Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

North Korean Hackers Have Stolen $2 Billion in Cryptocurrency in 2025

Posted on October 8, 2025October 8, 2025 By CWS

North Korean menace actors are estimated to have stolen greater than $2 billion in cryptocurrency through the first 9 months of 2025, blockchain evaluation agency Elliptic says.

That is an annual document for North Korean hackers, and the cumulative worth of the cryptocurrency property they’ve stolen so far has surpassed $6 billion.

However Elliptic notes that difficulties in attributing different assaults to North Korea and quite a few incidents that stay unreported counsel that the precise stolen quantity could also be even increased.

“Attributing cyber thefts to North Korea shouldn’t be a precise science: Elliptic and different consultants use a mixture of blockchain analytics, noticed laundering patterns, and intelligence sources to make an attribution,” the corporate says.

The record-breaking quantity stolen this yr is basically fueled by the theft of $1.46 billion in crypto property from the cryptocurrency alternate Bybit. In keeping with Elliptic, North Korean hackers have been chargeable for a minimum of 33 different crypto heists this yr.

“The 2025 complete already dwarfs earlier years and is sort of triple final yr’s tally, underscoring the rising scale of North Korea’s dependence on cyber-enabled theft to fund its regime,” the corporate notes.

In December 2023, Recorded Future estimated that menace actors related to the Pyongyang regime had stolen a complete of over $3 billion in cryptocurrency, after siphoning greater than $1.7 billion in 2022 in high-profile heists akin to Ronin Community ($600 million), Nomad ($190 million), Concord ($100 million), and others.

In 2025, many of the assaults have been carried out by way of social engineering, and never vulnerabilities in crypto infrastructure. The hackers primarily centered on cryptocurrency exchanges, though quite a few high-net-worth people have been additionally hit.Commercial. Scroll to proceed studying.

“As crypto costs have risen, people have develop into more and more enticing targets, typically missing the safety measures employed by companies. A few of these people are additionally focused as a consequence of their affiliation with companies holding massive quantities of crypto property, which the hackers want to steal,” Elliptic notes.

In response to superior blockchain analytics and more practical monitoring of illicit cryptocurrency, North Korea has been utilizing extra advanced methods to launder the stolen property.

The hackers now depend on a number of rounds of blending and cross-chain transactions, use obscure blockchains to hinder evaluation, and buy utility tokens of particular protocols to cut back prices. Additionally they redirect property to recent wallets by exploiting “refund addresses”, and create and commerce tokens issued straight by the laundering networks.

“The record-breaking $2 billion stolen this yr underlines each the size of the menace and the significance of sturdy blockchain analytics. North Korea could also be adapting its ways, however with superior forensic capabilities, the crypto business and regulation enforcement are well-placed to detect and hint these threats,” Elliptic notes.

Associated: North Korea’s Faux Recruiters Feed Stolen Knowledge to IT Staff

Associated: New XCSSET macOS Malware Variant Hijacks Cryptocurrency Transactions

Associated: North Korean Hackers Goal macOS Customers

Associated: Attaining Optimistic Outcomes With Multi-Area Cyber and Open Supply Intelligence

Security Week News Tags:Billion, Cryptocurrency, Hackers, Korean, North, Stolen

Post navigation

Previous Post: Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now
Next Post: Step Into the Password Graveyard… If You Dare (and Join the Live Session)

Related Posts

US Storms 29 Laptop Farms in Crackdown on North Korean IT Worker Schemes Security Week News
Microsoft Sinkholes Domains, Disrupts Notorious ‘Lumma Stealer’ Malware Operation Security Week News
The Root of AI Hallucinations: Physics Theory Digs Into the ‘Attention’ Flaw Security Week News
Report Links Chinese Companies to Tools Used by State-Sponsored Hackers Security Week News
Ransomware Groups, Chinese APTs Exploit Recent SAP NetWeaver Flaws Security Week News
Sola Security Raises $35M to Bring No-Code App Building to Cybersecurity Teams Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Offers Up to $20,000 in New AI Bug Bounty Program
  • Step Into the Password Graveyard… If You Dare (and Join the Live Session)
  • North Korean Hackers Have Stolen $2 Billion in Cryptocurrency in 2025
  • Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now
  • PoC Exploit Released for Critical Lua Engine Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Offers Up to $20,000 in New AI Bug Bounty Program
  • Step Into the Password Graveyard… If You Dare (and Join the Live Session)
  • North Korean Hackers Have Stolen $2 Billion in Cryptocurrency in 2025
  • Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now
  • PoC Exploit Released for Critical Lua Engine Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News