North Korea Was Responsible for Over $600M in Crypto Thefts Last Year: TRM Labs

CoinDeskPolicy发布于2024-01-04更新于2024-01-05

文章摘要

U.S. national security officials have raised concerns about North Korea's use of stolen crypto to develop nuclear weapons.

North Korea-affiliated hackers were involved in a third of all crypto exploits and thefts last year, making off with some $600 million in funds, according to a report from TRM Labs.

The sum brings the Democratic People's Republic of Korea's (DPRK) total take from crypto projects to almost $3 billion over the past six years, the blockchain analytics firm said Friday.

Still, the figure is about 30% less than in 2022, TRM's Ari Redbord said. That year, DPRK-affiliated actors made off with around $850 million, "a huge chunk" of which came from the Ronin Bridge exploit, Redbord told CoinDesk in an interview. In 2023, most of the stolen funds were taken in the last few months; TRM attributed about $200 million in stolen funds to North Korea in August 2023.

Advertisement
Advertisement

"They're clearly attacking the crypto ecosystem at a really unprecedented speed and scale and continue to take advantage of sort of weak cyber controls," he said.

Many of the attacks continue to use so-called social engineering, allowing the perpetrators to acquire private keys for projects, he said.

Overall, the amount stolen in hacks in 2023 was roughly half that taken the previous year – $1.7 billion compared with $4 billion.

Redbord attributed the drop to several factors. There were fewer major hacks like 2022's Ronin theft, and other factors include successful law enforcement actions, better cybersecurity controls and, to a limited extent, price volatility over the past year.

What makes North Korean attacks stand out is that proceeds go toward the development of weapons of mass destruction, raising national security concerns.

"North Korean hackers are different, because it's not for greed or money or the typical hacker mentality; it's about taking those funds and using them for weapons proliferation and other types of destabilizing activity, which is a global threat," he said. "And that's why there's such a focus on it from a national security perspective."

National security officials in the U.S., Republic of Korea and Japan have directly mentioned these concerns in a recent trilateral meeting about North Korea's WMD efforts.

Advertisement
Advertisement

"Ronin really changed that conversation to a national security conversation," Redbord said. "Ronin was the first time we saw U.S. Treasury designate North Korea-related addresses, and it was the addresses that the original funds went off to ... and then the next two addresses. This is what started the whole Tornado Cash sanctions, and then Blender.io and now Sinbad, so it's a whole-of-government approach to go after this issue."

Edited by Sheldon Reback.

你可能也喜欢

SpaceX绑定Cursor:一场“先锁定再收购”的AI豪赌

SpaceX宣布获得以600亿美元收购AI编程公司Cursor的选择权,并设定了若不收购则需支付100亿美元合作费用的替代条款。这一交易结构极具弹性,本质上是一种“期权式收购”,使SpaceX能够在承担有限风险的同时,高度绑定Cursor的技术与商业轨道。 交易核心是AI时代关键资源的交换:SpaceX提供其Colossus超级计算集群的算力,而Cursor则贡献其在开发者群体中的产品渗透力和AI编程技术。这种合作打通了“算力—模型—应用”的完整链条,弥补了SpaceX在应用层尤其是开发者工具领域的短板。 Cursor作为“AI原生开发环境”,其价值在于深度嵌入软件开发流程,代表软件生产方式的变革。尽管仅成立数年,其估值已跃升至600亿美元,年收入超10亿美元,反映出市场对其控制未来开发入口的高度认可。 从战略角度看,这是马斯克将SpaceX从航天公司转型为“AI基础设施平台”的关键一步,通过整合xAI、超算和芯片制造,构建覆盖算力、模型与应用的闭环体系,为其IPO提供更具吸引力的叙事基础。 行业竞争逻辑正从模型能力转向入口与生态之争,编程工具成为核心入口之一。SpaceX通过此举争夺程序员群体,意图在未来软件生产体系中占据主导位置。 然而,交易也存在估值过高、技术整合不确定性及监管风险。但无论如何,其真正意义在于提前锁定AI时代软件开发这一核心生产入口,押注通过控制算力与入口重新定义技术权力的分配方式。

marsbit1小时前

SpaceX绑定Cursor:一场“先锁定再收购”的AI豪赌

marsbit1小时前

交易

现货
合约
活动图片