Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
North Korean Cybercriminals Intensify Crypto Attacks

North Korean Cybercriminals Intensify Crypto Attacks

Posted on February 23, 2026 By CWS

February 21, 2026, marks a year since North Korean cybercriminals executed the largest cryptocurrency theft in history, stealing approximately $1.46 billion from Dubai-based exchange Bybit. The incident set a precedent for future attacks, with these groups continuing to target the global cryptocurrency industry.

Over the past year, DPRK-affiliated operatives have intensified their efforts, accumulating a record $2 billion in stolen cryptoassets in 2025 alone. This brings their total theft to over $6 billion. These funds are suspected to support North Korea’s nuclear weapons and missile development programs, with January 2026 witnessing a doubling of recorded exploits compared to the previous year.

Ongoing Threats and Tactics

Research by Elliptic highlights that social engineering remains the primary method of attack in all major incidents linked to DPRK, from the Bybit breach to more recent exploits. Despite the technical prowess required for these operations, human error is often the initial point of entry. Attackers now employ AI to create highly convincing fake identities and communications, complicating detection efforts.

The laundering of funds from the Bybit breach involved refund addresses, the creation of worthless tokens, and diverse mixing services, with much of the money passing through suspected Chinese over-the-counter trading services. By August 2025, over $1 billion had already been processed, marking a pivotal moment that only escalated these cyber campaigns.

Expanding Attack Surface

The threat landscape has expanded beyond crypto exchanges, now targeting developers and contributors within the crypto infrastructure. These individuals and organizations are at increasing risk as North Korean operatives refine their strategies to exploit vulnerabilities.

Two persistent campaigns, DangerousPassword and Contagious Interview, exemplify the regime’s tactics. DangerousPassword begins with a compromised social media account contacting the target, often referencing a shared past event, and suggesting a video call. Victims are then tricked into installing malware disguised as a software development kit, which captures sensitive information.

Mitigation and Future Outlook

Contagious Interview lures victims with fake job opportunities, requiring them to execute a technical skills test via a code repository embedded with hidden malware. Combined, these campaigns generated $37.5 million between January and mid-February 2026. Running infected code on company devices poses significant risks to entire organizations.

To mitigate such threats, organizations are advised to verify all software installation requests, carefully evaluate remote contributor identities, and treat unsolicited job offers with skepticism. Continued vigilance is essential as these cyber threats evolve and intensify.

Cyber Security News Tags:AI, Bybit breach, crypto exchanges, crypto theft, Cryptocurrency, cyber threats, Cybercrime, Cybersecurity, DPRK, Elliptic, global crypto industry, Malware, North Korea, nuclear funding, social engineering

Post navigation

Previous Post: Critical RoundCube Webmail Flaws Actively Exploited
Next Post: Npm Packages Exploit Crypto Keys and CI Secrets

Related Posts

Threat Actors Selling New Undetectable RAT As ’ScreenConnect FUD Alternative’ Threat Actors Selling New Undetectable RAT As ’ScreenConnect FUD Alternative’ Cyber Security News
BlackSuit Ransomware Servers Attacking U.S. Critical Infrastructure Seized by Law Enforcement Seizes BlackSuit Ransomware Servers Attacking U.S. Critical Infrastructure Seized by Law Enforcement Seizes Cyber Security News
SUSE Rancher Vulnerabilities Let Attackers Lockout the Administrators Account SUSE Rancher Vulnerabilities Let Attackers Lockout the Administrators Account Cyber Security News
Malicious NuGet Packages Mimic as Popular Nethereum Project to Steal Wallet Keys Malicious NuGet Packages Mimic as Popular Nethereum Project to Steal Wallet Keys Cyber Security News
Google Requires Crypto App Developers to Have License or Certification From Relevant Authorities Google Requires Crypto App Developers to Have License or Certification From Relevant Authorities Cyber Security News
New Malware Attack Using Variable Functions and Cookies to Evade and Hide Their Malicious Scripts New Malware Attack Using Variable Functions and Cookies to Evade and Hide Their Malicious Scripts Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • UnsolicitedBooker Shifts Focus to Central Asian Telecoms
  • Spanish Crackdown on Anonymous Fénix Hackers
  • Cyber Group Claims Massive Data Breach at Odido
  • AI-Powered Cyber Attacks Target Global FortiGate Devices
  • Chinese AI Firms Accused of Copying Claude Using 16 Million Queries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • UnsolicitedBooker Shifts Focus to Central Asian Telecoms
  • Spanish Crackdown on Anonymous Fénix Hackers
  • Cyber Group Claims Massive Data Breach at Odido
  • AI-Powered Cyber Attacks Target Global FortiGate Devices
  • Chinese AI Firms Accused of Copying Claude Using 16 Million Queries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News