How DPRK Hackers Use Cross-Chain Crypto Laundering to Evade Detection

How DPRK Hackers Use Cross-Chain Crypto Laundering to Evade Detection
28 Comments

Crypto Laundering Path Calculator

Laundering Calculation

$

Laundering Process Visualization

Enter values above to see the laundering path visualization

Estimated Recovery Rate: 100%

Estimated time to trace: 5-7 days

Based on current blockchain analytics capabilities

North Korean hackers aren’t just stealing crypto-they’re rewriting the rules of how money moves online. In 2025, a single attack on Bybit drained over $1.5 billion in cryptocurrency, making it the largest crypto heist in history. That’s more than all of North Korea’s crypto thefts in 2023 combined. And this isn’t an anomaly. It’s the new normal.

Why Cross-Chain Laundering Is the New Weapon of Choice

Years ago, hackers used mixing services like Tornado Cash to hide stolen funds. But as regulators cracked down, those tools became too risky. So North Korea’s cyber units, especially the Lazarus Group, switched tactics. Now, they don’t just hide money-they bounce it between blockchains.

Cross-chain bridges are the key. These are platforms designed to let users move assets between networks like Ethereum, Bitcoin, Tron, and Solana. But they’re not built for security. They’re built for speed. And that’s exactly what DPRK hackers exploit.

Here’s how it works: after stealing Ethereum from an exchange, they instantly swap it into TRC-20 tokens on Tron. Then they use the Avalanche Bridge to convert those into Bitcoin. From there, they move it to BitTorrent Chain, then back to Ethereum-all within minutes. Each hop breaks the trail. Each swap adds confusion. By the time analysts catch up, the money has vanished into dozens of addresses across six different chains.

TRM Labs found that Lazarus Group deposited over 9,500 BTC through the Avalanche Bridge alone. That’s not a typo. Nine thousand five hundred Bitcoin. At today’s prices, that’s worth more than $600 million. And they’re not slowing down.

The "Flood the Zone" Strategy

North Korean hackers don’t rely on stealth anymore. They rely on volume.

Nick Carlsen, a former FBI cyber expert and now lead analyst at TRM Labs, calls it "flood the zone." Instead of trying to hide one large transaction, they send hundreds of tiny ones at once-across multiple bridges, exchanges, and blockchains. It’s like throwing a handful of sand into a hurricane. No one can track every grain.

In the Bybit breach alone, investigators traced over 1,200 separate cross-chain swaps in the first 72 hours. The hackers used automated scripts to run these transactions nonstop. They didn’t wait for confirmation. They didn’t care if a transaction failed. They just kept sending. And because exchanges and analysts are overwhelmed, many of these transfers slip through.

This isn’t just clever. It’s strategic. North Korea knows that law enforcement can trace one big transfer. But when you’re dealing with 500 small ones spread across five networks? It’s nearly impossible.

From Exchanges to People

The targets have changed, too.

In 2023, most attacks hit centralized exchanges-Bybit, CoinEx, Stake.com. But in 2025, hackers are going after individuals. High-net-worth crypto holders. Company executives. Even crypto influencers.

Why? Because their security is weaker. Most people don’t use hardware wallets. They store keys on phones or laptops. Hackers don’t need to break into a billion-dollar exchange. They just need to trick one person into clicking a fake job offer or downloading a malicious app.

Elliptic found that 70% of new crypto thefts in 2025 started with phishing emails, fake social media profiles, or fraudulent NFT giveaways. Once they get a private key, they drain the wallet and start the same cross-chain dance.

The shift from technical exploits to social engineering means anyone with crypto is now a target. Not just institutions. Not just exchanges. You.

A minimalist hardware wallet with a cracked screen leaking a private key, surrounded by phishing threats.

How the Money Gets Cleaned (And Why It Stays Hidden)

After the chain-hopping, the money doesn’t just vanish. It sits.

TRM Labs noticed something unusual: most of the Bitcoin converted from stolen Ethereum doesn’t get sold right away. Instead, it sits in cold storage wallets for weeks or months. Why?

