets. Their primary targets are cryptocurrency exchanges, decentralized finance (DeFi) protocols, and individual high-value crypto holders.

The typical attack pattern involves:

  1. Spearphishing: Targeting employees of crypto firms with malicious documents or fake job offers to gain initial access.
  2. Social Engineering: Building trust with targets over long periods to trick them into compromising security.
  3. Exploitation: Exploiting vulnerabilities in smart contracts or web infrastructure.
  4. Private Key Theft: The ultimate goal is to steal the private keys that control crypto wallets.
  5. Laundering: Stolen funds are rapidly moved through a complex chain of mixers (like Tornado Cash), chain-hopping services, and over-the-counter (OTC) brokers to obscure their origin and convert them into fiat currency.

The $1.46 billion Bybit heist exemplifies the scale these groups can achieve, likely by compromising the exchange's hot wallet infrastructure or internal systems.

Technical Analysis

North Korean attacks on crypto platforms often involve a blend of sophisticated social engineering and technical exploits.

  • Initial Access (T1566 - Phishing): Spearphishing campaigns are a hallmark, often using fake job offers on platforms like LinkedIn to target developers and engineers at crypto companies.
  • Credential Access (T1606 - Forge Web Credentials): Attackers aim to steal credentials for internal systems, code repositories, and ultimately, the private keys for wallets.
  • Lateral Movement (T1213 - Data from Information Repositories): Once inside a network, they move laterally to find and access key systems, including servers that manage hot wallets.
  • Impact (T1657 - Financial Theft): The final stage involves transferring cryptocurrency assets from the victim's wallets to wallets controlled by the attackers.
  • Defense Evasion (T1622 - Debugger Evasion): The malware used is often custom-built and employs various techniques to evade analysis and detection.

The laundering process is as critical to the operation as the theft itself. North Korea's ability to successfully launder billions of dollars in stolen crypto highlights weaknesses in the global AML/CFT (Anti-Money Laundering/Combating the Financing of Terrorism) framework for digital assets.

Impact Assessment

  • Massive Financial Losses: The direct theft of $2 billion in 2025 represents a significant drain of capital from the digital economy, causing losses for exchanges and their users.
  • Funding of WMD Programs: This revenue directly funds North Korea's nuclear and ballistic missile programs, posing a major international security threat.
  • Market Destabilization: Large-scale heists can erode trust in the security of the cryptocurrency ecosystem, leading to market volatility and hampering mainstream adoption.
  • Sanctions Evasion: These activities render international economic sanctions less effective, allowing the regime to continue its operations despite global pressure.

IOCs

No specific wallet addresses or transaction hashes were provided in the source articles.

Cyber Observables for Detection

Type Value Description Context Confidence
domain *.bybit.com The domain for the Bybit exchange, which was the target of the largest heist. Phishing detection systems, DNS logs. high
user_account_pattern Anomalous API key usage Unauthorized or unusual use of API keys for automated trading or withdrawals is a key indicator of compromise. Exchange security logs, SIEM. high
network_traffic_pattern Large crypto withdrawals to new/unseen wallet addresses A sudden, large transfer of funds from an exchange's hot wallet to a new address is a primary indicator of theft. Blockchain analysis tools, exchange internal monitoring. high

Detection & Response

  1. Blockchain Analysis: Utilize blockchain intelligence tools to monitor transactions associated with known North Korean wallet clusters. Alert on any interactions with your platform.
  2. Phishing Detection: Implement advanced email and web security to detect and block spearphishing attempts targeting employees.
  3. Insider Threat Monitoring: Monitor internal systems for signs of credential abuse or lateral movement, as many attacks begin with a compromised employee account.

Mitigation

  • Cold Storage: The vast majority of crypto assets should be held in 'cold storage'—offline wallets that are not accessible from the internet. Hot wallets should only contain the minimum funds necessary for daily operations.
  • Multi-Signature Wallets (Multisig): Use multisig wallets for all significant transactions, requiring approval from multiple, independent individuals before funds can be moved.
  • Employee Security Training (M1017 - User Training): Train all employees, especially developers and executives, to recognize sophisticated social engineering and phishing campaigns.
  • Access Controls (M1026 - Privileged Account Management): Enforce strict access controls and the principle of least privilege for all systems managing private keys and transaction approvals.

Timeline of Events

1
February 1, 2025
North Korean hackers steal $1.46 billion from the Bybit cryptocurrency exchange.
2
October 11, 2025
A report reveals that North Korea has stolen over $2 billion in crypto assets in total during 2025.
3
October 12, 2025
This article was published

MITRE ATT&CK Mitigations

Train employees to recognize and report sophisticated phishing and social engineering attempts, which are the primary initial access vectors for these attacks.

Strictly limit and monitor access to systems that manage private keys and transaction signing.

Mapped D3FEND Techniques:

Require hardware-based MFA for all critical operations, including accessing administrative panels and authorizing large transactions.

Mapped D3FEND Techniques:

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

North KoreaLazarus GroupCryptocurrencyCyber HeistBybitDeFiSanctions Evasion

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading