North Korea’s $2.8B Crypto Caper: How They’re Hacking Your Wallets ๐Ÿšจ

According to a report released by the Multilateral Sanctions Monitoring Team (MSMT), North Korea-linked hackers stole a staggering $2.83 billion in virtual assets between 2024 and September 2025. ๐Ÿคฏ

The report emphasizes that Pyongyang not only excels at theft but also possesses sophisticated methods for liquidating the illicit gains. ๐Ÿ•ต๏ธโ€โ™‚๏ธ๐Ÿ’ฐ

Hacking Revenue Fuels One-Third of Nationโ€™s Foreign Currency ๐Ÿค”

The MSMT is a multinational coalition of 11 countries, including the US, South Korea, and Japan. It was established in October 2024 to support the implementation of UN Security Council sanctions against North Korea. ๐ŸŒ

According to the MSMT, the $2.83 billion stolen from 2024 to September 2025 is a critical figure. ๐Ÿ“‰

โ€œNorth Koreaโ€™s virtual asset theft proceeds in 2024 amounted to approximately one-third of the countryโ€™s total foreign currency income,โ€ the team noted. ๐Ÿงฎ

The scale of theft has accelerated dramatically, with $1.64 billion stolen in 2025 alone, representing an increase of over 50% from the $1.19 billion taken in 2024, despite the 2025 figure not including the final quarter. ๐Ÿ“ˆ

The Bybit Hack and the TraderTraitor Syndicate ๐Ÿ˜ˆ

The MSMT identified the February 2025 hacking of the global exchange Bybit as a major contributor to the surge in illicit revenue in 2025. The attack was attributed to TraderTraitor, one of North Koreaโ€™s most sophisticated hacking organizations. ๐Ÿ›ก๏ธ

The investigation revealed that the group collected information related to SafeWallet, the multi-signature wallet provider used by Bybit. They then gained unauthorized access via phishing emails. ๐Ÿ“ง

They utilized malicious code to access the internal network, disguising external transfers as internal asset movements. This allowed them to hijack control of the cold walletโ€™s smart contract. ๐Ÿ”

The MSMT noted that in major hacks over the past two years, North Korea often prefers to target third-party service providers connected to exchanges. This is done rather than attacking the exchanges themselves. ๐Ÿ•ต๏ธโ€โ™€๏ธ

The Nine-Step Laundering Mechanism ๐Ÿง 

The MSMT detailed a meticulous nine-step laundering process North Korea uses to convert the stolen virtual assets into fiat currency:

1. Attackers swap stolen assets for cryptocurrencies like ETH on a Decentralized Exchange (DEX). ๐Ÿ”„

2. They โ€˜mixโ€™ the funds using services such as Tornado Cash, Wasabi Wallet, or Railgun. ๐Ÿงน

3. They convert ETH to BTC via bridge services. ๐ŸŒ‰

4. They move the funds to a cold wallet after passing through centralized exchange accounts. ๐ŸงŠ

5. They disperse the assets to different wallets after a second round of mixing. ๐ŸŒ€

6. They swap BTC for TRX (Tron) using bridge and P2P trades. ๐Ÿ“ก

7. They convert TRX to the stablecoin USDT. ๐Ÿ’ต

8. They transfer the USDT to an Over-the-Counter (OTC) broker. ๐Ÿค

9. The OTC broker liquidates the assets into local fiat currency. ๐Ÿ’ฐ

Global Network Facilitates Cash-Out ๐ŸŒ

The most challenging stage is converting crypto into usable fiat. This is accomplished using OTC brokers and financial companies in third-party countries, including China, Russia, and Cambodia. ๐Ÿ‡จ๐Ÿ‡ณ๐Ÿ‡ท๐Ÿ‡บ๐Ÿ‡ฐ๐Ÿ‡ญ

The report named specific individuals. These include Chinese nationals Ye Dinrong and Tan Yongzhi of Shenzhen Chain Element Network Technology and P2P trader Wang Yicong. ๐Ÿ‡จ๐Ÿ‡ณ

They allegedly cooperated with North Korean entities to provide fraudulent IDs and facilitate asset laundering. Russian intermediaries were also implicated in the liquidation of approximately $60 million from the Bybit hack. ๐Ÿ‡ท๐Ÿ‡บ

Furthermore, Huione Pay, a financial service provider under Cambodiaโ€™s Huione Group, was utilized for laundering. ๐Ÿ‡ฐ๐Ÿ‡ญ

โ€œA North Korean national maintained a personal relationship with Huione Pay associates and cooperated with them to cash out virtual assets in late 2023,โ€ the MSMT stated. ๐Ÿค

The MSMT raised concerns with the Cambodian government in October and December 2024. These concerns regarded Huione Payโ€™s activities supporting UN-designated North Korean cyber hackers. As a result, the National Bank of Cambodia refused to renew Huione Payโ€™s payment license; however, the company continues to operate in the country. ๐Ÿšซ๐Ÿ’ธ

Read More

2025-10-23 14:38