How North Korea Stole $3 Billion in Crypto and Why It Matters

How North Korea Stole $3 Billion in Crypto and Why It Matters
16 Comments

Between 2017 and 2023, North Korean hackers stole $3 billion in cryptocurrency across 58 separate attacks. By 2024, that number jumped to $1.34 billion in just one year - more than double what was stolen the year before. Then, in February 2025, a single attack on Bybit stole nearly $1.5 billion in Ether, making it the largest crypto heist ever recorded. This isn’t random crime. It’s state-backed, highly organized, and directly tied to funding North Korea’s nuclear weapons program.

How They Do It: The LinkedIn Trap

North Korean hackers don’t break into systems with brute force. They get you to invite them in. One of their most effective tactics? Fake job offers on LinkedIn.

In early 2024, attackers posed as recruiters from fake tech companies. They reached out to employees at Ginco, a Japanese company that builds enterprise crypto wallets. The victims were told to complete a coding test as part of the hiring process. The test? A Python script hosted on GitHub. It looked harmless. It wasn’t.

Once opened, the script installed malware that monitored the employee’s computer. Within weeks, the hackers stole session cookies - digital keys that let users stay logged in. With those, they impersonated the employee and slipped into Ginco’s internal systems. No firewalls bypassed. No passwords cracked. Just a simple, clever lie.

From there, they waited. They watched. They studied how real transactions were approved. Then, in May, they manipulated a legitimate request from DMM, a Japanese crypto platform. The hackers changed the destination address on a transfer - and walked away with 4,502.9 BTC, worth $308 million at the time.

This isn’t an isolated case. The same pattern shows up in other attacks. They target employees with access to wallet systems. They build trust. They wait. Then they strike during normal business hours, hiding in plain sight.

The Bigger Heist: Bybit and the $1.5 Billion Ether Theft

The February 2025 attack on Bybit changed everything. Hackers stole nearly $1.5 billion in Ether - more than the total stolen in all 47 crypto heists of 2024 combined. Chainalysis confirmed it was the biggest theft in crypto history.

What made this different? Scale and speed. The attackers didn’t just steal. They moved. Fast. Within hours, they began converting Ether into Bitcoin and other coins using decentralized exchanges. They split the funds across hundreds of wallets. They used cross-chain bridges - tools that let you move crypto between blockchains - to muddy the trail.

Blockchain analysts from TRM Labs traced parts of the stolen funds to wallets previously linked to North Korea’s Lazarus group. The FBI confirmed it. This wasn’t just a hack. It was a financial operation designed to bypass sanctions.

Why North Korea Does This

North Korea is under some of the strictest sanctions in the world. They can’t sell oil. They can’t import weapons parts. They can’t easily move money through banks. But they can steal crypto.

Crypto is anonymous. It’s global. It doesn’t need banks. And once it’s moved across enough blockchains, even the best investigators struggle to trace it. The stolen money doesn’t go to luxury cars or private jets. It buys missiles, uranium, and warheads.

U.S. intelligence agencies, the UN, and Japan’s National Police Agency all agree: North Korea uses crypto theft to fund its weapons programs. The money from the Bybit heist alone could pay for dozens of missile launches. That’s why this isn’t just a crypto problem - it’s a national security issue.

A transparent blockchain network with .5 billion in Ether flowing through nodes, obscured by privacy coin symbols.

Who’s Behind It?

North Korea doesn’t have one hacking group. It has several, all working under military control. The most notorious is Lazarus - a team linked to over 20 major crypto heists since 2017. But there’s also TraderTraitor, Jade Sleet, UNC4899, and Slow Pisces. Each has its own specialty.

- Lazarus: Masters of large-scale heists and malware. Responsible for the Bybit attack and the DMM hack.

- TraderTraitor: Focused on wallet providers. Hit Atomic Wallet, Alphapo, and CoinsPaid in 2023.

- Jade Sleet: Specializes in social engineering. Uses fake job offers, phishing emails, and LinkedIn scams.

