North Korean Hackers Loot $500 Million in a Single Month, Becoming the Top Threat to Crypto Security

marsbitОпубликовано 2026-04-23Обновлено 2026-04-23

Введение

North Korean hackers, particularly the notorious Lazarus Group and its subgroup TraderTraitor, have stolen over $500 million from cryptocurrency DeFi platforms in less than three weeks, bringing their total theft for the year to over $700 million. Recent major attacks on Drift Protocol and KelpDAO, resulting in losses of approximately $286 million and $290 million respectively, highlight a strategic shift: instead of targeting core smart contracts, attackers are now exploiting vulnerabilities in peripheral infrastructure. For instance, the KelpDAO attack involved compromising downstream RPC infrastructure used by LayerZero's decentralized validation network (DVN), allowing manipulation without breaching core cryptography. This sophisticated approach mirrors advanced corporate cyber-espionage. Additionally, North Korea has systematically infiltrated the global crypto workforce, with an estimated 100 operatives using fake identities to gain employment at blockchain companies, enabling long-term access to sensitive systems and facilitating large-scale thefts. According to Chainalysis, North Korean-linked hackers stole a record $2 billion in 2025, accounting for 60% of all global crypto theft that year. Their total historical crypto theft has reached $6.75 billion. Post-theft, they employ specialized money laundering methods, heavily relying on Chinese OTC brokers and cross-chain mixing services rather than standard decentralized exchanges. Security experts, while acknowledgi...

Written by: Oluwapelumi Adejumo

Compiled by: Chopper, Foresight News

In less than three weeks, hacker groups linked to North Korea have stolen over $500 million from cryptocurrency DeFi platforms, shifting their attack vectors from core smart contracts to vulnerabilities in the infrastructure's periphery.

Attacks on Drift and KelpDAO

Two major attacks targeting Drift Protocol and KelpDAO have pushed the illicit cryptocurrency gains of North Korean hackers this year past $700 million. The massive losses highlight a tactical shift: they are increasingly exploiting complex vulnerabilities and deep personnel penetration to bypass standard security defenses.

On April 20th, cross-chain infrastructure provider LayerZero confirmed that KelpDAO was attacked on April 18th, resulting in a loss of approximately $290 million, making it the largest single crypto theft case so far in 2026. The company stated that preliminary forensics directly point to TraderTraitor—a specialized unit within North Korea's notorious Lazarus Group.

Just weeks earlier, on April 1st, the Solana-based decentralized perpetual exchange Drift Protocol was robbed of approximately $286 million. Blockchain intelligence firm Elliptic quickly linked the on-chain money laundering techniques, transaction sequences, and network signatures to known North Korean attack patterns, noting this was the 18th similar incident they have tracked this year.

Attack Shift: Infiltrating the Infrastructure Periphery

The methods used in the April attacks demonstrate the increasing sophistication of North Korean hackers' attacks on DeFi. They are no longer directly assaulting core smart contracts but are instead finding and attacking structural edge vulnerabilities.

Taking the KelpDAO attack as an example: the hackers compromised the downstream RPC (Remote Procedure Call) infrastructure used by LayerZero Labs' Decentralized Verification Network (DVN). By tampering with these critical data channels, the attackers manipulated the protocol's operation without breaching the core cryptography. LayerZero has disabled the affected nodes and fully restored the DVN, but the financial losses are irreversible.

This indirect method of attack reveals a frightening evolution in cyber warfare. Blockchain security company Cyvers told CryptoSlate that North Korean-linked attackers are becoming more sophisticated, investing more resources in attack preparation and execution.

The company added: "We also observe that they always manage to pinpoint the weakest link precisely. This time, the entry point was a third-party component, not the protocol's core infrastructure."

This strategy is highly similar to traditional corporate cyber espionage and also means that North Korean-linked attacks are becoming increasingly difficult to prevent. Recent events, such as Google researchers linking the supply chain compromise of the widely used Axios npm software package to the specific North Korean threat group UNC1069, indicate that attackers are systematically sabotaging software before it even enters the blockchain ecosystem.

North Korea Infiltrates Global Crypto Industry Practitioners

Beyond technical breakthroughs, North Korea is also conducting a large-scale, organized infiltration of the global cryptocurrency labor market.

The threat model has shifted completely from remote hacking operations to placing malicious personnel directly into unsuspecting Web3 startups.

