|

From Bybit To Bitcoin Billionaires: Inside North Korea’s 2025 Cybercrime Surge

North Korean cybercriminals have looted more than $2 billion in cryptocurrency in 2025 alone, setting a new record for state-sponsored digital theft, according to blockchain analytics firm Elliptic. The figure, already the highest on record, could rise further before year’s end — a sign that Pyongyang’s cyber-operations have become both more aggressive and more professionalized.
A Year of Unprecedented Losses
Elliptic attributes the surge primarily to February’s $1.46 billion breach of the Bybit exchange, the largest crypto heist in history. Yet the company also tied more than thirty additional hacks this year to North Korean groups such as Lazarus. 
Analysts from Elliptic mentioned that the actual figure might be even larger; many thefts share technical and behavioral similarities, yet do not have enough forensic evidence for a clear attribution.
The report points out a continuous underreporting issue: there are some events that have not been reported or discovered; thus, it is not easy to determine the total damage caused globally.
Chainalysis data confirms the pattern. The hackers associated with North Korea managed to take around $1.34 billion in 2024, which is twice as much as the previous year — a clear indication of the fast-paced development of the DPRK’s cyber operations.
Security experts say the funds are a crucial revenue stream for the regime, which uses digital theft to help bankroll its weapons and missile programs amid heavy international sanctions.
From Code Exploits to Human Manipulation
While earlier waves of attacks exploited vulnerabilities in smart-contract code or exchange infrastructure, this year’s operations leaned heavily on social engineering — tricking people rather than breaking software.
Elliptic observed that the weak point in crypto security is now “increasingly human.” Hackers have impersonated investors, recruiters, and venture-capital collaborators to approach both executives and developers at crypto firms.
A common scheme involves fake video calls in which a supposed connection error prompts the victim to run a snippet of “diagnostic” code — malware that grants attackers remote access to wallets or company systems.
Developers have also been lured by job offers requiring them to complete a “skills test” through a cloned repository seeded with malicious files.
Rising cryptocurrency prices, including Bitcoin’s new all-time highs, have only intensified the problem. With fortunes made overnight, high-net-worth holders have become prime targets, often lacking the layered defenses of large exchanges.
Major Incidents Illustrate the Pattern
In September, blockchain investigator ZachXBT identified suspicious outflows from SBI Crypto, a subsidiary of Japan’s SBI Group. Around $21 million in bitcoin, ether, litecoin, dogecoin, and bitcoin cash was siphoned from company-linked addresses and funneled through instant exchanges before disappearing into Tornado Cash, a mixing service already sanctioned by the U.S. Treasury.
ZachXBT noted that the tactics resembled prior North Korean state-backed operations, raising fears that the SBI incident is another link in a long chain of DPRK-sponsored heists.
SBI Group has not publicly acknowledged the breach or responded to media requests for comment. 
Even established global exchanges have not been immune. A Bloomberg investigation this year revealed that Crypto.com had suffered a security lapse in early 2023 after teenage hackers affiliated with the Scattered Spider group accessed an employee account. The breach allegedly exposed limited user data, though no funds were stolen.
The platform’s handling of the episode drew criticism after claims surfaced that it had downplayed the incident.
CEO Kris Marszalek rejected those claims as “unfounded,” emphasizing that the phishing attempt was swiftly contained and disclosed to regulators. He insisted the company maintains a “security-first culture” and continually hardens its systems.
These episodes underscore a sobering reality: even well-resourced, regulated firms can be compromised through a single employee.
Inside Jobs and Fake Developers
North Korea’s hackers are also infiltrating crypto firms from within, posing as IT professionals or bribing insiders, according to Binance co-founder Changpeng “CZ” Zhao.
In recent posts on X, Zhao warned that DPRK agents “pose as job candidates” seeking positions in development, security, or finance — gaining a literal foot in the door. Some even masquerade as employers to lure real staff into fake interviews, during which a supposed Zoom problem leads to the installation of a malicious “update.”
Others send “sample code” or links packed with hidden exploits, or approach support teams pretending to be customers in need of technical help. In certain cases, Zhao said, operatives have offered bribes to employees or contractors in exchange for data access.
He urged exchanges to tighten hiring protocols and employee training, stressing that many attacks start with an innocent-looking file.
The warnings echo those from Coinbase, which recently reported similar infiltration attempts.
