North Korean Hackers Celebrate a 'Fat Year': Record $2.02 Billion Stolen in 2025, Money Laundering Cycle Approximately 45 Days

marsbit2026-01-10 tarihinde yayınlandı2026-01-10 tarihinde güncellendi

Özet

North Korean hackers set a record in 2025, stealing $2.02 billion in cryptocurrency, a 51% increase from 2024, despite a decrease in the number of attacks. Their cumulative thefts now total at least $6.75 billion. They achieved this by conducting fewer but more sophisticated attacks, often through infiltrating crypto services with IT workers or using complex impersonation strategies against executives. The overall crypto industry suffered over $3.4 billion in stolen funds. A key trend is the extreme concentration of losses, with the top three hacks accounting for 69% of the total. The disparity between the largest attack and the median hack reached a record 1000x. North Korean actors exhibited distinct money laundering patterns, heavily favoring Chinese OTC services, cross-chain bridges, and mixers. Their laundering cycle for major heists is approximately 45 days, moving through stages of immediate layering, initial consolidation, and final cash-out. Simultaneously, individual wallet thefts surged to 158,000 incidents affecting 80,000 users, though the total value stolen ($713 million) decreased. In a positive development, DeFi hacking losses remained low despite increased Total Value Locked (TVL), indicating improved security measures are having a significant impact. A case study of the Venus Protocol demonstrated effective real-time threat detection and fund recovery.

In response to the persistent attacks by North Korean hackers on the cryptocurrency industry, Chainalysis's 2025 Hacking Report provides a detailed analysis of their activities. The details are as follows.

Key Points:

· North Korean hackers stole $2.02 billion worth of cryptocurrency in 2025, a 51% increase year-over-year. Despite a decrease in the number of attacks, their cumulative theft total has reached $6.75 billion.

· North Korean hackers stole more cryptocurrency with fewer attacks, often by infiltrating crypto services with IT workers or using sophisticated impersonation tactics targeting executives.

· North Korean hackers show a clear preference for Chinese money laundering services, cross-chain bridge services, and mixing protocols. The money laundering cycle after major thefts is approximately 45 days.

· In 2025, individual wallet thefts surged to 158,000 incidents, affecting 80,000 users, although the total value stolen ($713 million) decreased compared to 2024.

· Despite an increase in Total Value Locked (TVL) in DeFi, hacking losses from 2024 to 2025 remained relatively low, indicating that improvements in security measures are having a significant effect.

In 2025, the crypto ecosystem faced severe challenges again, with stolen funds continuing to rise. Analysis reveals four key characteristics of crypto theft patterns: North Korean hackers remain the primary threat source; individual attacks targeting centralized services are becoming more severe; individual wallet theft incidents are surging; and DeFi hacking trends show an unexpected divergence.

Overall Situation: Over $3.4 Billion Stolen in 2025

From January to early December 2025, over $3.4 billion was stolen from the crypto industry, with the February attack on Bybit alone accounting for $1.5 billion.

The data also reveals significant changes in these theft incidents. Individual wallet thefts increased substantially, rising from 7.3% of the total stolen value in 2022 to 44% in 2024. Were it not for the massive impact of the Bybit attack, this proportion could have reached 37% in 2025.

Meanwhile, centralized services are suffering increasing losses due to sophisticated attacks targeting private key infrastructure and signing processes. Despite having institutional resources and professional security teams, these platforms remain vulnerable to threats that can bypass cold wallet controls. Although such intrusions are not frequent (as shown in the chart below), when they occur, they result in massive stolen funds, accounting for 88% of total losses in Q1 2025. Many attackers have developed methods to exploit third-party wallet integrations and trick signers into authorizing malicious transactions.

Although crypto security may have improved in some areas, the persistently high amount stolen indicates that attackers can still succeed through multiple avenues.

Top Three Hacks Account for 69% of Total Losses, Extreme Values Reach 1000x the Median

Fund theft incidents have historically been driven by extreme events, with most hacks being relatively small in scale, but a few being enormous. However, the situation worsened in 2025: the ratio between the largest hack and the median of all incidents broke the 1000x threshold for the first time. The funds stolen in the largest attacks are now 1000 times those in ordinary incidents, even exceeding the peak during the 2021 bull market. These calculations are based on the USD value of the stolen funds at the time of theft.