A six-month investigation by the Ketman Project under the Ethereum Foundation's ETH Rangers security program reached a startling conclusion: approximately 100 North Korean cyber operatives are潜伏 (latent - *Note: The original Chinese term "潜伏" is kept here for accuracy, but the intended meaning is "lying dormant" or "embedded") within various blockchain companies. They use forged identities, easily pass standard HR screenings, obtain access to sensitive internal code repositories, lie dormant within product teams for months or even years, and then launch precise attacks.

Independent blockchain investigator ZachXBT further confirmed this intelligence agency-style潜伏 (dormancy). He recently exposed a North Korean special network that generates approximately $1 million per month through remote employment using fraudulent identities.

This scheme processes cryptocurrency-to-fiat transfers through recognized global financial channels and has handled over $3.5 million since late 2025.

According to industry insiders, the overall deployed IT personnel by North Korea generate millions of dollars in revenue monthly. This provides North Korea with a dual income stream: stable salary income + massive protocol thefts assisted by insiders.

$6.75 Billion Total Theft

The scale of North Korea's digital asset operations far surpasses any traditional cybercrime group. According to blockchain analytics firm Chainalysis: in 2025 alone, North Korean-linked hackers stole a record $2 billion, accounting for 60% of the global cryptocurrency theft total that year.

Considering the fierce attacks this year, the total value of crypto assets stolen by North Korea throughout history has reached $6.75 billion.

Once funds are acquired, the Lazarus Group exhibits a highly specific, regionalized money laundering pattern: unlike ordinary crypto criminals who frequently use DEXs and peer-to-peer lending protocols, North Korean hackers deliberately avoid these channels. On-chain data shows they heavily rely on escrow services in Chinese-speaking regions, deep over-the-counter (OTC) broker networks, and complex cross-chain mixing services. This preference points to structural limitations and geographically constrained cashing-out channels, rather than unrestricted access to the global financial system.

Can It Be Prevented?

Security researchers and industry executives believe it can be prevented, but crypto companies must address the same operational weaknesses exposed in multiple major attacks.

Humanity founder Terence Kwok told CryptoSlate that North Korean-linked attacks still point to common vulnerabilities, not new forms of cyber intrusion. He believes North Korean attackers are improving their intrusion methods and illicit fund transfer capabilities, but the root cause remains poor access control and centralized operational risks.

He explained: "What's shocking is that the losses are still attributed to old problems like access control and single points of failure. This shows the industry still hasn't solved the problem of basic security discipline."

Based on this, Kwok pointed out that the industry's first line of defense is to significantly increase the difficulty of unauthorized asset transfers by implementing stricter controls on private keys, internal permissions, and third-party access rights. In practice, companies need to reduce reliance on individual operators, restrict privileged access, harden supplier dependencies, and add more verification checks to the infrastructure between core protocols and the external world.

The second line of defense is speed. Once stolen funds cross chains, bridges, or enter money laundering networks, the probability of recovery drops sharply. Kwok stated that exchanges, stablecoin issuers, blockchain analysis companies, and law enforcement agencies must collaborate extremely quickly in the first few minutes and hours after an attack to increase the success rate of fund interception.

His words highlight an industry reality: the most fragile points of crypto systems are often at the intersection of code, personnel, and operations. A stolen credential, a weak supplier dependency, or an overlooked permission vulnerability is enough to cause losses amounting to hundreds of millions of dollars.

The challenge for DeFi is no longer just writing robust smart contracts, but defending the operational security at the protocol's periphery before attackers exploit the next weak link.

Связанные с этим вопросы

QWhat is the total amount of cryptocurrency stolen by North Korean hackers in the two major attacks on Drift Protocol and KelpDAO mentioned in the article?

AThe two major attacks on Drift Protocol and KelpDAO resulted in losses of approximately $286 million and $290 million respectively, totaling over $576 million, which contributed to North Korean hackers' illicit cryptocurrency gains exceeding $700 million for the year.

QHow have North Korean hackers shifted their attack strategies according to the article?

ANorth Korean hackers have shifted from directly attacking core smart contracts to exploiting structural edge vulnerabilities in infrastructure, such as compromising downstream RPC infrastructure used by decentralized validation networks (DVNs), as seen in the KelpDAO attack.

QWhat method are North Korean hackers using to infiltrate the global cryptocurrency workforce, as described in the article?

ANorth Korean hackers are conducting large-scale, organized infiltration by placing malicious personnel inside unsuspecting Web3 startups using forged identities, bypassing standard HR screenings, and gaining access to sensitive internal codebases to launch precise attacks after months or years of潜伏 (dormancy).