CEO Brian Armstrong said the company has strengthened internal security by mandating in-person training for U.S.-based staff and additional background checks for anyone with system-level privileges. 
Armstrong remarked that it sometimes feels as if “hundreds of new operatives are graduating every quarter” from North Korea’s hacking academies.
The SEAL Team’s Counter-Offensive
To combat this wave of impostors, a group of white-hat hackers known as the Security Alliance (SEAL) has been cataloging fake developer profiles linked to the DPRK
According to SEAL’s findings, at least 60 North Korean agents have been posing as freelance IT workers under fabricated identities, complete with falsified GitHub accounts, resumes, and even counterfeit citizenship documents.
The repository lists aliases, email addresses, and affiliated firms — including several that unknowingly hired them.
Led by Paradigm researcher Samczsun, the SEAL team has conducted more than 900 investigations since its 2024 launch.
Their work highlights the blurred boundary between espionage and employment, as Pyongyang’s operatives increasingly rely on legitimate remote-work platforms to penetrate Western tech and finance ecosystems.
In one case, four undercover developers infiltrated multiple startups and stole about $900,000, demonstrating how freelance contracting can double as cyber-espionage.
Pyongyang’s Hidden Workforce
Analysts believe the billions stolen in crypto — together with ransomware and IT-worker schemes — are vital to North Korea’s sanctioned economy. The funds help sustain nuclear and missile programs that would otherwise be starved of resources.
Beyond cryptocurrency, researchers at Okta have traced North Korean “clandestine IT workers” expanding into AI firms, fintech startups, healthcare organizations, and even public-sector institutions across the U.S., Middle East, and Australia.
The operatives not only get salaries but in some cases, they get access to sensitive corporate systems, which can later be misused for data theft or blackmail after their contracts expire.
The Road Ahead
Taken together, 2025’s record-breaking thefts illustrate the industrial scale of North Korea’s cyber-operations. What began as opportunistic hacks on exchanges has evolved into a sophisticated ecosystem of digital larceny, social engineering, and infiltration.
The line between hacker, employee, and intelligence agent has blurred — and with it, the traditional boundaries of cybersecurity defense.
According to experts, today
North Korean cybercriminals have looted more than $2 billion in cryptocurrency in 2025 alone, setting a new record for state-sponsored digital theft, according to blockchain analytics firm Elliptic. The figure, already the highest on record, could rise further before year’s end — a sign that Pyongyang’s cyber-operations have become both more aggressive and more professionalized.
A Year of Unprecedented Losses
Elliptic attributes the surge primarily to February’s $1.46 billion breach of the Bybit exchange, the largest crypto heist in history. Yet the company also tied more than thirty additional hacks this year to North Korean groups such as Lazarus. 
Analysts from Elliptic mentioned that the actual figure might be even larger; many thefts share technical and behavioral similarities, yet do not have enough forensic evidence for a clear attribution.
The report points out a continuous underreporting issue: there are some events that have not been reported or discovered; thus, it is not easy to determine the total damage caused globally.
Chainalysis data confirms the pattern. The hackers associated with North Korea managed to take around $1.34 billion in 2024, which is twice as much as the previous year — a clear indication of the fast-paced development of the DPRK’s cyber operations.
Security experts say the funds are a crucial revenue stream for the regime, which uses digital theft to help bankroll its weapons and missile programs amid heavy international sanctions.
From Code Exploits to Human Manipulation
While earlier waves of attacks exploited vulnerabilities in smart-contract code or exchange infrastructure, this year’s operations leaned heavily on social engineering — tricking people rather than breaking software.
Elliptic observed that the weak point in crypto security is now “increasingly human.” Hackers have impersonated investors, recruiters, and venture-capital collaborators to approach both executives and developers at crypto firms.
A common scheme involves fake video calls in which a supposed connection error prompts the victim to run a snippet of “diagnostic” code — malware that grants attackers remote access to wallets or company systems.
Developers have also been lured by job offers requiring them to complete a “skills test” through a cloned repository seeded with malicious files.
Rising cryptocurrency prices, including Bitcoin’s new all-time highs, have only intensified the problem. With fortunes made overnight, high-net-worth holders have become prime targets, often lacking the layered defenses of large exchanges.
Major Incidents Illustrate the Pattern
