North Korean Hackers Steal Over $2 Billion in Cryptocurrencies, Targeting DeFi Ecosystem

A new report from blockchain analytics firm TRM Labs has shed light on the staggering extent of cryptocurrency thefts by North Korean hackers over the past five years. Despite North Korea’s denial of involvement in hacking and cyberattacks, the report reveals that these state-affiliated hackers have stolen more than $2 billion in cryptocurrencies during this period.

The Extent of the Thefts

According to the report, 2023 alone has witnessed cryptocurrency heists amounting to an estimated $200 million. This figure accounts for 30 hacks so far this year, which is fewer compared to the previous year but still stands out as ten times larger than attacks carried out by other actors. These numbers underscore the prolific and persistent nature of North Korean cybercriminal operations.

Denial and Previous Allegations

Unsurprisingly, North Korea has refuted claims of hacking and other cyberattacks in the past. However, a United Nations report indicates that attackers based in North Korea commandeered more cryptocurrency assets in 2022 than in any other year. Their targets included the networks of foreign aerospace and defense companies, further substantiating their involvement in cybercrime.

Targeting the DeFi Ecosystem

In recent years, North Korean hackers have shifted their focus primarily towards the decentralized finance (DeFi) ecosystem. This strategic shift highlights their recognition of the potential for lucrative gains within this nascent sector of the cryptocurrency industry. By targeting the DeFi ecosystem, North Korean hackers exploit vulnerabilities and weaknesses, seeking opportunities for substantial financial theft.

Record-Breaking Year for Hacks in 2023

Last year witnessed unprecedented numbers in cryptocurrency thefts, with a staggering $4 billion stolen. A significant portion of this amount can be attributed to North Korean state-affiliated hacking groups. One standout example of their audacious actions involved the hack on Atomic Wallet, a non-custodial wallet provider.

Details of the Atomic Wallet Hack

The Atomic Wallet hack resulted in the theft of approximately $100 million worth of cryptocurrency. The hackers drained assets from victim wallets across multiple blockchains, including Ethereum, Tron, Bitcoin, Ripple, Dogecoin, Stellar, and Litecoin. This wide range of targeted cryptocurrencies underlines the hackers’ versatility and adaptability to the evolving crypto landscape.

Laundering Techniques Used by the Hackers

To cover their tracks, anonymous North Korean hackers operating from undisclosed locations employ a series of complex laundering techniques. After draining funds from wallets, they promptly transfer them to centralized exchanges before commencing the money laundering process. By leveraging a variety of intricate techniques, they obscure the origin and flow of the stolen funds, making it increasingly challenging for authorities to track their activities.

The TRM Labs report emphasizes the significant impact of North Korean hackers on the cryptocurrency space, with more than $2 billion stolen in the last five years. As their focus shifts towards the DeFi ecosystem, it becomes crucial for the industry to bolster cybersecurity measures and enhance vigilance against such attacks. Only through collaborative efforts can the industry mitigate the risks posed by these persistent cybercriminals and safeguard the integrity and trust in cryptocurrencies.

Explore more

How Companies Can Fix the 2026 AI Customer Experience Crisis

The frustration of spending twenty minutes trapped in a digital labyrinth only to have a chatbot claim it does not understand basic English has become the defining failure of modern corporate strategy. When a customer navigates a complex self-service menu only to be told the system lacks the capacity to assist, the immediate consequence is not merely annoyance; it is

Customer Experience Must Shift From Philosophy to Operations

The decorative posters that once adorned corporate hallways with platitudes about customer-centricity are finally being replaced by the cold, hard reality of operational spreadsheets and real-time performance data. This paradox suggests a grim reality for modern business leaders: the traditional approach to customer experience isn’t just stalled; it is actively failing to meet the demands of a high-stakes economy. Organizations

Strategies and Tools for the 2026 DevSecOps Landscape

The persistent tension between rapid software deployment and the necessity for impenetrable security protocols has fundamentally reshaped how digital architectures are constructed and maintained within the contemporary technological environment. As organizations grapple with the reality of constant delivery cycles, the old ways of protecting data and infrastructure are proving insufficient. In the current era, where the gap between code commit

Observability Transforms Continuous Testing in Cloud DevOps

Software engineering teams often wake up to the harsh reality that a pristine green dashboard in the staging environment offers zero protection against a catastrophic failure in the live production cloud. This disconnect represents a fundamental shift in the digital landscape where the “it worked in staging” excuse has become a relic of a simpler era. Despite a suite of

The Shift From Account-Based to Agent-Based Marketing

Modern B2B procurement cycles are no longer initiated by human executives browsing LinkedIn or attending trade shows but by autonomous digital researchers that process millions of data points in seconds. These digital intermediaries act as tireless gatekeepers, sifting through white papers, technical documentation, and peer reviews long before a human decision-maker ever sees a branded slide deck. The transition from