Wednesday, April 22, 2026
No Result
View All Result
BitcoinNewsLIVE
  • Home
  • Crypto News
    • Latest News
    • Top Stories
    • Video News
  • Crypto Gaming
    • Crypto Gaming News
    • Play to Earn
  • Market Analysis
    • Intelligent Dashboard
    • AI Performance
    • DEX Analytics
  • Guides & Tutorials
    • Getting Started with Crypto
  • Web Stories
  • Home
  • Crypto News
    • Latest News
    • Top Stories
    • Video News
  • Crypto Gaming
    • Crypto Gaming News
    • Play to Earn
  • Market Analysis
    • Intelligent Dashboard
    • AI Performance
    • DEX Analytics
  • Guides & Tutorials
    • Getting Started with Crypto
  • Web Stories
No Result
View All Result
BitcoinNewsLIVE
No Result
View All Result
Home Crypto News News

North Korea Stole $500 Million from Crypto in 20 Days

April 22, 2026
in News
0 0
North Korea Stole $500 Million from Crypto in 20 Days
0
SHARES
1
VIEWS
Share on Twitter


Make


CryptoSlate

preferred on

In a remarkably short period of less than three weeks, operatives affiliated with the Democratic People’s Republic of Korea (DPRK) have successfully executed cyber operations resulting in the appropriation of over $500 million from decentralized finance (DeFi) platforms. This alarming trend signifies a pronounced escalation in Pyongyang’s state-sponsored initiatives aimed at financing its weapons development programs through illicit cryptocurrency acquisitions.

Escalation of DeFi Exploits: Drift Protocol and KelpDAO

The recent exploits targeting the Drift Protocol and KelpDAO have exacerbated North Korea’s illicit crypto accumulation for the current fiscal year, exceeding the $700 million threshold. The extraordinary financial losses underscore a tactical evolution within Kim Jong Un’s cyber warfare apparatus, characterized by an increasing reliance on sophisticated exploitation of supply-chain vulnerabilities coupled with extensive human infiltration strategies to circumvent conventional security frameworks.

On April 20, LayerZero, a cross-chain infrastructure provider, disclosed that KelpDAO suffered a significant breach resulting in a loss approximating $290 million. This incident, which transpired on April 18, now holds the dubious distinction of being the largest single crypto hack recorded in 2026. Preliminary forensic analyses suggest direct attribution to TraderTraitor, a specialized subgroup operating within North Korea’s notorious Lazarus Group.

Just prior to this incident, on April 1, the decentralized perpetual futures exchange Drift Protocol experienced a theft estimated at $286 million. Blockchain intelligence firm Elliptic swiftly established connections between on-chain laundering methodologies, transaction sequences, and network signatures previously associated with DPRK attack patterns. This incident marked the 18th such event tracked by Elliptic in the current year alone.

Exploiting Infrastructure Vulnerabilities

The methodologies employed during the April attacks reveal an alarming maturation in the tactics utilized by state-sponsored hackers within the DeFi sector. Rather than focusing on direct assaults against robust core smart contracts, these operatives are strategically targeting vulnerabilities within the structural periphery of decentralized finance platforms.

Specifically regarding the KelpDAO attack, LayerZero elucidated that the hackers compromised the downstream Remote Procedure Call (RPC) infrastructure integral to LayerZero Labs’ Decentralized Verifier Network (DVN). By contaminating these pivotal data pathways, attackers were able to manipulate protocol operations without breaching core cryptographic frameworks. While LayerZero has since deprecated affected nodes and reinstated DVN operations, the financial ramifications had already been irrevocably incurred.

This indirect approach signifies a disconcerting evolution in cyber warfare tactics. Cybersecurity firm Cyvers has noted an observable increase in both sophistication and resource allocation by North Korean-linked attackers in their preparatory and operational phases. They have remarked:

“We also observe how they consistently find the weakest link. In this case, it was a third party rather than the protocol’s core infrastructure.”

This strategic approach closely mirrors traditional corporate cyberespionage methodologies and indicates that breaches associated with DPRK are becoming increasingly challenging to mitigate. Recent incidents—such as the compromise of the widely utilized Axios npm software package—illustrate an ongoing methodical effort to undermine security before software is even integrated into blockchain environments.

Infiltration of Global Crypto Workforce

A critical dimension of North Korea’s operational strategy is its extensive infiltration into the global cryptocurrency labor market. The threat paradigm has transitioned from remote hacking campaigns to embedding nefarious insiders directly within unsuspecting Web3 enterprises.

A comprehensive six-month investigation conducted by the Ketman Project—an initiative under the auspices of the Ethereum Foundation’s ETH Rangers security program—has revealed unsettling findings: approximately 100 North Korean cyber operatives are currently embedded within various blockchain companies. Operating under fictitious identities, these highly skilled IT professionals successfully navigate standard human resources vetting processes, gain access to sensitive internal code repositories, and integrate into product teams for protracted periods before launching calculated attacks.

This intelligence-agency-style patience was substantiated by independent blockchain investigator ZachXBT, who uncovered a specialized DPRK network generating approximately $1 million monthly through fraudulent personas designed to secure remote employment. This operation facilitates crypto-to-fiat transfers through sanctioned global financial channels, processing over $3.5 million since late 2025. Industry estimates suggest that Pyongyang’s broader deployment of IT personnel yields multiple seven-figure monthly revenues for the regime, thereby establishing a dual-pronged revenue stream characterized by fraudulent wages and substantial gains from insider-facilitated protocol exploits.