Because cashing out now would trigger red flags. Exchanges are watching. Regulators are alert. So the hackers wait. They use over-the-counter (OTC) desks-private, unregulated trading rooms where large amounts of crypto are moved without public records. These OTC desks are often based in jurisdictions with no crypto reporting rules. Some are linked to shell companies in the UAE, Hong Kong, or Southeast Asia.

They also create fake tokens. Not Bitcoin or Ethereum. New, obscure tokens issued on tiny blockchains with no real users. They swap stolen funds into these tokens, move them around, then swap them back into Bitcoin or USDT. The token itself has no value-but the trail it leaves is meaningless to most analysts.

And then there’s the refund trick. Hackers send stolen funds to a wallet. Then they send a tiny amount back to the original address as a "refund." That refund address becomes the new starting point for tracing. But the real money? It’s already gone.

Why This Matters Beyond Crypto

This isn’t just about stolen coins. It’s about nuclear weapons.

A 2024 UN report confirmed what intelligence agencies have suspected for years: North Korea’s missile program, its nuclear warheads, its long-range rockets-they’re funded by crypto theft. A senior Biden administration official said in 2024 that nearly half of North Korea’s foreign currency income comes from cybercrime.

The $2 billion stolen in 2025? That’s enough to buy hundreds of missiles. Or fund a new submarine program. Or pay for uranium enrichment.

The Wilson Center calls it "a matter of global security." When a regime under international sanctions can raise billions in minutes through a few lines of code, the rules of global finance change. And so do the risks.

A crystal-like blockchain analyzer tracing stolen crypto flows through invisible bridges and OTC desks.

How Analysts Are Fighting Back

It’s not all one-sided. Blockchain analytics firms are upgrading fast.

In 2019, TRM Labs launched TRM Forensics-the first tool that could trace funds across multiple chains. In 2022, they released TRM Phoenix, which automatically tracks asset movement through bridges. Today, these tools can follow a dollar from Ethereum to Tron to Bitcoin, even if it’s been swapped five times.

CoinDesk reported that in the Bybit case, 12 different blockchain firms worked together with the FBI and Europol to freeze $380 million in stolen assets. That’s unprecedented collaboration.

But it’s a race. Every time analysts improve, North Korea adapts. They now target newer, less-monitored chains like Klaytn, Celo, and Polygon zkEVM. They use decentralized protocols that don’t require KYC. They exploit gaps in analytics coverage.

The bottom line? The tools are getting better. But so are the hackers.

What You Can Do

If you hold crypto, here’s what matters:

  • Use a hardware wallet. Never store private keys on your phone or computer.
  • Never click links from strangers. Fake job offers, NFT airdrops, and "free ETH" scams are the top entry points.
  • Enable 2FA on every exchange. Use an authenticator app, not SMS.
  • Monitor your wallet activity. If you see an unfamiliar transaction, freeze your assets and report it immediately.
Most importantly: understand that your security isn’t just about technology. It’s about behavior. The weakest link isn’t the blockchain. It’s you.

The Arms Race Isn’t Over

North Korea’s crypto thefts aren’t slowing down. They’re accelerating. The scale, speed, and sophistication of cross-chain laundering are growing faster than defenses can keep up.

But the tide can turn-if the world treats this like the national security threat it is. Not just a crypto problem. Not just a financial crime. A direct threat to global stability.

The next heist could be bigger. The next laundering method, even harder to trace.

The question isn’t whether another $1 billion attack will happen.

It’s when.

How do DPRK hackers move crypto across blockchains?

They use cross-chain bridges like Avalanche Bridge and Ren Bridge to convert stolen assets from one blockchain to another-such as from Ethereum to Bitcoin or Tron. These bridges allow them to rapidly swap tokens without going through centralized exchanges, making it harder to trace the funds.

Why did North Korea stop using crypto mixers?

Mixers like Tornado Cash were heavily sanctioned and monitored by regulators. As law enforcement started freezing mixer wallets and tracking their usage, DPRK hackers shifted to cross-chain bridges, which are less regulated and harder to block without disrupting legitimate users.