This widening gap leads to highly concentrated losses. The top three hacks in 2025 accounted for 69% of all losses, with individual events having an exceptionally significant impact on the annual total. Although attack frequency may fluctuate, and the median loss increases with rising asset prices, the potential loss from individual major vulnerabilities is rising at an even faster rate.

Despite a Decrease in Confirmed Attacks, North Korea Remains the Primary Threat

Despite a significant drop in attack frequency, North Korea remains the most serious threat to crypto security, stealing a record high of at least $2.02 billion in cryptocurrency funds in 2025 ($681 million more than in 2024), a year-over-year increase of 51%. In terms of value stolen, this is the worst year on record for North Korean cryptocurrency thefts. Attacks attributed to North Korea accounted for 76% of all intrusions, a historical high. Overall, the cumulative total stolen by North Korea has reached a conservative estimate of $6.75 billion.

North Korean hackers are increasingly gaining privileged access and carrying out major attacks by placing IT personnel (a primary attack vector) inside crypto services. This year's record thefts may partly reflect North Korea's increased reliance on infiltrating exchanges, custodians, and Web3 companies with IT workers, which can expedite initial access and lateral movement, creating conditions for large-scale theft.

However, recent hacker groups linked to North Korea have completely subverted this IT worker model. Instead of just applying for jobs and infiltrating as employees, they are increasingly impersonating recruiters from well-known Web3 and AI companies, orchestrating fake hiring processes that ultimately obtain victims' login details, source code, and access to their current employer's VPN or Single Sign-On (SSO) under the guise of "technical screening." At the executive level, similar social engineering tactics appear as contact from fake strategic investors or acquirers, who use pitch meetings and pseudo due diligence to probe for sensitive system information and potentially high-value infrastructure—an evolution built directly upon North Korean IT worker fraud operations and focused on strategically important AI and blockchain companies.

As seen in past years, the value of ongoing cyberattacks by North Korea far exceeds that of other hackers. As shown in the chart below, from 2022 to 2025, North Korean hacks occupy the highest value brackets, while non-North Korean hacks show a more normal distribution across all theft sizes. This pattern further suggests that when North Korean hackers strike, they target large services, aiming for maximum impact.

This year's record losses come from a significant reduction in known incidents. This shift (fewer incidents but much larger losses) reflects the impact of the massive Bybit hack in February 2025.

North Korea's Unique Money Laundering Patterns

The influx of a large amount of stolen funds in early 2025 reveals how North Korean hackers launder cryptocurrency on a large scale. Their patterns are distinct from other cybercriminals and have evolved over time.

North Korea's money laundering activities show a distinct "bucketing" pattern, with over 60% of transaction volumes concentrated below $500,000. In contrast, other hackers batch over 60% of their on-chain movements in the $1 million to over $10 million range. Although North Korea launders larger amounts per incident than other hackers, they break on-chain transfers into smaller batches, highlighting the sophistication of their laundering methods.

Compared to other hackers, North Korea shows clear preferences in certain laundering channels:

North Korean hackers tend to favor:

· Chinese fund transfer and escrow services (+355% to over 1000%): This is the most distinctive feature, showing heavy reliance on Chinese escrow services and money laundering networks composed of numerous operators potentially subject to weaker compliance controls.

· Cross-chain bridge services (+97%): High reliance on cross-chain bridges to move assets between blockchains and attempt to increase tracing difficulty.

· Mixing services (+100%): Greater use of mixing services to attempt to obscure fund flows.

· Specialized services like Huione (+356%): Strategic use of specific services to aid their laundering activities.

Other hackers involved in money laundering tend to favor:

· Lending protocols (-80%): North Korea avoids these DeFi services, indicating limited integration with the broader DeFi ecosystem.

· Non-KYC exchanges (-75%): Surprisingly, other hackers use non-KYC exchanges more than North Korea.

· P2P exchanges (-64%): North Korea shows limited interest in P2P platforms.

