North Korean Hackers Steal Record $2B Crypto in 2025

North Korean Hackers Steal Record $2B Crypto in 2025
Listen 6:30
Takeaways
Hide
  • North Korean operatives shifted tactics in 2025, moving from DeFi exploits to targeting centralized exchanges (CEXs) via social engineering.
  • The regime stole a record $2.02 billion, with the massive $1.5 billion Bybit breach driving a 45% year-over-year surge in illicit revenue.
  • Analysts warn this "industrial-scale" theft now functions as a sovereign revenue stream, directly funding nuclear programs while bypassing sanctions.

North Korean hackers stole a record $2.02 billion in cryptocurrency throughout 2025, effectively establishing cyber-theft as a primary sovereign revenue stream for the isolated regime.

Data released Monday in a joint report by blockchain intelligence firms Chainalysis and TRM Labs confirms a 45% year-over-year increase in stolen funds compared to 2024. The surge stems from a strategic pivot: Pyongyang’s operatives have abandoned complex decentralized finance (DeFi) exploits to target the systemic vulnerabilities of centralized exchanges (CEXs).

Centralized infrastructure accounted for 70% of successful exploits in 2025, a sharp reversal from the DeFi-heavy attacks that defined the previous cycle.

Targeting the Centralized Gatekeepers

The shift to centralized targets suggests a “professionalization” of cyber capabilities of North Korean hackers. Rather than relying solely on technical smart contract failures, groups such as Lazarus and APT38 focused on social engineering and administrative weaknesses within major liquidity hubs.

“The data indicates an industrial-scale approach to compromising centralized entities,” said Ari Redbord, Global Head of Policy at TRM Labs. “We are seeing less reliance on ‘smash and grab’ DeFi hacks and more sophisticated, long-con operations aimed at the human and institutional gates guarding exchange wallets.”

The largest single contributor to the 2025 total was the February breach of Dubai-based exchange Bybit, where attackers drained $1.5 billion. The FBI and on-chain analysts linked the incident to compromised private keys obtained through a targeted phishing campaign against senior engineers, a hallmark of the new CEX-focused strategy.

Bridge Hopping and Laundering

While the theft occurred on centralized platforms, the laundering process remained deeply embedded in decentralized protocols. The report notes that over $800 million of the stolen funds were washed using “chain hopping” techniques across cross-chain bridges.

North Korean hackers utilized automated scripts to move assets rapidly between blockchains, specifically utilizing the ThorChain and LayerZero protocols, to obfuscate the transaction trail before converting funds into USDT on the Tron network. This volume of cross-chain laundering represents a record high, complicating efforts by the Office of Foreign Assets Control (OFAC) to freeze assets.

Sovereign Revenue Stream

The scale of the 2025 thefts highlights the degree to which cryptocurrency theft has become a macroeconomic necessity for North Korea. The $2.02 billion figure rivals the nation’s traditional annual exports, effectively functioning as a state-funded ATM that bypasses global banking sanctions.

The United Nations Security Council flagged this connection in a November briefing, warning that the revenue directly funds the DPRK’s nuclear and ballistic missile programs.

“These are not rogue hackers,” Chainalysis noted in the report. “This is a geopolitical strategy where a nation-state is systematically draining the crypto ecosystem to fund military objectives.”

Major global exchanges have accelerated the rollout of mandatory hardware key authentication for administrative staff this quarter, citing the escalating threat profile from state actors.

Chain Street’s Take

The $2 billion figure is staggering, but the “how” is more important than the “how much.” North Korean hackers have proven that the blockchain’s immutability is irrelevant if the people holding the keys can be compromised

By shifting 70% of their attacks to centralized exchanges, they aren’t hacking code anymore, they are hacking human resources and corporate hierarchy. This is no longer a crypto-native security problem; it is a global counter-intelligence failure. 

Until exchanges treat their admin keys like nuclear launch codes, this sovereign revenue stream isn’t going anywhere.

Frequently Asked Questions

1. How much cryptocurrency did North Korea steal in 2025?
Show

North Korean state-backed hackers stole a record $2.02 billion throughout 2025. This figure represents a 45% increase compared to 2024, confirmed by data from Chainalysis and TRM Labs. The surge establishes cyber-theft as a primary economic engine for the isolated regime.

2. Why did hackers pivot to centralized exchanges (CEXs)?
Show

Attackers shifted focus to CEXs to exploit human vulnerabilities rather than code, accounting for 70% of successful attacks. Groups like Lazarus utilized targeted phishing against administrative staff to compromise private keys. This "long-con" strategy proved more lucrative than previous DeFi smart contract exploits.

3. What was the largest crypto hack of 2025?
Show

The largest incident was the February breach of the Dubai-based exchange Bybit, where attackers drained $1.5 billion. The FBI linked the theft to compromised administrative keys obtained through a sophisticated social engineering campaign. This single event contributed the majority of the year's total illicit volume.

4. How are the stolen funds being laundered?
Show

Hackers utilize "chain hopping" techniques across cross-chain bridges like ThorChain and LayerZero to obfuscate transaction trails. The report notes over $800 million was washed through these protocols before being converted into USDT on the Tron network. This complex layering makes it difficult for OFAC to freeze assets effectively.

5. What is the geopolitical impact of these thefts?
Show

The stolen funds directly finance North Korea’s nuclear and ballistic missile programs. The UN Security Council identifies this revenue as a critical tool for bypassing global banking sanctions. Experts describe the operation not as rogue hacking, but as a strategic military objective.

The author, a seasoned journalist with no cryptocurrency holdings, presents this article for informational purposes only. It does not constitute investment advice or an endorsement of any cryptocurrency, security, or other financial instrument. Readers should conduct their own research and, if needed, consult a licensed financial professional before making any financial decisions.