Is my personal crypto wallet at risk from DPRK hackers?

Yes. While early attacks targeted exchanges, hackers now focus on individuals through phishing, fake job offers, and social media scams. If you store crypto on a phone or computer without a hardware wallet, you’re vulnerable.

How much money have DPRK hackers stolen in total?

According to blockchain analytics firms like Elliptic and TRM Labs, DPRK-linked groups have stolen over $2 billion in cryptocurrency in 2025 alone. Since 2017, total thefts exceed $3 billion.

What role does Bitcoin play in DPRK laundering?

Bitcoin is the final destination for most stolen funds. After moving assets across multiple chains, hackers convert everything into Bitcoin because it’s the most liquid, widely accepted, and hardest to trace at scale. Over 9,500 BTC have been laundered through the Avalanche Bridge alone.

Can blockchain analytics firms track DPRK laundering?

Yes, but it’s getting harder. Tools like TRM Forensics and Chainalysis can trace cross-chain movements, but DPRK hackers now use obscure blockchains, fake tokens, and OTC desks to hide funds. The race between detection and evasion is ongoing.

How is North Korea using stolen crypto?

The UN and U.S. intelligence agencies confirm that stolen crypto funds finance North Korea’s weapons program, including missiles, nuclear warheads, and military technology. Cybercrime is now the regime’s primary source of foreign currency.

Bruce Bynum
Bruce Bynum 1 Nov

Man, this is wild. I thought crypto was already chaotic, but this is next-level stuff. North Korea turning into a hacker nation with a nuclear budget? Feels like a movie, but it’s real.
Stay safe out there, folks. Hardware wallet. No exceptions.

Wesley Grimm
Wesley Grimm 1 Nov

TRM Labs’ data is cherry-picked. They’re funded by exchange interests. The real number of stolen funds is inflated to justify their $500M valuation. Cross-chain bridges aren’t the problem-centralized oversight is. They want control, not security.

Masechaba Setona
Masechaba Setona 1 Nov

Ohhh so now we’re blaming the *victims* for not using hardware wallets? 😏
Meanwhile, the US is funding AI that predicts your political views and sells ads to your grandma. But hey, don’t click links, right? 🙃
Capitalism made this mess. Not you. Not me. The system.

Kymberley Sant
Kymberley Sant 1 Nov

So like, they use bridges to move crypto right? Like from eth to btc? But like, why not just use monero? 😅
Also, is it just me or does everyone keep saying ‘laundering’ like it’s a bad word? It’s just moving money. Everyone does it. Taxes, crypto, whatever. Chill.

Edgerton Trowbridge
Edgerton Trowbridge 1 Nov

While the technical details presented are compelling and supported by verifiable data from TRM Labs and Elliptic, it is imperative that we approach this issue with a framework that prioritizes systemic resilience over reactive measures.
Individual security protocols, while necessary, are insufficient without coordinated international regulatory harmonization, standardized KYC protocols across decentralized protocols, and public-private intelligence sharing frameworks that transcend geopolitical boundaries.
The proliferation of OTC desks in jurisdictions with opaque legal structures demands multilateral action-not merely technical countermeasures.

Matthew Affrunti
Matthew Affrunti 1 Nov

This is insane but also kind of fascinating. Like, imagine being a hacker and just spamming 1,200 tiny transactions in 3 days. No stress, no sleep, just bots running nonstop.
But honestly? The real win here is how fast analysts are catching up. 380 million frozen? That’s huge.
Keep fighting the good fight, blockchain sleuths 🙌

mark Hayes
mark Hayes 1 Nov

so like... if you're holding crypto on your phone you're basically leaving your front door open with a sign that says 'steal me' 😅
and honestly? the part about fake tokens on tiny chains? that's next level. like, who even checks those?
also why is everyone so scared of phishing? it's just a link. don't click it. done.
we're all just one bad click away from being broke 😅

Derek Hardman
Derek Hardman 1 Nov

It is deeply concerning that a non-state actor can amass financial power equivalent to that of a mid-sized nation-state through cyber means. The erosion of monetary sovereignty is not theoretical-it is operational.
What we are witnessing is the quiet collapse of trust in financial infrastructure, not merely in crypto, but in the systems that underpin global capital flows.
This demands not just technical solutions, but ethical and political reorientation.

