North Korean Hackers Loot $500 Million in a Single Month, Becoming the Top Threat to Crypto Security

marsbitPublicado a 2026-04-23Actualizado a 2026-04-23

Resumen

North Korean hackers, particularly the notorious Lazarus Group and its subgroup TraderTraitor, have stolen over $500 million from cryptocurrency DeFi platforms in less than three weeks, bringing their total theft for the year to over $700 million. Recent major attacks on Drift Protocol and KelpDAO, resulting in losses of approximately $286 million and $290 million respectively, highlight a strategic shift: instead of targeting core smart contracts, attackers are now exploiting vulnerabilities in peripheral infrastructure. For instance, the KelpDAO attack involved compromising downstream RPC infrastructure used by LayerZero's decentralized validation network (DVN), allowing manipulation without breaching core cryptography. This sophisticated approach mirrors advanced corporate cyber-espionage. Additionally, North Korea has systematically infiltrated the global crypto workforce, with an estimated 100 operatives using fake identities to gain employment at blockchain companies, enabling long-term access to sensitive systems and facilitating large-scale thefts. According to Chainalysis, North Korean-linked hackers stole a record $2 billion in 2025, accounting for 60% of all global crypto theft that year. Their total historical crypto theft has reached $6.75 billion. Post-theft, they employ specialized money laundering methods, heavily relying on Chinese OTC brokers and cross-chain mixing services rather than standard decentralized exchanges. Security experts, while acknowledgi...

Written by: Oluwapelumi Adejumo

Compiled by: Chopper, Foresight News

In less than three weeks, hacker groups linked to North Korea have stolen over $500 million from cryptocurrency DeFi platforms, shifting their attack vectors from core smart contracts to vulnerabilities in the infrastructure's periphery.

Attacks on Drift and KelpDAO

Two major attacks targeting Drift Protocol and KelpDAO have pushed the illicit cryptocurrency gains of North Korean hackers this year past $700 million. The massive losses highlight a tactical shift: they are increasingly exploiting complex vulnerabilities and deep personnel penetration to bypass standard security defenses.

On April 20th, cross-chain infrastructure provider LayerZero confirmed that KelpDAO was attacked on April 18th, resulting in a loss of approximately $290 million, making it the largest single crypto theft case so far in 2026. The company stated that preliminary forensics directly point to TraderTraitor—a specialized unit within North Korea's notorious Lazarus Group.

Just weeks earlier, on April 1st, the Solana-based decentralized perpetual exchange Drift Protocol was robbed of approximately $286 million. Blockchain intelligence firm Elliptic quickly linked the on-chain money laundering techniques, transaction sequences, and network signatures to known North Korean attack patterns, noting this was the 18th similar incident they have tracked this year.

Attack Shift: Infiltrating the Infrastructure Periphery

The methods used in the April attacks demonstrate the increasing sophistication of North Korean hackers' attacks on DeFi. They are no longer directly assaulting core smart contracts but are instead finding and attacking structural edge vulnerabilities.

Taking the KelpDAO attack as an example: the hackers compromised the downstream RPC (Remote Procedure Call) infrastructure used by LayerZero Labs' Decentralized Verification Network (DVN). By tampering with these critical data channels, the attackers manipulated the protocol's operation without breaching the core cryptography. LayerZero has disabled the affected nodes and fully restored the DVN, but the financial losses are irreversible.

This indirect method of attack reveals a frightening evolution in cyber warfare. Blockchain security company Cyvers told CryptoSlate that North Korean-linked attackers are becoming more sophisticated, investing more resources in attack preparation and execution.

The company added: "We also observe that they always manage to pinpoint the weakest link precisely. This time, the entry point was a third-party component, not the protocol's core infrastructure."

This strategy is highly similar to traditional corporate cyber espionage and also means that North Korean-linked attacks are becoming increasingly difficult to prevent. Recent events, such as Google researchers linking the supply chain compromise of the widely used Axios npm software package to the specific North Korean threat group UNC1069, indicate that attackers are systematically sabotaging software before it even enters the blockchain ecosystem.

North Korea Infiltrates Global Crypto Industry Practitioners

Beyond technical breakthroughs, North Korea is also conducting a large-scale, organized infiltration of the global cryptocurrency labor market.

The threat model has shifted completely from remote hacking operations to placing malicious personnel directly into unsuspecting Web3 startups.

A six-month investigation by the Ketman Project under the Ethereum Foundation's ETH Rangers security program reached a startling conclusion: approximately 100 North Korean cyber operatives are潜伏 (latent - *Note: The original Chinese term "潜伏" is kept here for accuracy, but the intended meaning is "lying dormant" or "embedded") within various blockchain companies. They use forged identities, easily pass standard HR screenings, obtain access to sensitive internal code repositories, lie dormant within product teams for months or even years, and then launch precise attacks.

Independent blockchain investigator ZachXBT further confirmed this intelligence agency-style潜伏 (dormancy). He recently exposed a North Korean special network that generates approximately $1 million per month through remote employment using fraudulent identities.

This scheme processes cryptocurrency-to-fiat transfers through recognized global financial channels and has handled over $3.5 million since late 2025.

According to industry insiders, the overall deployed IT personnel by North Korea generate millions of dollars in revenue monthly. This provides North Korea with a dual income stream: stable salary income + massive protocol thefts assisted by insiders.

$6.75 Billion Total Theft

The scale of North Korea's digital asset operations far surpasses any traditional cybercrime group. According to blockchain analytics firm Chainalysis: in 2025 alone, North Korean-linked hackers stole a record $2 billion, accounting for 60% of the global cryptocurrency theft total that year.