In September, blockchain investigator ZachXBT identified suspicious outflows from SBI Crypto, a subsidiary of Japan’s SBI Group. Around $21 million in bitcoin, ether, litecoin, dogecoin, and bitcoin cash was siphoned from company-linked addresses and funneled through instant exchanges before disappearing into Tornado Cash, a mixing service already sanctioned by the U.S. Treasury.
ZachXBT noted that the tactics resembled prior North Korean state-backed operations, raising fears that the SBI incident is another link in a long chain of DPRK-sponsored heists.
SBI Group has not publicly acknowledged the breach or responded to media requests for comment. 
Even established global exchanges have not been immune. A Bloomberg investigation this year revealed that Crypto.com had suffered a security lapse in early 2023 after teenage hackers affiliated with the Scattered Spider group accessed an employee account. The breach allegedly exposed limited user data, though no funds were stolen.
The platform’s handling of the episode drew criticism after claims surfaced that it had downplayed the incident.
CEO Kris Marszalek rejected those claims as “unfounded,” emphasizing that the phishing attempt was swiftly contained and disclosed to regulators. He insisted the company maintains a “security-first culture” and continually hardens its systems.
These episodes underscore a sobering reality: even well-resourced, regulated firms can be compromised through a single employee.
Inside Jobs and Fake Developers
North Korea’s hackers are also infiltrating crypto firms from within, posing as IT professionals or bribing insiders, according to Binance co-founder Changpeng “CZ” Zhao.
In recent posts on X, Zhao warned that DPRK agents “pose as job candidates” seeking positions in development, security, or finance — gaining a literal foot in the door. Some even masquerade as employers to lure real staff into fake interviews, during which a supposed Zoom problem leads to the installation of a malicious “update.”
Others send “sample code” or links packed with hidden exploits, or approach support teams pretending to be customers in need of technical help. In certain cases, Zhao said, operatives have offered bribes to employees or contractors in exchange for data access.
He urged exchanges to tighten hiring protocols and employee training, stressing that many attacks start with an innocent-looking file.
The warnings echo those from Coinbase, which recently reported similar infiltration attempts.
CEO Brian Armstrong said the company has strengthened internal security by mandating in-person training for U.S.-based staff and additional background checks for anyone with system-level privileges. 
Armstrong remarked that it sometimes feels as if “hundreds of new operatives are graduating every quarter” from North Korea’s hacking academies.
The SEAL Team’s Counter-Offensive
To combat this wave of impostors, a group of white-hat hackers known as the Security Alliance (SEAL) has been cataloging fake developer profiles linked to the DPRK
According to SEAL’s findings, at least 60 North Korean agents have been posing as freelance IT workers under fabricated identities, complete with falsified GitHub accounts, resumes, and even counterfeit citizenship documents.
The repository lists aliases, email addresses, and affiliated firms — including several that unknowingly hired them.
Led by Paradigm researcher Samczsun, the SEAL team has conducted more than 900 investigations since its 2024 launch.
Their work highlights the blurred boundary between espionage and employment, as Pyongyang’s operatives increasingly rely on legitimate remote-work platforms to penetrate Western tech and finance ecosystems.
In one case, four undercover developers infiltrated multiple startups and stole about $900,000, demonstrating how freelance contracting can double as cyber-espionage.
Pyongyang’s Hidden Workforce
Analysts believe the billions stolen in crypto — together with ransomware and IT-worker schemes — are vital to North Korea’s sanctioned economy. The funds help sustain nuclear and missile programs that would otherwise be starved of resources.
Beyond cryptocurrency, researchers at Okta have traced North Korean “clandestine IT workers” expanding into AI firms, fintech startups, healthcare organizations, and even public-sector institutions across the U.S., Middle East, and Australia.
The operatives not only get salaries but in some cases, they get access to sensitive corporate systems, which can later be misused for data theft or blackmail after their contracts expire.
The Road Ahead
Taken together, 2025’s record-breaking thefts illustrate the industrial scale of North Korea’s cyber-operations. What began as opportunistic hacks on exchanges has evolved into a sophisticated ecosystem of digital larceny, social engineering, and infiltration.
The line between hacker, employee, and intelligence agent has blurred — and with it, the traditional boundaries of cybersecurity defense.
According to experts, today's battle relies on human vigilance as much as technology. More vetting of remote workers, rigorous training of employees, and international law enforcement cooperation are necessary.
As Elliptic warned, the weak link in cryptocurrency security is no longer just code — it’s people.