These groups don’t compete. They share tools, techniques, and intelligence. They’re not criminals. They’re soldiers.

How Much Has Been Stolen? The Numbers

The total stolen by North Korean hackers since 2017 is now over $5 billion. Here’s how it broke down:

  • 2017-2023: $3 billion across 58 attacks
  • 2023: $660.5 million across 20 attacks
  • 2024: $1.34 billion across 47 attacks - a 103% increase
  • February 2025: $1.5 billion from Bybit (single attack)
In 2024, North Korean groups stole 61% of all cryptocurrency taken globally - even though they only carried out 20% of the attacks. That means they’re not just active. They’re efficient. They pick the right targets. They execute with precision.

A missile with crypto wallet QR codes on its casing, surrounded by tools labeled with North Korean hacker group names.

Why Crypto Exchanges Keep Getting Hit

Most crypto platforms still rely on outdated security. Many use single-signature wallets - meaning one person’s access key can unlock millions. Some don’t monitor employee behavior. Others don’t check for suspicious logins.

After the DMM hack, Ginco admitted they didn’t have multi-factor authentication for internal systems. Bybit didn’t limit how much Ether could be moved in a single transaction. These aren’t mistakes. They’re blind spots.

The worst part? Hackers know it. They don’t attack random platforms. They pick the ones with weak internal controls. They study employee routines. They wait for holidays or weekends - times when security teams are thin.

What’s Being Done?

The FBI, Japan’s National Police Agency, and the UN are working together to track the money. They’ve frozen wallets. They’ve named names. They’ve issued public alerts.

But enforcement is hard. North Korea doesn’t have extradition treaties. Its hackers operate from safe zones inside China and Russia. Even if you identify them, you can’t arrest them.

Crypto platforms are responding. Many now require:

  • Multi-signature wallets (requiring 3+ approvals to move funds)
  • Behavioral monitoring (flagging unusual login times or locations)
  • Employee training on social engineering (like the LinkedIn scam)
  • Real-time blockchain analysis tools (to detect suspicious transfers)
Still, the attackers adapt. They’ve started using privacy coins like Monero and Zcash to hide transactions. They’ve built fake DeFi protocols to launder stolen funds. They’re always one step ahead.

What This Means for You

If you hold crypto, this isn’t just about big exchanges. It’s about trust. Every time a platform gets hacked, confidence drops. Prices swing. Users panic. Insurance costs rise.

The real lesson? Security isn’t just about passwords. It’s about culture. It’s about how companies treat their employees, how they monitor access, and how they respond to threats.

The $5 billion stolen by North Korea didn’t vanish into thin air. It went into missiles. Into bombs. Into weapons aimed at global stability. That’s why this isn’t just a crypto story. It’s a warning.

How do North Korean hackers steal crypto without getting caught?

They use social engineering - like fake job offers on LinkedIn - to get inside companies. Once inside, they steal session cookies to impersonate employees. They move stolen funds across multiple blockchains using decentralized exchanges and cross-chain bridges. This makes tracking nearly impossible. They also avoid using wallets linked to known criminal addresses, making attribution harder.

Is crypto the only way North Korea funds its weapons program?

No, but it’s become the most reliable. Before crypto, they relied on smuggling, cybercrime against banks, and illicit trade. Sanctions made those harder. Crypto is global, unregulated in many places, and hard to trace. Since 2017, it’s been their top funding source. The UN estimates over 80% of their weapons budget now comes from crypto theft.

Can blockchain analysis trace stolen crypto back to North Korea?

Yes - but it takes time and resources. Firms like Chainalysis and TRM Labs track wallet patterns, transaction timing, and historical links. They’ve matched stolen funds to wallets used in past attacks by Lazarus and TraderTraitor. However, hackers now use privacy coins and mixers to obscure trails. Attribution isn’t perfect, but it’s improving.

Why do hackers target Japanese and Dubai-based exchanges?

