Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems

February 5, 2026

Critical n8n Flaw CVE-2026-25049: Command Execution Risk via Malicious Workflows

February 5, 2026

DragonForce Ransomware Strikes: Critical Business Data at Risk

February 5, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » North Korean Hackers Net Over $2 Billion in Crypto This Year
Cybercrime and Ransomware

North Korean Hackers Net Over $2 Billion in Crypto This Year

Staff WriterBy Staff WriterOctober 8, 2025No Comments4 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Summary Points

  1. North Korean hackers stole an estimated $2 billion in cryptocurrency in 2025, making it the largest annual total, with total loot exceeding $6 billion since 2021, primarily funding nuclear weapons development.
  2. The $2 billion figure is nearly three times higher than 2024, with the biggest theft being the $1.46 billion from the Bybit hack in February.
  3. North Korea’s cyber theft activities shifted from targeting businesses to individuals and exchange employees, mainly via social engineering, with laundering tactics becoming more sophisticated using multiple mixing, cross-chain transfers, and obscure blockchains.
  4. Despite increased evasion tactics, blockchain transparency and forensic analysis continue to enable investigators to trace illicit funds, although many incidents remain unreported.

Key Challenge

In 2025, North Korean hackers carried out a record-shattering wave of cyber theft, stealing an estimated $2 billion worth of cryptocurrency, which pushed their total illicit gains over $6 billion—an alarming increase from previous years. This surge in cybercrime was primarily driven by a notorious hack in February where the Lazarus Group stole $1.46 billion from Bybit, marking the largest single illicit crypto theft ever recorded. The stolen funds are believed to be funneled into North Korea’s clandestine nuclear weapons program, according to United Nations and government reports. Analysts from Elliptic, a blockchain security firm, confirmed these figures through blockchain analysis and intelligence, although they warn that many smaller or unreported thefts may make the actual total even higher. These hackers have shifted their tactics from exploiting technical vulnerabilities to using social engineering, laundering through complex cross-chain transfers, and obscuring their transactions with numerous obfuscation strategies to evade detection, though blockchain transparency still aids investigators in tracking illicit funds.

The report, based on blockchain analysis and intelligence data, was compiled by Elliptic, a cybersecurity firm specializing in cryptocurrency investigations. It highlights that these cyberattacks typically target individual holders, exchange employees, and through social engineering rather than only technical exploits. Despite evolving laundering methods designed to evade detection, authorities continue to trace the stolen assets, underscoring the persistent challenge of combating North Korea’s cyber operations, which are believed to be state-sponsored efforts to generate funds for their nuclear ambitions. The increasing frequency and scale of these thefts demonstrate North Korea’s escalating reliance on cybercrime as a key tool to sustain its regime, with the overall trend indicating that this form of digital theft is becoming a central pillar of its clandestine operations.

Risks Involved

In 2025, North Korean hackers committed a record-breaking theft of over $2 billion in cryptocurrency, totaling more than $6 billion historically, with the largest breach being a $1.46 billion heist at Bybit. These cyberattacks primarily target both high-value individuals and exchange employees through social engineering, shifting away from purely technical exploits. The stolen funds are allegedly used to fund North Korea’s nuclear ambitions, highlighting the significant geopolitical and economic risks posed by such cybercrime. Despite increasingly sophisticated laundering tactics like cross-chain transfers and obfuscation, blockchain transparency efforts remain crucial in tracking illicit flows. However, underreporting and varying attribution methods suggest these figures are conservative estimates, underscoring the growing scale and complexity of state-sponsored cyber threats that threaten global financial stability and security.

Possible Next Steps

Ensuring prompt and effective remediation is crucial when dealing with major cybersecurity breaches like North Korean hackers stealing over $2 billion in crypto this year. Such swift action can minimize financial losses, prevent further breaches, and restore trust among users and stakeholders.

Mitigation Strategies

  • Strengthen cybersecurity infrastructure by updating and patching vulnerabilities.
  • Implement advanced threat detection tools for real-time monitoring.
  • Conduct comprehensive security audits to identify weak points.

Remediation Steps

  • Isolate affected systems immediately to contain the breach.
  • Notify relevant authorities and cooperate in investigations.
  • Revoke compromised credentials and enforce stronger authentication methods.
  • Conduct a forensic analysis to understand breach vectors.
  • Educate staff on cybersecurity practices to prevent future attacks.
  • Update incident response plans based on lessons learned.

Continue Your Cyber Journey

Discover cutting-edge developments in Emerging Tech and industry Insights.

Access world-class cyber research and guidance from IEEE.

Disclaimer: The information provided may not always be accurate or up to date. Please do your own research, as the cybersecurity landscape evolves rapidly. Intended for secondary references purposes only.

Cyberattacks-V1

CISO Update Cybersecurity MX1
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleTrusted Secrets Management to Reassure Stakeholders
Next Article Zero-Day Exploitation of Oracle EBS Begins Months Before Patching
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems

February 5, 2026

DragonForce Ransomware Strikes: Critical Business Data at Risk

February 5, 2026

Cyber Criminals Hijack NGINX Servers to Steer Web Traffic to Malicious Sites

February 5, 2026

Comments are closed.

Latest Posts

Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems

February 5, 2026

DragonForce Ransomware Strikes: Critical Business Data at Risk

February 5, 2026

Cyber Criminals Hijack NGINX Servers to Steer Web Traffic to Malicious Sites

February 5, 2026

CISA Alerts: VMware ESXi Zero-Day Under Ransomware Attack

February 5, 2026
Don't Miss

Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems

By Staff WriterFebruary 5, 2026

Quick Takeaways ERP systems like SAP are now recognized as critical assets, with vulnerabilities causing…

DragonForce Ransomware Strikes: Critical Business Data at Risk

February 5, 2026

Cyber Criminals Hijack NGINX Servers to Steer Web Traffic to Malicious Sites

February 5, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems
  • Critical n8n Flaw CVE-2026-25049: Command Execution Risk via Malicious Workflows
  • DragonForce Ransomware Strikes: Critical Business Data at Risk
  • Cyber Criminals Hijack NGINX Servers to Steer Web Traffic to Malicious Sites
  • Italy Foils Russian Cyberattack on Olympic Websites
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems

February 5, 2026

Critical n8n Flaw CVE-2026-25049: Command Execution Risk via Malicious Workflows

February 5, 2026

DragonForce Ransomware Strikes: Critical Business Data at Risk

February 5, 2026
Most Popular

Nokia Alerts Telecoms to Rising Stealth Attacks, DDoS Surge, and Cryptography Pressures

October 8, 20259 Views

Cyberattack Cripples 34 Devices in Telecoms Using LinkedIn Lures & MINIBIKE Malware

September 19, 20259 Views

Tonic Security Secures $7 Million to Transform Cyber Risk Reduction

July 28, 20259 Views

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.