North Korea’s Money Laundering Mechanisms and Economic Viability

The sheer magnitude of North Korea’s digital asset operations eclipses that of any conventional cybercriminal syndicate. According to blockchain analytics firm Chainalysis, DPRK-affiliated hackers pilfered an unprecedented $2 billion in 2025 alone, constituting an astonishing 60% of all global cryptocurrency thefts within that year—a figure significantly bolstered by a monumental $1.5 billion raid on Bybit exchange in February 2025.

When accounting for this year’s aggressive campaign, North Korea’s cumulative cryptocurrency asset acquisition is estimated at approximately $6.75 billion. Upon securing these funds, operatives affiliated with the Lazarus Group exhibit highly specific laundering patterns that are regionally focused and strategically avoid conventional decentralized exchanges (DEXs) and peer-to-peer lending protocols.

  • Laundering Preferences: On-chain analytics reveal a marked reliance on Chinese-language guarantee services, expansive over-the-counter (OTC) broker networks, and sophisticated cross-chain mixing services.
  • Strategic Implications: This laundering preference indicates structural constraints and deeply entrenched geographical dependencies rather than unrestricted access to global financial systems.

Mitigating Future Attacks: A Path Forward

Security researchers and industry leaders assert that preventative measures are feasible but contingent upon crypto firms addressing persistent operational vulnerabilities that have contributed to major breaches. Terence Kwok, founder of Humanity, articulated that recurring patterns behind many DPRK-linked losses frequently highlight familiar weaknesses rather than entirely novel forms of cyber intrusion.

“What’s striking is how often the damage still comes down to the same weak points around access control and single points of failure. That tells you the industry still has some basic security discipline issues it has not solved.”

Kwok emphasizes that enhancing asset movement security is paramount; this necessitates imposing stricter controls over private keys, internal permissions, and third-party access across software infrastructures. Practical implementations would involve reducing reliance on individual operators, limiting privileged access rights, fortifying vendor dependencies, and establishing rigorous checks surrounding infrastructure interfacing core protocols with external entities.

The second priority centers on response agility: Once stolen funds begin traversing chains or infiltrating laundering networks, recovery opportunities diminish sharply. Kwok advocates for enhanced coordination among exchanges, stablecoin issuers, blockchain analytics firms, and law enforcement agencies during critical moments immediately following a breach to improve containment efforts.

In summary, crypto systems are notably vulnerable at intersections where code, personnel, and operational frameworks converge. A compromised credential or an unaddressed permissions oversight can yield openings substantial enough to facilitate monumental financial drains. Thus, for DeFi ecosystems, safeguarding operational perimeters surrounding smart contracts emerges as an imperative—prioritizing preventive measures against exploitation through systemic vulnerabilities remains essential for future resilience.

Tags: #DPRKLazarus GroupNorth Korea

Recommended

Sequence Unreal SDK Achieves Verified Solution Status on Unreal Engine Marketplace

Sequence Unreal SDK Achieves Verified Solution Status on Unreal Engine Marketplace

2 years ago
New Private Credit Crisis Looms as $20B Exit Wave Triggers Fresh Withdrawal Limits Threatening Bitcoin Liquidity

New Private Credit Crisis Looms as $20B Exit Wave Triggers Fresh Withdrawal Limits Threatening Bitcoin Liquidity

1 week ago

Popular News

  • If I Were Out During This Bitcoin Pump, Here’s EXACTLY What I’d Do

    If I Were Out During This Bitcoin Pump, Here’s EXACTLY What I’d Do

    0 shares
    Share 0 Tweet 0
  • North Korea Stole $500 Million from Crypto in 20 Days

    0 shares
    Share 0 Tweet 0
  • How Crypto Futures Markets Are Feeding ‘Scam Coin’ Insider Pump and Dumps

    0 shares
    Share 0 Tweet 0
  • Top 5 Altcoins, Metaverse & Yield Farming Win Free Tokens Latest Crypto News

    0 shares
    Share 0 Tweet 0
  • WLFI Token Outlook as 4.52B Burn, 62.28B Unlock Reshape Tokenomics

    0 shares
    Share 0 Tweet 0

Connect with us

About Us

We are a dedicated crypto news platform, delivering the latest updates, expert analysis, and educational content on cryptocurrency and blockchain technology. Our goal is to simplify the complexities of the crypto world, providing readers with accurate and reliable news to stay informed and ahead in the fast-paced digital asset landscape. Whether you're a seasoned investor or a curious beginner, we are here to help you navigate the future of finance.

Category

  • Crypto Gaming
    • Play to Earn
  • Crypto News
    • News
    • Top Stories
    • Video News
  • Guides & Tutorials
    • Getting Started with Crypto
  • Market Analysis

Legal Pages

  • About us
  • Intelligent Dashboard
  • Contact
  • Privacy Policy
  • Disclaimer
  • Terms of Use
  • Cookie Privacy Policy
  • CCPA

©BitcoinNews.live 2025 All rights reserved!

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Home
  • Crypto News
    • Latest News
    • Top Stories
    • Video News
  • Crypto Gaming
    • Crypto Gaming News
    • Play to Earn
  • Market Analysis
    • Intelligent Dashboard
    • AI Performance
    • DEX Analytics
  • Guides & Tutorials
    • Getting Started with Crypto
  • Web Stories

©BitcoinNews.live 2025 All rights reserved!