QWhat is the estimated total amount of cryptocurrency stolen by North Korea historically, as per the article?

AAccording to the article, North Korea has stolen a total of $6.75 billion in cryptocurrency historically, with a record $2 billion stolen in 2025 alone, accounting for 60% of global cryptocurrency theft that year.

QWhat are the key defensive measures suggested in the article to prevent such attacks?

AThe article suggests two key defensive measures: first, significantly increasing the difficulty of asset transfers by implementing stricter controls on private keys, internal permissions, and third-party access, reducing reliance on individual operators, and adding more checks between core protocols and external infrastructure; second, enhancing speed in response, where exchanges, stablecoin issuers, blockchain analysis firms, and law enforcement must collaborate rapidly within the first few minutes or hours after an attack to intercept funds.

Похожее

Polymarket's "2028 Presidential Election" Volume King Is... LeBron James???

An article from Odaily Planet Daily, authored by Azuma, discusses a peculiar phenomenon observed on the prediction market platform Polymarket regarding the "2028 US Presidential Election" event. Despite having a real-time probability of less than 1%, unlikely candidates such as NBA star LeBron James (with $48.41 million in trading volume), celebrity Kim Kardashian ($33.84 million), and even ineligible figures like Elon Musk ($23.14 million) and New York City Mayor Zohran Mamdani ($18.39 million) account for approximately 70% of the total trading volume. In contrast, high-probability candidates like Vice President JD Vance ($10.58 million), California Governor Gavin Newsom ($15.71 million), and Secretary of State Marco Rubio ($9.32 million) have significantly lower trading activity. The article explains that this counterintuitive trend is not driven by irrational speculation but by rational strategies. Polymarket offers a 4% annualized holding reward for certain markets, including the 2028 election, to maintain long-term pricing accuracy. This yield exceeds the current 5-year US Treasury rate (3.98%), attracting large investors ("whales") to hold "NO" shares on low-probability candidates for risk-free returns. Additionally, some users utilize a platform feature that allows converting a set of "NO" shares into corresponding "YES" shares for better liquidity or pricing efficiency, rather than directly buying "YES" shares for their preferred candidates. Thus, the seemingly absurd trading activity is strategically motivated.

marsbit42 мин. назад

Polymarket's "2028 Presidential Election" Volume King Is... LeBron James???

marsbit42 мин. назад

Dialogue with ViaBTC CEO Yang Haipo: Is the Essence of Blockchain a Libertarian Experiment?

"ViaBTC CEO Yang Haipo: Blockchain as a Hardcore Libertarian Experiment" In a deep-dive interview, ViaBTC CEO Yang Haipo reframes the essence of blockchain, arguing it is not merely a new technology or infrastructure but a hardcore libertarian experiment. This experiment, born from the 2008 financial crisis and decades of cypherpunk ideology, tests a fundamental question: to what extent can freedom and self-organization exist without centralized trust? The discussion highlights the experiment's verified outcomes. On one hand, it has proven its core value of censorship resistance, providing critical financial lifelines for entities like WikiLeaks and individuals in hyperinflationary or sanctioned countries via tools like stablecoins. However, Yang points out a key paradox: the most successful product, USDT, is itself a centralized compromise, showing users prioritize a less-controlled pipeline over pure decentralization. On the other hand, the experiment has exposed the severe costs of this freedom—a "dark forest" without safeguards. Events like the collapses of LUNA, Celsius, and FTX, resulting in massive wealth destruction and prison sentences for founders, underscore the system's fragility and the inherent risks of an unregulated environment. Yang observes that despite decentralized protocols, human nature inevitably recreates centralized power structures, speculative frenzies, and narrative-driven cycles (from ICOs to Meme coins), where emotion and belonging often trump technological substance. Looking forward, he believes blockchain's future is significant but niche. Its real value lies in serving specific, real-world needs for financial sovereignty and bypassing traditional controls, not as a universal infrastructure replacing all centralized systems. For the average participant, Yang's crucial advice is to cultivate independent judgment. True freedom is not holding a crypto wallet, but possessing a mind resilient to groupthink and narrative hype in a high-risk, often irrational market.

marsbit56 мин. назад

Dialogue with ViaBTC CEO Yang Haipo: Is the Essence of Blockchain a Libertarian Experiment?

marsbit56 мин. назад

Торговля

Спот
Фьючерсы
活动图片