· CEXs (-25%): Other hackers have more direct interaction with traditional exchanges.

· DEXs (-42%): Other hackers prefer DEXs due to high liquidity and anonymity.

These patterns suggest North Korean operations are subject to different constraints and objectives than non-state-sponsored cybercriminals. Their heavy use of specialized Chinese money laundering services and over-the-counter (OTC) traders indicates tight links between North Korean hackers and illicit actors in the Asia-Pacific region.

Timeline of Money Laundering for Stolen Funds After North Korean Hacks

Analysis of on-chain activity following hacking incidents attributed to North Korea between 2022-2025 reveals consistent patterns linking these events to the flow of stolen funds within the crypto ecosystem. Following major thefts, stolen funds follow a structured, multi-stage money laundering path, a process lasting approximately 45 days:

Stage 1: Immediate Layering (Days 0-5)

In the first few days after a hack occurs, a flurry of activity is observed, focused on immediately moving funds away from the compromised source:

· Stolen fund flows to DeFi protocols see the largest increase (+370%), serving as the primary entry point.

· Mixing service volumes also rise significantly (+135-150%), constituting the first layer of obfuscation.

· This stage represents an urgent "first step" action aimed at creating distance from the initial theft.

Stage 2: Initial Consolidation (Days 6-10)

Moving into the second week, laundering strategies shift towards services that help integrate funds into the broader ecosystem:

· Exchanges with fewer KYC restrictions (+37%) and CEXs (+32%) begin receiving fund flows.

· Second-layer mixing services (+76%) continue laundering activities at a lower intensity.

· Cross-chain bridging (e.g., XMRt, +141%) helps disperse and obscure flows across blockchains.

· This stage is a critical transition period where funds begin flowing towards potential off-ramps.

Stage 3: Long-Tail Consolidation (Days 20-45)

The final stage shows a clear preference for services enabling final conversion to fiat or other assets:

· Usage of non-KYC exchanges (+82%) and escrow services (e.g., Tudo Escrow, +87%) grows significantly.

· Instant exchanges (+61%) and Chinese platforms (e.g., Huiwang, +45%) become final cash-out points.

· CEXs (+50%) also receive funds, indicating sophisticated attempts to commingle funds with legitimate ones.

· Less regulated jurisdictions, such as Chinese money laundering networks (+33%) and platforms like Grinex (+39%), complete this pattern.

This typically 45-day operational window for money laundering provides critical intelligence for law enforcement and compliance teams. The persistence of this pattern over years suggests North Korean hackers face operational constraints, likely related to their limited access to financial infrastructure and the need to coordinate with specific intermediaries.

Although these hackers don't always follow this exact timeline—some stolen funds lie dormant for months or years—this pattern represents their typical on-chain behavior when actively laundering. Furthermore, it's essential to recognize potential blind spots in this analysis, as certain activities (like private key transfers or OTC crypto-to-fiat exchanges) are not visible on-chain without corroborating intelligence.

Individual Wallet Thefts: Growing Threat to Individual Users

Analysis of on-chain patterns, along with reports from victims and industry partners, provides insight into the severity of individual wallet thefts, although the actual number is likely much higher. Conservatively estimated, losses from individual wallet thefts accounted for 20% of total losses in 2025, down from 44% in 2024, indicating a shift in both scale and pattern. The total number of theft incidents in 2025 surged to 158,000, nearly triple the 54,000 recorded in 2022. The number of victims increased from 40,000 in 2022 to at least 80,000 in 2025. This significant growth is likely due to broader cryptocurrency adoption. For instance, Solana, one of the blockchains with the most active individual wallets, led in the number of theft incidents (approximately 26,500 victims).

However, despite the increase in incidents and victims, the total USD amount stolen per victim decreased from the 2024 peak of $1.5 billion to $713 million in 2025. This suggests attackers are targeting more users, but stealing less from each victim.

Victim data for specific networks provides more insight into which areas pose the greatest threat to crypto users. The chart below shows victim data adjusted for active individual wallets per network. Measured by the 2025 crime rate per 100,000 wallets, Ethereum and Tron have the highest theft rates. Ethereum's large user base indicates both a high theft rate and a high number of victims, while Tron's ranking shows a high theft rate despite a smaller number of active wallets. In contrast, Base and Solana show lower victimization rates despite their large user bases.