Because they’re large, well-known, and sometimes have weaker internal controls. Japan has many crypto firms with high liquidity. Dubai is a crypto hub with less regulatory oversight than the U.S. or EU. Hackers pick targets based on access, not geography - but these regions have more opportunities.

Are U.S. and allied governments doing enough to stop these hacks?

They’re trying. The FBI, Japan’s police, and the UN have shared intelligence and frozen hundreds of wallets. But North Korea operates from outside international law. There’s no way to arrest hackers or shut down their command centers. The best defense is better security at crypto platforms - not just government action.

Douglas Anderson
Douglas Anderson 12 Mar

What’s wild is how simple the attack vector is. No zero-days, no fancy exploits. Just a fake LinkedIn message and a Python script that looks like a coding test. It’s social engineering at its most elegant - and terrifying. Companies think they’re safe because they have firewalls, but they forget the human is the weakest link. And once you have a session cookie, you’re already inside. No alarms. No alerts. Just silent, surgical theft.

This isn’t hacking. It’s infiltration.

Tina Keller
Tina Keller 12 Mar

I keep thinking about how this mirrors Cold War espionage - except instead of spies planting bugs in embassies, we have recruiters planting malware in GitHub repos. The psychology is identical: trust is the backdoor. North Korea didn’t invent this. They perfected it. And now, every crypto platform that treats HR as a non-security function is just inviting another heist. We’re not just under attack - we’re willfully blind.

vasantharaj Rajagopal
vasantharaj Rajagopal 12 Mar

From an engineering standpoint, the real vulnerability isn’t the wallet architecture - it’s the lack of behavioral anomaly detection. Session cookies are just one vector. What’s alarming is the absence of context-aware authentication. If an employee logs in from Tokyo at 3 AM, then initiates a transfer to an unknown EOA - that’s a red flag. But most platforms still rely on static MFA, which is like locking your front door but leaving the window open with a sign that says ‘Help yourself.’

ann neumann
ann neumann 12 Mar

They’re not stealing crypto - they’re stealing our future. This is a coordinated, state-sponsored war on global finance. And the worst part? The same people who built this system - the ones who said ‘trustless, decentralized, immutable’ - are now begging governments to step in and fix it. LOL. Crypto was supposed to be the escape from state control. Now the state is using it to fund nukes. The irony is so thick you could cut it with a butter knife. We’re all just pawns in a game we didn’t even know we were playing. And no one’s coming to save us.

Prepare for the worst.

William Montgomery
William Montgomery 12 Mar

If you work at a crypto firm and you didn’t train your team on LinkedIn scams, you’re negligent. Period. No excuses. This isn’t a tech problem - it’s a leadership failure. You let your people get lured in by fake job offers? That’s not incompetence. That’s arrogance. And now billions are gone. Fix your culture or get out.

Allison Davis
Allison Davis 12 Mar

It’s not just about technical defenses. It’s about psychological safety. When employees feel like they’re being monitored for every login, they start hiding things. But when they feel trusted - and educated - they become your first line of defense. Ginco didn’t fail because of bad code. They failed because they didn’t teach their people to question a ‘hiring test’ that asked for access to their entire system. Training isn’t a box to check. It’s armor.

Tom Jewell
Tom Jewell 12 Mar

There’s a quiet horror in how predictable this is. The hackers don’t need to be genius coders. They just need to be patient. They need to understand human behavior better than the companies do. They don’t hack systems - they hack routines. The morning coffee, the Tuesday afternoon Slack message, the Friday afternoon transfer approval. That’s their target. The system is designed for efficiency, not paranoia. And that’s exactly what they exploit. We built a world that moves fast - and they moved faster because they didn’t care about ethics. Only results.

karan narware
karan narware 12 Mar

So… we’re telling me that a fake job offer on LinkedIn is more dangerous than a nation-state zero-day? Hah. Of course. Because in 2025, people still click ‘Apply Now’ on LinkedIn without checking the domain. I mean, come on. The fact that this works at all says more about us than about North Korea. We’re not being hacked - we’re volunteering. And then we’re surprised when the money vanishes. 🤦‍♀️

Michael Suttle
Michael Suttle 12 Mar

This is all a psyop. The ‘$1.5B heist’? Fabricated. The ‘Lazarus group’? CIA front. They want you scared so you’ll beg for regulation. You think North Korea can pull off a $1.5B crypto heist? Please. That’s a fraction of what the Fed prints in a day. This is fear porn. They want you to think crypto is unsafe so you go back to banks - where the real theft happens. Wake up. The real thieves wear suits. Not hoodies.