Eliane Karp Toledo
Eliane Karp Toledo 1 Nov

Wait-so you’re telling me the government isn’t behind this? 😏
Think about it. The US funds the very blockchain analytics firms that ‘track’ these hacks. Who’s really controlling the bridges? Who’s letting them stay open?
And why is no one talking about the fact that the same people who say ‘crypto is untraceable’ are also the ones who own the exchanges?
It’s all a distraction. The real money is in surveillance. They want you to panic so you’ll beg for ‘regulation.’
Wake up. This isn’t North Korea. It’s us.

Phyllis Nordquist
Phyllis Nordquist 1 Nov

The methodology employed by the Lazarus Group represents a paradigm shift in financial obfuscation, leveraging protocol-level interoperability to exploit structural gaps in cross-chain verification mechanisms.
While the quantitative scale of the thefts is alarming, the qualitative implications-particularly the weaponization of decentralized finance infrastructure by state-sponsored actors-demand immediate attention from cryptographic governance bodies.
It is not merely a matter of tracing assets, but of redefining accountability in permissionless systems.

Eric Redman
Eric Redman 1 Nov

Bro. I saw a TikTok ad that said ‘Get free ETH by clicking this!’ and I did it. I’m poor now. 😭
Also, who made these bridges? Why are they so easy to hack? Someone get fired.
Also also-why is everyone so mad at North Korea? They’re just trying to survive. We bombed their country. This is revenge. 🤷‍♂️

Jason Coe
Jason Coe 1 Nov

Look, I get it-cross-chain bridges are messy. But honestly, the real issue isn’t the tech. It’s that nobody’s regulating the OTC desks. You think these guys are using legit exchanges? Nah. They’re using shady guys in Dubai who don’t ask questions.
And the fake tokens? That’s just a new version of money laundering with a blockchain twist. Same old game, new name.
Also, why are we surprised? The whole crypto space is built on trust, and trust is the first thing that breaks when money’s involved.
It’s not about the hackers. It’s about the system being a house of cards.
And yeah, I used to store my keys on my phone too. Lesson learned. Now I’ve got a Ledger. Don’t be me.

DeeDee Kallam
DeeDee Kallam 1 Nov

so i just lost 3k bc i clicked a link and now im crying in my car 😭😭😭
why does this keep happening to me? i just wanted to be rich 😭
someone help me plz i dont know what to do

Helen Hardman
Helen Hardman 1 Nov

Okay, I know this sounds dramatic, but I’ve been reading up on this for weeks and I just want to say-you’re not alone. I used to think I was safe because I didn’t use exchanges. But then I got phished through a fake NFT drop.
It took me 3 months to recover, and honestly? I’m still scared.
But here’s the thing: I got a hardware wallet, I turned on 2FA, and I started checking every transaction on Etherscan. It’s not perfect, but it’s better.
If you’re reading this and you’re new to crypto? Please, please, please-don’t wait until it’s too late. Your peace of mind is worth more than any airdrop.

Bhavna Suri
Bhavna Suri 1 Nov

Why do we care? North Korea needs money. They are poor. We are rich. They steal. We complain.
Also, I don't have crypto. So why am I reading this? 😴

Elizabeth Melendez
Elizabeth Melendez 1 Nov

Okay I’m gonna be real-I used to think crypto was just for tech bros, but now I get it. This is like a war out there. And honestly? I feel bad for people who don’t know any better.
My cousin lost $15k last year to a fake job offer. He thought he was applying to a remote dev role. Turned out the ‘boss’ was a bot.
So I started teaching my family: hardware wallet, no links, 2FA, always check the address.
It’s not glamorous, but it’s the only way to survive.
If you’re reading this and you’re new? You’ve got this. Just take it slow. One step at a time.

