North Korea’s Record $2B Crypto Theft Shocks in 2025

I’m thrilled to sit down with Dominic Jainy, a seasoned IT professional whose deep expertise in artificial intelligence, machine learning, and blockchain technology offers a unique perspective on the evolving landscape of cybersecurity. With a passion for uncovering how these technologies intersect with real-world challenges, Dominic is the perfect guide to help us understand the alarming rise of cryptocurrency thefts linked to North Korean hackers. In this conversation, we dive into the staggering $2 billion haul in 2025, the sophisticated tactics behind these attacks, the shift toward targeting individuals, and the innovative methods used to launder stolen funds. Let’s explore how these threats are reshaping the digital security landscape.

Can you give us a broad picture of the scale of cryptocurrency thefts by North Korean hackers in 2025?

Absolutely. This year, North Korean hackers have pulled off an unprecedented $2 billion in cryptocurrency thefts, and we’re only three-quarters through 2025. That’s a massive jump compared to last year, when the total was about a third of this amount, and it even surpasses the previous record of $1.35 billion set in 2022. The increase is largely due to a few high-profile heists, better coordination, and a shift in tactics. It’s clear they’ve honed their skills and are capitalizing on both technical and human vulnerabilities in ways we haven’t seen before.

What stands out to you about the massive $1.46 billion theft from Bybit in February?

The Bybit theft was a game-changer. That single event accounts for nearly three-quarters of the total stolen this year, which shows just how impactful a well-executed attack can be. It exposed critical gaps in exchange security, likely involving a mix of insider information and advanced hacking techniques. Exchanges like Bybit handle enormous transaction volumes, making them prime targets, but this breach highlighted how even major platforms can be caught off guard if they don’t constantly update their defenses.

Beyond Bybit, other platforms like LND.fi, WOO X, and Seedify were also targeted. Can you shed some light on these incidents?

Yes, these attacks are part of a broader pattern. While each incident varies in scale, they often share similar entry points—think phishing schemes or exploiting outdated security protocols. My team has linked over 30 hacks to North Korean actors this year alone, showing a relentless pace. These smaller platforms may lack the robust security budgets of larger exchanges, making them easier prey, but the cumulative damage is still staggering.

I’ve heard there’s a growing focus on high-net-worth individuals. Can you explain why they’re becoming targets?

That’s right. While exchanges remain a big focus, high-net-worth individuals are increasingly in the crosshairs because they often hold large crypto portfolios with less institutional-grade security. Hackers see them as low-hanging fruit—easier to manipulate through personalized scams. Unlike exchanges, which are beefing up defenses, individuals might not even realize they’re being targeted until it’s too late, making them an attractive new frontier for these attackers.

The methods of attack seem to be evolving. Can you walk us through what social engineering looks like in these crypto thefts?

Social engineering has become the go-to strategy. It’s all about tricking people rather than breaking systems. Hackers might pose as customer support, send fake urgent messages, or create convincing phishing emails to steal login details or private keys. They prey on trust and urgency, getting users to hand over access without realizing it. This shift from exploiting software bugs to human behavior shows that attackers are adapting to where the weakest link is—us.

With human error now seen as the biggest security gap, what does this mean for the cryptocurrency industry?

It’s a wake-up call. The industry has focused heavily on technical fixes, but if people remain vulnerable, no amount of code can fully protect assets. Users need education on spotting scams, using multi-factor authentication, and storing keys offline. Companies, meanwhile, should invest in training and stricter verification processes. This human factor isn’t going away anytime soon, but with proactive steps, we can reduce the risks significantly.

Let’s pivot to how these stolen funds are being hidden. What are some of the new laundering techniques North Korean hackers are using?

They’ve gotten incredibly crafty. They use multiple rounds of mixing, which is like shuffling funds through countless transactions to obscure the source. Cross-chain transactions move assets between different blockchains to break the trail. They’re also using lesser-known blockchains where tracking tools aren’t as developed, and even exploiting refund addresses to redirect funds to clean wallets. Some are creating their own tokens to trade and wash the money, making it a real cat-and-mouse game for analysts.

Looking ahead, what is your forecast for the future of cryptocurrency security and these state-backed cyber threats?

I think we’re in for a challenging few years. As blockchain tech grows, so will the sophistication of these threats, especially from state actors like North Korea who have the resources and motive to keep pushing boundaries. On the flip side, I expect the industry to respond with better tools for tracking and prevention, alongside stronger regulations. But it’ll be a race—security must evolve faster than the attackers, and international cooperation will be key to disrupting these operations before they spiral further out of control.

Explore more

How Is Tabnine Transforming DevOps with AI Workflow Agents?

In the fast-paced realm of software development, DevOps teams are constantly racing against time to deliver high-quality products under tightening deadlines, often facing critical challenges. Picture a scenario where a critical bug emerges just hours before a major release, and the team is buried under repetitive debugging tasks, with documentation lagging behind. This is the reality for many in the

5 Key Pillars for Successful Web App Development

In today’s digital ecosystem, where millions of web applications compete for user attention, standing out requires more than just a sleek interface or innovative features. A staggering number of apps fail to retain users due to preventable issues like security breaches, slow load times, or poor accessibility across devices, underscoring the critical need for a strategic framework that ensures not

How Is Qovery’s AI Revolutionizing DevOps Automation?

Introduction to DevOps and the Role of AI In an era where software development cycles are shrinking and deployment demands are skyrocketing, the DevOps industry stands as the backbone of modern digital transformation, bridging the gap between development and operations to ensure seamless delivery. The pressure to release faster without compromising quality has exposed inefficiencies in traditional workflows, pushing organizations

DevSecOps: Balancing Speed and Security in Development

Today, we’re thrilled to sit down with Dominic Jainy, a seasoned IT professional whose deep expertise in artificial intelligence, machine learning, and blockchain also extends into the critical realm of DevSecOps. With a passion for merging cutting-edge technology with secure development practices, Dominic has been at the forefront of helping organizations balance the relentless pace of software delivery with robust

How Will Dreamdata’s $55M Funding Transform B2B Marketing?

Today, we’re thrilled to sit down with Aisha Amaira, a seasoned MarTech expert with a deep passion for blending technology and marketing strategies. With her extensive background in CRM marketing technology and customer data platforms, Aisha has a unique perspective on how businesses can harness innovation to uncover vital customer insights. In this conversation, we dive into the evolving landscape