top of page
White logo - no background.png
Search

North Korea's Crypto Raid: A Heist Evolution Demanding Global Cyber Vigilance

Threat actors linked to the Democratic People's Republic of Korea (commonly known as North Korea) have illicitly acquired over $600 million in cryptocurrency throughout 2023.

Last week, blockchain analytics firm TRM Labs disclosed that the DPRK was accountable for nearly one-third of the total funds pilfered in crypto assaults last year. Despite a 30% decrease from the $850 million garnered in 2022, the hacks orchestrated by the DPRK were, on average, ten times more impactful than those not associated with North Korea.

Signs suggest that additional breaches directed at the crypto sector towards the close of 2023 might escalate this amount to approximately $700 million.

The targeting of cryptocurrency entities is not novel for state-sponsored North Korean actors, who, since 2017, have pocketed about $3 billion. These financially driven attacks are perceived as a pivotal mechanism for generating revenue for the nation, grappling with sanctions, and financing its weapons of mass destruction (WMD) and ballistic missile programs.

Regarding the cyber heist orchestrated by North Korea, the infiltrations exploit social engineering to entice targets. Typically, the goal is to compromise private keys and seed phrases, which safeguard digital wallets, and subsequently exploit them to gain unauthorized access to victims' assets, transferring them to wallets controlled by the threat actors.

The ill-gotten gains are then often exchanged for USDT or Tron and converted into hard currency through high-volume over-the-counter brokers, as detailed by TRM Labs.

Despite the U.S. Treasury Department's sanctioning of a crypto mixer service named Sinbad, which processed a significant portion of their proceeds, DPRK hackers persist in exploring alternative money laundering tools. This underscores their continuous evolution despite mounting law enforcement pressure.



 
 
 

Comments


bottom of page