Phil Higgins
Phil Higgins 1 Nov

The normalization of financial violence through algorithmic theft represents a profound moral inversion. We have built systems that prioritize liquidity over integrity, speed over security, and anonymity over accountability.
When a regime can fund its nuclear arsenal with a script, we must ask: what have we become?
It is not the hackers who are the anomaly. It is our collective refusal to treat financial infrastructure as a public good.
Our silence is complicity.

Genevieve Rachal
Genevieve Rachal 1 Nov

Let’s be real-this whole thing is a scam. The ‘$2 billion stolen’? That’s just the number they want you to believe. The real amount? Probably zero. They’re just trying to scare you into buying their ‘security software.’
And who’s behind TRM Labs? Hint: it’s not some nonprofit. It’s ex-CIA. And guess what? They’re selling you the solution to a problem they helped create.
Wake up. You’re being played.

Eli PINEDA
Eli PINEDA 1 Nov

wait so if they move it to tron then to avalanche then to bit torrent chain… how do they even know which chain to use? like is there a list? or do they just pick randomly? 😅
also why does everyone say ‘bitcoin’ like it’s magic? why not use doge? it’s cheaper to send 😅

Debby Ananda
Debby Ananda 1 Nov

Oh sweetie, you really think this is about North Korea? 😏
It’s about power. The same people who built the bridges are the ones who control the analytics. They’re the ones who decided Bitcoin is ‘the most liquid.’
And you? You’re just a data point in their algorithm.
Also, your hardware wallet? It’s probably backdoored. Just saying. 🖤

Vicki Fletcher
Vicki Fletcher 1 Nov

Wait-so if they’re using fake tokens on obscure chains, and then swapping them back to USDT, doesn’t that mean the entire supply of those tokens is essentially created out of thin air? And no one audits them? And exchanges don’t list them? So how do they even cash out? Is there a black market for fake tokens? And if so-how do you know which one is real? I’m confused. 😵‍💫

Nadiya Edwards
Nadiya Edwards 1 Nov

Let’s not pretend North Korea is the villain here. The U.S. has bombed entire countries for less. We’ve stolen trillions through sanctions and financial warfare. Who’s really the terrorist?
And why do we act like crypto is ‘new’? It’s just the latest way the rich steal from the poor.
They’re not evil. They’re just responding to a world that made them this way.
Stop demonizing the oppressed.

Ron Cassel
Ron Cassel 1 Nov

They’re not hackers-they’re terrorists. And this isn’t ‘crypto theft.’ It’s economic warfare. And if you’re not scared, you’re not paying attention.
They’re using our own tech against us. And the government? They’re asleep. Or worse-they’re complicit.
Remember 9/11? This is the same thing. Only the weapon is code. And the target? Your wallet.
And if you think your phone is safe? You’re already dead.

Malinda Black
Malinda Black 1 Nov

I just want to say-thank you for writing this. I’ve been so scared since I started holding crypto. I didn’t know if I was being reckless or just naive.
But now I feel less alone. And I’m not blaming myself anymore.
If you’re reading this and you’re scared too? You’re not broken. You’re just trying to be smart in a world that doesn’t make it easy.
Keep going. You’re doing better than you think.

Bruce Bynum
Bruce Bynum 1 Nov

That fake token trick? Genius. And terrifying. I just bought a Ledger yesterday. Feels like armor in a war I didn’t ask for.

Matthew Affrunti
Matthew Affrunti 1 Nov

Hardware wallet is the only way. I used to think I was too smart to get phished. Then I got a fake Coinbase email. Lesson learned. Now I check every URL like it’s a landmine.

Jason Coe
Jason Coe 1 Nov

Wait, so if the OTC desks are in Dubai and Hong Kong… who’s even regulating them? Are they even legal? Or is this just the wild west with better Wi-Fi?
And why do we keep calling it ‘laundering’? Sounds so dramatic. It’s just moving money. Like, if I wire cash to my buddy in Mexico, is that laundering? 😅

Malinda Black
Malinda Black 1 Nov

You’re not alone. I’ve been there. The fear doesn’t go away-but you learn to live with it. And you protect yourself. One step at a time.

28 Comments