This indicates that security risks for individual wallets are not uniform across the crypto ecosystem. Even with similar technical architectures, victimization rates vary between blockchains, suggesting that factors beyond technology—such as user demographics, popular applications, and criminal infrastructure—play significant roles in determining theft rates.

DeFi Hacks: Diverging Patterns Signal Market Shift

The DeFi sector presented unique patterns in the 2025 crime data, showing a clear departure from historical trends.

The data reveals three distinct phases:

· Phase 1 (2020-2021): DeFi TVL and hacking losses grew in sync.

· Phase 2 (2022-2023): Both metrics declined together.

· Phase 3 (2024-2025): TVL recovered, while hacking losses remained stable.

The first two phases followed an intuitive pattern: more value at risk meant more value to steal, and hackers targeted high-value protocols more aggressively. As bank robber Willie Sutton said, "Because that's where the money is."

This makes the divergence in Phase 3 even more notable. DeFi TVL has rebounded significantly from the 2023 lows, but losses from hacks have not followed suit. Despite billions flowing back into these protocols, DeFi hacks have remained persistently low, representing a significant change.

Two factors may explain this divergence:

· Improved Security: Despite growing TVL, hack rates have continued to fall, suggesting DeFi protocols may be implementing more effective security measures than during the 2020-2021 period.

· Shift in Targets: The concurrent rise in individual wallet thefts and centralized service attacks suggests attacker attention may be shifting to other targets.

Case Study: Venus Protocol's Security Response

The September 2025 incident involving the Venus protocol demonstrates that improved security measures are having a tangible effect. At that time, an attacker used a compromised Zoom client to gain system access and tricked a user into granting delegation authority for a $13 million account, a situation that could have had disastrous consequences. However, Venus had恰好 enabled Hexagate's security monitoring platform just one month prior.

The platform detected suspicious activity 18 hours before the attack and issued another alert as soon as the malicious transaction occurred. Within 20 minutes, Venus paused its protocol, preventing any fund movement. This coordinated response showcases the evolution of DeFi security:

· Within 5 hours: Partial functionality restored after security checks.

· Within 7 hours: Forced liquidation of the attacker's wallet.

· Within 12 hours: Full recovery of stolen funds and service restoration.

Most notably, Venus passed a governance proposal freezing $3 million in assets still controlled by the attacker; the attacker not only failed to profit but lost funds.

This incident shows tangible improvements in DeFi security infrastructure. The combination of proactive monitoring, rapid response capabilities, and governance mechanisms able to act decisively makes the ecosystem more agile and resilient. Although attacks still occur, the ability to detect, respond to, and even reverse attacks represents a fundamental shift from the early DeFi era, where successful attacks often meant permanent loss.

Implications for 2026 and Beyond

The 2025 data paints a picture of North Korea's sophisticated evolution as the crypto industry's greatest threat. The country is carrying out fewer attacks but with dramatically greater impact, suggesting increasingly sophisticated and patient methods. The influence of the Bybit event on its annual activity pattern indicates that when North Korea succeeds in a major theft, it reduces its operational tempo, focusing instead on money laundering.

For the crypto industry, this evolution demands increased vigilance regarding high-value targets and improved identification of North Korea-specific money laundering patterns. Their consistent preference for specific service types and transfer amounts provides detection opportunities, distinguishing them from other criminals and helping investigators identify their on-chain behavioral signatures.

As North Korea continues to leverage cryptocurrency theft to fund national priorities and evade international sanctions, the crypto industry must recognize that its operational rhythms differ starkly from typical cybercriminals. North Korea's record performance in 2025 (with a 74% reduction in known attacks) suggests that we may only be seeing the most visible portion of its activity currently. The challenge for 2026 is detecting and disrupting these operations before North Korea launches another Bybit-scale attack.

İlgili Sorular

QHow much cryptocurrency did North Korean hackers steal in 2025, and what was the percentage increase compared to the previous year?