Jenni James
Jenni James 12 Mar

It is, however, worth noting that the narrative surrounding North Korean cyber operations has been weaponized by Western media to justify increased surveillance and regulatory overreach. The notion that a sovereign state is solely responsible for $5 billion in theft is statistically dubious. The majority of these transactions are routed through private exchanges with lax KYC - many of which are headquartered in jurisdictions that actively evade international cooperation. The real issue is not North Korea - it is the institutional failure of global financial governance. To blame one actor is to ignore the systemic rot.

Chelsea Boonstra
Chelsea Boonstra 12 Mar

Why are we still talking about LinkedIn scams like they’re new? This has been going on since 2020. Every security team I’ve worked with knew about this. Every CISO had a slide deck. So why did Bybit get hit? Because leadership didn’t care. They were too busy chasing growth metrics and user signups. Security was a cost center. Now it’s a catastrophe. And the board? They’ll fire the CTO, blame the ‘bad actors,’ and move on. Same script. Different year. Same outcome.

Alex Thorn
Alex Thorn 12 Mar

This isn’t just about crypto. It’s about how we’ve outsourced trust. We used to know the people we worked with. Now we accept job offers from strangers with 12 connections and a stock photo profile. We’ve normalized digital intimacy without verification. And that’s the real vulnerability. The hackers didn’t break into the system - they broke into our sense of safety. We stopped asking, ‘Who is this?’ and started asking, ‘Can I get this job?’ That’s the tragedy. Not the code. The culture.

Howard Headlee
Howard Headlee 12 Mar

Let’s be real - this is the most efficient money laundering scheme in history. North Korea turned crypto into their personal ATM. And the best part? They didn’t need to bribe anyone. They didn’t need to infiltrate banks. They just needed to exploit a single human weakness: the desire to be hired. That’s it. One fake job. One script. One moment of trust. And $1.5 billion gone. We’re not fighting hackers. We’re fighting human nature. And right now? Human nature is winning.

Julie Tomek
Julie Tomek 12 Mar

While it is critical to acknowledge the technical sophistication of these operations, we must also recognize that the underlying vulnerability lies in organizational psychology. Institutions prioritize scalability over security because scalability yields immediate returns. Security, by contrast, is a latent cost - invisible until disaster strikes. The pattern is not unique to crypto; it mirrors the failures in aviation, healthcare, and nuclear infrastructure. The solution is not technological. It is cultural. It requires leadership that treats security not as a department, but as a core value - one that is measured, incentivized, and defended with the same rigor as revenue.

Brandon Kaufman
Brandon Kaufman 12 Mar

My cousin works at a crypto firm. She got a LinkedIn message last month - same thing. Fake job, same GitHub link. She showed it to her team. They laughed. Said it was ‘too obvious.’ Then she told them about the Bybit heist. Silence. Two weeks later, they rolled out mandatory phishing training. Took them 18 months to get there. That’s the problem. We don’t learn until it’s too late.

Craig Gregory
Craig Gregory 12 Mar

Let’s not romanticize this. The ‘Lazarus group’ isn’t some shadowy genius syndicate. It’s a state-run sweatshop. Young coders, paid in rice and cigarettes, churning out malware in a basement in Shenyang. The real horror isn’t their skill - it’s how little it takes to destroy global systems. A single script. A single human error. A single moment of complacency. We built a financial system on the assumption that humans are rational. They’re not. And that’s why this keeps happening.

16 Comments