North Korean cybercriminals have looted greater than $2 billion in cryptocurrency in 2025 alone, setting a brand new document for state-sponsored digital theft, based on blockchain analytics agency Elliptic. The determine, already the best on document, might rise additional earlier than 12 months’s finish — an indication that Pyongyang’s cyber-operations have turn out to be each extra aggressive and extra professionalized.

A Year of Unprecedented Losses

Elliptic attributes the surge primarily to February’s $1.46 billion breach of the Bybit exchange, the most important crypto heist in historical past. Yet the corporate additionally tied greater than thirty further hacks this 12 months to North Korean teams comparable to Lazarus. 

Analysts from Elliptic mentioned that the precise determine may be even bigger; many thefts share technical and behavioral similarities, but do not need sufficient forensic proof for a transparent attribution.

The report factors out a steady underreporting difficulty: there are some occasions that haven’t been reported or found; thus, it isn’t straightforward to find out the full injury prompted globally.

Chainalysis information confirms the sample. The hackers related to North Korea managed to take around $1.34 billion in 2024, which is twice as a lot because the earlier 12 months — a transparent indication of the fast-paced growth of the DPRK’s cyber operations.

Security specialists say the funds are a vital income stream for the regime, which makes use of digital theft to assist bankroll its weapons and missile applications amid heavy worldwide sanctions.

From Code Exploits to Human Manipulation

While earlier waves of assaults exploited vulnerabilities in smart-contract code or change infrastructure, this 12 months’s operations leaned closely on social engineering — tricking individuals relatively than breaking software program.

Elliptic noticed that the weak level in crypto safety is now “more and more human.” Hackers have impersonated buyers, recruiters, and venture-capital collaborators to method each executives and builders at crypto companies.

A standard scheme entails faux video calls wherein a supposed connection error prompts the sufferer to run a snippet of “diagnostic” code — malware that grants attackers distant entry to wallets or firm programs.

Developers have additionally been lured by job gives requiring them to finish a “expertise take a look at” by way of a cloned repository seeded with malicious information.

Rising cryptocurrency costs, together with Bitcoin’s new all-time highs, have solely intensified the issue. With fortunes made in a single day, high-net-worth holders have turn out to be prime targets, typically missing the layered defenses of enormous exchanges.

Major Incidents Illustrate the Pattern

In September, blockchain investigator ZachXBT recognized suspicious outflows from SBI Crypto, a subsidiary of Japan’s SBI Group. Around $21 million in bitcoin, ether, litecoin, dogecoin, and bitcoin money was siphoned from company-linked addresses and funneled by way of instantaneous exchanges earlier than disappearing into Tornado Cash, a mixing service already sanctioned by the U.S. Treasury.

ZachXBT noted that the ways resembled prior North Korean state-backed operations, elevating fears that the SBI incident is one other hyperlink in an extended chain of DPRK-sponsored heists.

SBI Group has not publicly acknowledged the breach or responded to media requests for remark. 

Even established international exchanges haven’t been immune. A Bloomberg investigation this 12 months revealed that Crypto.com had suffered a safety lapse in early 2023 after teenage hackers affiliated with the Scattered Spider group accessed an worker account. The breach allegedly uncovered restricted person information, although no funds had been stolen.

