Summary: North Korea hit crypto for $500M+ this month — and the $6.75 billion threat is not over yet

Published: 2 days and 2 hours ago
Based on article from CryptoSlate

In a disturbing escalation, North Korea's state-sponsored cyber operatives have significantly intensified their cryptocurrency theft campaign, siphoning over $500 million from DeFi platforms in just three weeks and pushing their yearly haul past the $700 million mark. These illicit activities are directly bankrolling Pyongyang's weapons programs, showcasing an alarming evolution in their tactics from traditional hacking to sophisticated supply-chain compromises and insidious human infiltration within the global crypto workforce.

Sophisticated Exploits Target the Digital Periphery

The recent string of devastating exploits, notably against Drift Protocol and KelpDAO, underscores a critical shift in North Korea's cyber warfare strategy. Instead of directly attacking hardened core smart contracts, operatives are now meticulously identifying and weaponizing vulnerabilities in the "structural periphery" and supply-chain infrastructure. For instance, the $290 million KelpDAO breach, attributed to North Korea's TraderTraitor cell, involved compromising downstream Remote Procedure Call (RPC) infrastructure, allowing manipulation of protocol operations without breaching core cryptography. This indirect, more sophisticated approach, mirroring traditional corporate cyberespionage, highlights a growing investment in resources and preparation to exploit the weakest links in the ecosystem, often third-party dependencies.

The Rise of Insider Threats and Human Infiltration

Beyond technical exploits, a more insidious threat has emerged: North Korea's coordinated infiltration of the global crypto labor market. Investigations, such as the Ketman Project, have revealed roughly 100 North Korean cyber operatives embedded within various blockchain companies under fabricated identities. These sophisticated IT workers bypass standard HR screenings, gain access to sensitive internal code, and patiently wait, sometimes for years, before initiating calculated attacks. This intelligence-agency-style patience creates a dual revenue stream for the regime: a steady accumulation of fraudulent wages (estimated at millions monthly) coupled with catastrophic insider-facilitated protocol exploits, fundamentally shifting the threat model to direct insider risks.

Bolstering Defenses Against Evolving Threats

The sheer scale of North Korea's digital asset operations, which saw $2 billion stolen in 2025 alone, necessitates a robust and coordinated defense. While the methods are evolving, industry experts emphasize that many breaches still stem from familiar weaknesses. Preventing these attacks requires a multi-pronged approach: imposing tighter controls over private keys, internal permissions, and third-party access; reducing reliance on individual operators; and hardening vendor dependencies. Equally crucial is speed: rapid coordination among exchanges, analytics firms, and law enforcement in the critical minutes and hours following a breach dramatically improves containment and recovery chances. Securing the operational perimeter where code, people, and operations converge is no longer just about writing resilient smart contracts, but fortifying every potential weak link in the entire ecosystem.

Cookies Policy - Privacy Policy - Terms of Use - © 2025 Altfins, j. s. a.