ANorth Korean hackers stole $2.02 billion worth of cryptocurrency in 2025, which represents a 51% increase compared to the previous year.

QWhat is the typical money laundering cycle for North Korean hackers after a major theft, and what are the preferred services they use?

AThe typical money laundering cycle for North Korean hackers after a major theft is approximately 45 days. They show a strong preference for Chinese money laundering services, cross-chain bridges, and mixing protocols.

QDespite an increase in DeFi Total Value Locked (TVL), why did hacking losses remain low in 2024-2025?

ADespite the increase in DeFi TVL, hacking losses remained low, indicating that improved security measures are having a significant effect and that attackers may be shifting their focus to other targets like individual wallets and centralized services.

QWhat was a key change in the strategy of North Korean hackers regarding personnel infiltration in 2025?

AA key change in their strategy was a shift from simply applying for jobs to infiltrate companies to increasingly impersonating recruiters from well-known Web3 and AI companies. They used elaborate fake hiring processes to ultimately gain access to victims' credentials, source code, and VPN or SSO access under the guise of a 'technical screening'.

QWhat does the case study of the Venus Protocol attack in September 2025 demonstrate about the evolution of DeFi security?

AThe Venus Protocol case study demonstrates a significant evolution in DeFi security. Through proactive monitoring, rapid response capabilities, and effective governance mechanisms, the protocol was able to detect suspicious activity, halt the attack, recover all stolen funds, and even freeze the attacker's remaining assets, turning a potential major loss into a successful defense.

İlgili Okumalar

Only a 50% Chance of Passing This Year, Can the CLARITY Bill Succeed Before the Midterm Elections?

The CLARITY Act, which passed the House in July 2025 with strong bipartisan support (294-134), faces a critical juncture in the Senate. The Senate Banking Committee is expected to hold a markup soon, but key issues remain unresolved, including stablecoin yield provisions, DeFi regulations, and securing full Republican committee support. Other contentious points involve the Blockchain Regulatory Certainty Act (BRCA), ethics amendments for government officials, and SEC-related matters. The legislative calendar is tight, with limited time before the midterm elections. If the committee markup is delayed beyond mid-May, the chances of passage in 2026 drop significantly. Senator Cynthia Lummis has warned that failure this year could delay comprehensive crypto market structure legislation until 2030 or later. Galaxy estimates the probability of the CLARITY Act becoming law in 2026 is only about 50%. The bill provides crucial regulatory clarity by defining jurisdictional boundaries between the SEC and CFTC, establishing a path for decentralization, and bringing digital commodity intermediaries under federal regulation. Its passage is seen as vital before potential power shifts in the next Congress, which could bring less favorable leadership to key committees. The timeline is compressed, and the bill must compete for floor time with other priorities like Iran authorization and DHS appropriations. Key hurdles include finalizing the stablecoin yield compromise text, addressing law enforcement concerns about BRCA, and navigating political dynamics around SEC nominations. The outcome of the Banking Committee markup and the level of bipartisan support will be critical indicators of its future success.

marsbit5 dk önce

Only a 50% Chance of Passing This Year, Can the CLARITY Bill Succeed Before the Midterm Elections?

marsbit5 dk önce

Dialogue with Xinhuo Chief Economist Fu Peng: Macro Bear Market Expected to End This Year, Prioritize Allocation to Value Assets

Fu Peng, Chief Economist at New Huo Group, discusses the integration of crypto assets into traditional finance, marking a shift from a speculative phase to institutionalization. He highlights the current era as the second major fusion of finance and technology, driven by AI, data, and computing power, with crypto assets becoming part of the FICC+C (Fixed Income, Currencies, Commodities + Crypto) framework. Regulatory clarity in the U.S., such as the GENIUS and Clarity Acts, has paved the way for institutional adoption by defining digital assets as financial instruments. Fu views RWA (Real World Assets) as a tool for asset tokenization rather than a standalone asset class, noting that financial innovation differs between Eastern and Western markets due to cultural approaches to risk and regulation. He emphasizes that stablecoins are essential for future finance, but Asian markets, including Hong Kong, will adopt them cautiously. Macro liquidity now significantly influences crypto markets, as institutional participation increases correlation with traditional assets. Fu suggests the macro-driven bear market may end by year-end, reducing the relevance of Bitcoin’s four-year cycle. For asset allocation, he recommends value-oriented AI stocks for stability, Bitcoin for moderate certainty, and Ethereum for higher volatility.

marsbit13 dk önce

Dialogue with Xinhuo Chief Economist Fu Peng: Macro Bear Market Expected to End This Year, Prioritize Allocation to Value Assets

marsbit13 dk önce

Only a 50% Chance of Passing This Year, Can the CLARITY Bill Succeed Before the Midterm Elections?

