ChainStreet
WHERE CODE MEETS CAPITAL
Loading prices…
Powered by CoinGecko
Blockchain Tech

North Korean Hackers Steal Record $2B Crypto in 2025

State-backed North Korean hackers pivot to centralized exchanges, driving a 45% surge in illicit revenue despite executing fewer total attacks.

North Korean Hackers Steal Record $2B Crypto in 2025

North Korean hackers stole a record $2.02 billion in cryptocurrency throughout 2025, effectively establishing cyber-theft as a primary sovereign revenue stream for the isolated regime.

Key Takeaways
  • North Korean cybercriminals from the Lazarus Group extract stolen digital assets from vulnerable decentralized finance smart contracts.
  • These state-sponsored hacking syndicates steal a record-breaking $2 billion in cryptocurrency during the 2025 calendar year.
  • This massive capital extraction directly funds illicit weapons programs while exposing the systemic vulnerabilities of global Web3 infrastructure.
Listen to this article

Data released Monday in a joint report by blockchain intelligence firms Chainalysis and TRM Labs confirms a 45% year-over-year increase in stolen funds compared to 2024. The surge stems from a strategic pivot: Pyongyang’s operatives have abandoned complex decentralized finance (DeFi) exploits to target the systemic vulnerabilities of centralized exchanges (CEXs).

Centralized infrastructure accounted for 70% of successful exploits in 2025, a sharp reversal from the DeFi-heavy attacks that defined the previous cycle.

Targeting the Centralized Gatekeepers

The shift to centralized targets suggests a “professionalization” of cyber capabilities of North Korean hackers. Rather than relying solely on technical smart contract failures, groups such as Lazarus and APT38 focused on social engineering and administrative weaknesses within major liquidity hubs.

“The data indicates an industrial-scale approach to compromising centralized entities,” said Ari Redbord, Global Head of Policy at TRM Labs. “We are seeing less reliance on ‘smash and grab’ DeFi hacks and more sophisticated, long-con operations aimed at the human and institutional gates guarding exchange wallets.”

Advertisement · Press Release

Genuine News Deserves Honest Attention.

High-conviction projects require an intelligent audience. Connect with readers who value sharp reporting.

👉 Submit Your PR

The largest single contributor to the 2025 total was the February breach of Dubai-based exchange Bybit, where attackers drained $1.5 billion. The FBI and on-chain analysts linked the incident to compromised private keys obtained through a targeted phishing campaign against senior engineers, a hallmark of the new CEX-focused strategy.

Bridge Hopping and Laundering

While the theft occurred on centralized platforms, the laundering process remained deeply embedded in decentralized protocols. The report notes that over $800 million of the stolen funds were washed using “chain hopping” techniques across cross-chain bridges.

North Korean hackers utilized automated scripts to move assets rapidly between blockchains, specifically utilizing the ThorChain and LayerZero protocols, to obfuscate the transaction trail before converting funds into USDT on the Tron network. This volume of cross-chain laundering represents a record high, complicating efforts by the Office of Foreign Assets Control (OFAC) to freeze assets.

Sovereign Revenue Stream

The scale of the 2025 thefts highlights the degree to which cryptocurrency theft has become a macroeconomic necessity for North Korea. The $2.02 billion figure rivals the nation’s traditional annual exports, effectively functioning as a state-funded ATM that bypasses global banking sanctions.

The United Nations Security Council flagged this connection in a November briefing, warning that the revenue directly funds the DPRK’s nuclear and ballistic missile programs.

“These are not rogue hackers,” Chainalysis noted in the report. “This is a geopolitical strategy where a nation-state is systematically draining the crypto ecosystem to fund military objectives.”

Major global exchanges have accelerated the rollout of mandatory hardware key authentication for administrative staff this quarter, citing the escalating threat profile from state actors.

Chain Street’s Take

The $2 billion figure is staggering, but the “how” is more important than the “how much.” North Korean hackers have proven that the blockchain’s immutability is irrelevant if the people holding the keys can be compromised

By shifting 70% of their attacks to centralized exchanges, they aren’t hacking code anymore, they are hacking human resources and corporate hierarchy. This is no longer a crypto-native security problem; it is a global counter-intelligence failure. 

Until exchanges treat their admin keys like nuclear launch codes, this sovereign revenue stream isn’t going anywhere.

CHAIN STREET INTELLIGENCE

Activate Intelligence Layer

Institutional-grade structural analysis for this article.

FAQ

Frequently Asked Questions

01

What is the $2 billion crypto hack?

North Korean state-sponsored hacking syndicates extracted over $2 billion from various digital asset platforms throughout 2025. The Lazarus Group orchestrated the majority of these attacks by exploiting vulnerabilities in decentralized finance smart contracts. It represents the largest annual theft of cryptocurrency by a single nation-state in history.
02

Why does this matter for global security?

The stolen digital assets provide the North Korean regime with a massive influx of untraceable capital to evade international economic sanctions. Intelligence agencies report that these funds directly finance the country's ballistic missile and nuclear weapons development programs. The ongoing thefts elevate decentralized finance security to a matter of critical national defense.
03

How do the hackers execute these exploits?

The Lazarus Group executes these attacks by deploying sophisticated phishing campaigns against engineers working at prominent cryptocurrency firms. Once inside the corporate network, they compromise the private keys securing high-value cross-chain liquidity bridges like Ronin. The stolen assets are then rapidly laundered through decentralized mixers like Tornado Cash to obscure the transaction trail.
04

What are the risks or critiques?

The primary risk is the total loss of user funds locked within vulnerable decentralized finance protocols. Critics argue that the crypto industry prioritizes rapid software deployment over rigorous security auditing by firms like CertiK. There is ongoing frustration that international law enforcement lacks the jurisdictional authority to recover assets processed through foreign exchanges.
05

What happens next?

The U.S. Treasury will likely impose stricter sanctions on any cryptocurrency mixer or exchange associated with North Korean laundering activities. Cybersecurity firms will develop advanced artificial intelligence systems to identify state-sponsored phishing attempts in real time. Institutional investors will demand mandatory smart contract insurance before deploying capital into new decentralized protocols.

You Might Also Like

CHAINSTREET
🛡
Shannon Hayes

Shannon is a contributing writer for ChainStreet.io. His reporting delivers factual insights and analysis on industry developments, regulatory shifts, platform policies, token economics, and market trends on AI, crypto, blockchain industries, helping readers stay informed on how code intersects with capital.

The views and opinions expressed in articles by Shannon Hayes are his own and do not necessarily reflect the official position of ChainStreet.io, its management, editors, or affiliates. This content is provided for informational and educational purposes only and does not constitute financial, investment, legal, or tax advice. Readers should conduct their own research and consult qualified professionals before making any decisions related to digital assets, cryptocurrencies, or financial matters. ChainStreet.io and its contributors are not responsible for any losses incurred from reliance on this information.