The platform’s dealing with of the episode drew criticism after claims surfaced that it had downplayed the incident.

CEO Kris Marszalek rejected these claims as “unfounded,” emphasizing that the phishing try was swiftly contained and disclosed to regulators. He insisted the corporate maintains a “security-first tradition” and regularly hardens its programs.

These episodes underscore a sobering actuality: even well-resourced, regulated companies could be compromised by way of a single worker.

Inside Jobs and Fake Developers

North Korea’s hackers are additionally infiltrating crypto companies from inside, posing as IT professionals or bribing insiders, based on Binance co-founder Changpeng “CZ” Zhao.

In recent posts on X, Zhao warned that DPRK brokers “pose as job candidates” in search of positions in growth, safety, or finance — gaining a literal foot within the door. Some even masquerade as employers to lure actual employees into faux interviews, throughout which a supposed Zoom downside results in the set up of a malicious “replace.”

Others ship “pattern code” or hyperlinks full of hidden exploits, or method help groups pretending to be clients in want of technical assist. In sure circumstances, Zhao stated, operatives have supplied bribes to staff or contractors in change for information entry.

He urged exchanges to tighten hiring protocols and worker coaching, stressing that many assaults begin with an innocent-looking file.

The warnings echo these from Coinbase, which not too long ago reported related infiltration makes an attempt.

CEO Brian Armstrong stated the corporate has strengthened inner safety by mandating in-person coaching for U.S.-based employees and extra background checks for anybody with system-level privileges. 

Armstrong remarked that it typically feels as if “tons of of latest operatives are graduating each quarter” from North Korea’s hacking academies.

The SEAL Team’s Counter-Offensive

To fight this wave of impostors, a bunch of white-hat hackers referred to as the Security Alliance (SEAL) has been cataloging faux developer profiles linked to the DPRK

According to SEAL’s findings, not less than 60 North Korean brokers have been posing as freelance IT employees beneath fabricated identities, full with falsified GitHub accounts, resumes, and even counterfeit citizenship paperwork.

The repository lists aliases, e mail addresses, and affiliated companies — together with a number of that unknowingly employed them.

Led by Paradigm researcher Samczsun, the SEAL workforce has performed more than 900 investigations since its 2024 launch.

Their work highlights the blurred boundary between espionage and employment, as Pyongyang’s operatives more and more depend on reliable remote-work platforms to penetrate Western tech and finance ecosystems.

In one case, 4 undercover builders infiltrated a number of startups and stole about $900,000, demonstrating how freelance contracting can double as cyber-espionage.

Pyongyang’s Hidden Workforce

Analysts imagine the billions stolen in crypto — along with ransomware and IT-worker schemes — are important to North Korea’s sanctioned economic system. The funds assist maintain nuclear and missile applications that may in any other case be starved of sources.

Beyond cryptocurrency, researchers at Okta have traced North Korean “clandestine IT employees” increasing into AI companies, fintech startups, healthcare organizations, and even public-sector establishments throughout the U.S., Middle East, and Australia.

The operatives not solely get salaries however in some circumstances, they get entry to delicate company programs, which may later be misused for information theft or blackmail after their contracts expire.

The Road Ahead

Taken collectively, 2025’s record-breaking thefts illustrate the economic scale of North Korea’s cyber-operations. What started as opportunistic hacks on exchanges has advanced into a complicated ecosystem of digital larceny, social engineering, and infiltration.

The line between hacker, worker, and intelligence agent has blurred — and with it, the normal boundaries of cybersecurity protection.

According to specialists, right this moment’s battle depends on human vigilance as a lot as know-how. More vetting of distant employees, rigorous coaching of staff, and worldwide legislation enforcement cooperation are mandatory.

As Elliptic warned, the weak hyperlink in cryptocurrency safety is now not simply code — it’s individuals.

The put up From Bybit To Bitcoin Billionaires: Inside North Korea’s 2025 Cybercrime Surge appeared first on Metaverse Post.

Similar Posts