The CLARITY Act, which passed the U.S. House in July 2025 with strong bipartisan support (294-134), faces a critical juncture in the Senate. The Senate Banking Committee is expected to hold a markup soon, but key issues remain unresolved, including stablecoin yield provisions, DeFi regulations, and securing full Republican committee support. Additional challenges involve the Blockchain Regulatory Certainty Act (BRCA), ethics amendments for government officials, and SEC-related concerns. Galaxy estimates only a 50% chance of the bill becoming law in 2026. The tight legislative calendar, competing priorities like Iran military authorization and DHS appropriations, and the impending midterm elections create significant time pressure. If the bill is not passed before the new Congress convenes in 2027, comprehensive crypto market structure legislation could be delayed until 2030 or later, especially if leadership changes result in less favorable committee chairs. The act provides crucial regulatory clarity by defining the jurisdictional boundaries between the SEC and CFTC, establishing a path for decentralized networks to be classified as non-securities, and bringing digital commodity intermediaries under federal regulation. The outcome of ongoing Senate negotiations, particularly the release of revised text on stablecoin yields, will be a key indicator of its future prospects.

Odaily星球日报15 dk önce

Only a 50% Chance of Passing This Year, Can the CLARITY Bill Succeed Before the Midterm Elections?

Odaily星球日报15 dk önce

Four-Dimensional Resonance: Hong Kong Web3 Carnival Sub-Forum Co-Creates Blueprint for Global Financial New Infrastructure

The "Four-Dimensional Resonance: 2026 Global Financial New Infrastructure" forum, a core event of the Hong Kong Web3 Festival, was successfully held at the Hong Kong Convention and Exhibition Centre. Co-hosted by Web3Labs and DeShang Singularity Tech, with joint support from Bitroot, Injective, Microsoft, and Z Oracle, the event gathered policymakers, industry leaders, and investors to explore the integration and innovation of global financial infrastructure, focusing on RWA, AI, DeFi, and compliant payments. Policy speakers, including Hong Kong Legislative Council Member Mr. Wu Jiezhuang, South Korean National Assembly Member Mr. Min Byung-duk, and ACED Chairman Mr. Yun Seok-hun, emphasized the importance of cross-border regulatory collaboration and an open policy environment for fintech innovation. Web3Labs CEO Caspar and DeShang Singularity Tech CEO Chang Shuai highlighted Hong Kong’s role as a financial innovation center and the approaching "singularity moment" for global financial infrastructure. Technical insights were shared by MagnetX, Bitroot, Microsoft, and Injective on topics including AI Agent economies, the evolution of public blockchains, and AI’s transformative role in finance. Key partnerships and initiatives were launched: - GWDC 2026 Korea collaboration between Hong Kong and South Korea. - A strategic agreement between Web3Labs and Microsoft. - The launch of a public anti-fraud alliance by Z Oracle and partners. - The "Injective Rising Star" program to support AI and Web3 projects. Panel discussions delved into AI-driven smart payments, compliant cross-border transactions, and the fusion of RWA and DeFi. Participants agreed that integrating RWA with DeFi is crucial for the next stage of financial infrastructure, enabling a shift from physical to digital finance. The forum underscored Hong Kong’s pivotal role in advancing a globalized and sustainable Asian fintech ecosystem.

marsbit24 dk önce

Four-Dimensional Resonance: Hong Kong Web3 Carnival Sub-Forum Co-Creates Blueprint for Global Financial New Infrastructure

marsbit24 dk önce

İşlemler

Spot
Futures
活动图片