Considering the fierce attacks this year, the total value of crypto assets stolen by North Korea throughout history has reached $6.75 billion.

Once funds are acquired, the Lazarus Group exhibits a highly specific, regionalized money laundering pattern: unlike ordinary crypto criminals who frequently use DEXs and peer-to-peer lending protocols, North Korean hackers deliberately avoid these channels. On-chain data shows they heavily rely on escrow services in Chinese-speaking regions, deep over-the-counter (OTC) broker networks, and complex cross-chain mixing services. This preference points to structural limitations and geographically constrained cashing-out channels, rather than unrestricted access to the global financial system.

Can It Be Prevented?

Security researchers and industry executives believe it can be prevented, but crypto companies must address the same operational weaknesses exposed in multiple major attacks.

Humanity founder Terence Kwok told CryptoSlate that North Korean-linked attacks still point to common vulnerabilities, not new forms of cyber intrusion. He believes North Korean attackers are improving their intrusion methods and illicit fund transfer capabilities, but the root cause remains poor access control and centralized operational risks.

He explained: "What's shocking is that the losses are still attributed to old problems like access control and single points of failure. This shows the industry still hasn't solved the problem of basic security discipline."

Based on this, Kwok pointed out that the industry's first line of defense is to significantly increase the difficulty of unauthorized asset transfers by implementing stricter controls on private keys, internal permissions, and third-party access rights. In practice, companies need to reduce reliance on individual operators, restrict privileged access, harden supplier dependencies, and add more verification checks to the infrastructure between core protocols and the external world.

The second line of defense is speed. Once stolen funds cross chains, bridges, or enter money laundering networks, the probability of recovery drops sharply. Kwok stated that exchanges, stablecoin issuers, blockchain analysis companies, and law enforcement agencies must collaborate extremely quickly in the first few minutes and hours after an attack to increase the success rate of fund interception.

His words highlight an industry reality: the most fragile points of crypto systems are often at the intersection of code, personnel, and operations. A stolen credential, a weak supplier dependency, or an overlooked permission vulnerability is enough to cause losses amounting to hundreds of millions of dollars.

The challenge for DeFi is no longer just writing robust smart contracts, but defending the operational security at the protocol's periphery before attackers exploit the next weak link.

Preguntas relacionadas

QWhat is the total amount of cryptocurrency stolen by North Korean hackers in the two major attacks on Drift Protocol and KelpDAO mentioned in the article?

AThe two major attacks on Drift Protocol and KelpDAO resulted in losses of approximately $286 million and $290 million respectively, totaling over $576 million, which contributed to North Korean hackers' illicit cryptocurrency gains exceeding $700 million for the year.

QHow have North Korean hackers shifted their attack strategies according to the article?

ANorth Korean hackers have shifted from directly attacking core smart contracts to exploiting structural edge vulnerabilities in infrastructure, such as compromising downstream RPC infrastructure used by decentralized validation networks (DVNs), as seen in the KelpDAO attack.

QWhat method are North Korean hackers using to infiltrate the global cryptocurrency workforce, as described in the article?

ANorth Korean hackers are conducting large-scale, organized infiltration by placing malicious personnel inside unsuspecting Web3 startups using forged identities, bypassing standard HR screenings, and gaining access to sensitive internal codebases to launch precise attacks after months or years of潜伏 (dormancy).

QWhat is the estimated total amount of cryptocurrency stolen by North Korea historically, as per the article?

AAccording to the article, North Korea has stolen a total of $6.75 billion in cryptocurrency historically, with a record $2 billion stolen in 2025 alone, accounting for 60% of global cryptocurrency theft that year.

QWhat are the key defensive measures suggested in the article to prevent such attacks?

AThe article suggests two key defensive measures: first, significantly increasing the difficulty of asset transfers by implementing stricter controls on private keys, internal permissions, and third-party access, reducing reliance on individual operators, and adding more checks between core protocols and external infrastructure; second, enhancing speed in response, where exchanges, stablecoin issuers, blockchain analysis firms, and law enforcement must collaborate rapidly within the first few minutes or hours after an attack to intercept funds.

Lecturas Relacionadas

$500 to Buy OpenAI Stock: Silicon Valley's Most Respectable Liquidity Invitation

Silicon Valley's largest venture capital platform, AngelList, has launched a new fund called USVC, allowing U.S. retail investors to buy into high-profile AI companies like OpenAI, Anthropic, and xAI with a minimum investment of $500—no accredited investor status required. Promoted by AngelList co-founder Naval Ravikant, the fund is framed as an opportunity for ordinary people to access high-growth private tech investments traditionally reserved for VCs. However, critics argue it functions more like an exit vehicle for early insiders. USVC acquires shares not through primary rounds but largely via secondary transactions—purchasing stakes from early investors, VC funds, and employees looking to cash out at peak valuations. With companies like xAI heavily weighted in the portfolio, the fund effectively channels retail money into providing liquidity for insiders who entered at much lower valuations. The fund’s structure raises concerns: shares are illiquid, with no secondary market, and buybacks are limited and discretionary. The actual annual fee reaches 3.61%, far above the advertised 1% management fee. This model parallels the "low float, high fully diluted valuation" strategy seen in crypto, where early investors profit by selling to latecomers at inflated prices. The timing—alongside similar moves by platforms like Robinhood—suggests that Silicon Valley’s sudden interest in retail inclusion may be less about democratizing access and more about securing exits for insiders.

marsbitHace 11 min(s)

$500 to Buy OpenAI Stock: Silicon Valley's Most Respectable Liquidity Invitation

marsbitHace 11 min(s)

Trading

Spot
Futuros
活动图片