North Korea’s cyberfair attacks on the cryptocurrency industry are sophisticated, with the number of groups involved in such criminal activity, and the crypto company’s paradigm warns in a report entitled “Interpreting the North Korean Threat.”
Cyberattacks on the North Korean industry range from attacks on exchanges and social engineering attempts, phishing attacks and complex supply chain hijacking, the report says. In some cases, the attack can take a year as North Korean operatives spend their time.
https://www.youtube.com/watch?v=ndv0rfehetq
The United Nations estimates that North Korean hackers won $3 billion between 2017 and 2023. Total transport increased sharply in 2024, and this year, attacks against Crypto Exchange Wazirx and Bybit were successful.
The paradigm writes that the North Korean organising these attacks are writing at least five numbers: Lazarus Group, Spinout, Apple Jaus, Dangerous Passwords, and Traitors. There is also a coalition of North Korean operatives who infiltrate high-tech companies around the world and possibly posing as IT workers.
Related: Cryptographic Type Slicing, Description: How Hackers Make Use of Small Errors
Famous attacks and predictable washing methods
The Lazaro Group, the most famous North Korean hacking team, has been credited to some of the most famous cyberattacks since 2016. According to the paradigm, the group hacked Sony and Bangladesh Bank in 2016 and helped tune the Wannacry 2.0 ransomware attack in 2017.
He also aimed to be in the cryptocurrency industry, and sometimes had a huge impact. In 2017, the group launched two crypto exchanges, Youbit and Bithumb. In 2022, the Lazarus Group used the Ronin Bridge, bringing hundreds of millions of lost assets. And in 2025 it notoriously stole $1.5 billion from Bybit, sending shocks to the entire crypto community. This group could be behind some Solana Memecoin scams.
As Chain Orisis and other organizations have explained, the Lazarus Group also has a predictable method of money laundering after securing transportation. Disassemble the stolen amount into small, small pieces and send it to countless other wallets. Next, for those with higher liquidity, exchange more illiquid coins and convert much of them to Bitcoin (BTC). The group can then sit for a long time on stolen money until attention from law enforcement fades.
The FBI has so far identified three suspect members of the Lazarus Group and blamed them for cybercrimes. In February 2021, the U.S. Department of Justice charged two of these members with involvement in global cybercrimes.
Magazine: Lazarus Group’s Favorite Exploits Revealed – Crypto Hacks Analysis