Close Menu
Global News HQ
    What's Hot

    How to remotely access and control someone else's iPhone (with their permission)

    October 31, 2025

    Client Challenge

    October 31, 2025

    Steadfast Group CEO “stands aside” as complaint investigated

    October 31, 2025
    Recent Posts
    • How to remotely access and control someone else's iPhone (with their permission)
    • Client Challenge
    • Steadfast Group CEO “stands aside” as complaint investigated
    • Biglaw Firm Adds Another Day To In-Person Requirement – See Also – Above the Law
    • Paramount Group CEO’s golden parachute could net him $34M
    Facebook X (Twitter) Instagram YouTube TikTok
    Trending
    • How to remotely access and control someone else's iPhone (with their permission)
    • Client Challenge
    • Steadfast Group CEO “stands aside” as complaint investigated
    • Biglaw Firm Adds Another Day To In-Person Requirement – See Also – Above the Law
    • Paramount Group CEO’s golden parachute could net him $34M
    • Capital One tightens Venture family card terms for bonuses – The Points Guy
    • US, Singapore Courts Team Up to Protect Multichain’s Missing Crypto | Law.com
    • Lee Mathews Spring 2026 Ready-to-Wear Collection
    Global News HQ
    • Technology & Gadgets
    • Travel & Tourism (Luxury)
    • Health & Wellness (Specialized)
    • Home Improvement & Remodeling
    • Luxury Goods & Services
    • Home
    • Finance & Investment
    • Insurance
    • Legal
    • Real Estate
    • More
      • Cryptocurrency & Blockchain
      • E-commerce & Retail
      • Business & Entrepreneurship
      • Automotive (Car Deals & Maintenance)
    Global News HQ
    Home - Cryptocurrency & Blockchain - North Korea’s Crypto Theft Reaches $2.83B Since 2024
    Cryptocurrency & Blockchain

    North Korea’s Crypto Theft Reaches $2.83B Since 2024

    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp VKontakte Email
    North Korea’s Crypto Theft Reaches .83B Since 2024
    Share
    Facebook Twitter LinkedIn Pinterest Email




    Chinese, Russian, and Cambodian intermediaries reportedly played key roles in moving and cashing the stolen funds.

    A new report by the Multilateral Sanctions Monitoring Team (MSMT) shows that North Korean hackers stole $2.83 billion in cryptocurrency between January 2024 and September 2025.

    This figure accounts for nearly one-third of the country’s total foreign currency income in 2024.

    Bybit Exploit Was the Largest Contributor

    The MSMT, a coalition of 11 countries formed in October 2024, was created to track how North Korea evades international sanctions through cybercrime. Its latest findings reveal that the scale of crypto theft rose in 2025, with hackers stealing $1.64 billion in the first nine months alone, marking a 50% increase from the $1.19 billion stolen last year.

    Most of this year’s total came from a February attack on Bybit, which was linked to the TraderTraitor group, also known as Jade Sleet or UNC4899. The hackers targeted SafeWallet, a multi-signature wallet provider for Bybit, using phishing emails and malware to gain access to internal systems. They then disguised external transfers to appear as internal ones, allowing them to take control of the cold wallet’s smart contract and move the funds undetected.

    According to the MSMT, North Korean hackers often avoid attacking exchanges directly, instead targeting third-party service providers. Groups such as TraderTraitor, CryptoCore, and Citrine Sleet have used fake developer profiles, stolen identities, and detailed knowledge of software supply chains to carry out their attacks. In one notable case, the Web3 project Munchables lost $63 million in a hack, although the funds were later returned after they reportedly faced problems during laundering.

    How the Laundering Works

    The analysis reveals a nine-step process used to clean and convert stolen crypto into cash. Hackers begin by swapping stolen assets for Ethereum (ETH) on decentralized exchanges, then use mixing services such as Tornado Cash and Wasabi Wallet to hide transaction trails. The ETH is then converted to Bitcoin (BTC) through bridge platforms, mixed again, stored in cold wallets, and then traded for Tron (TRX) before being converted to USDT. The final step involves sending USDT to over-the-counter brokers who exchange it for cash.

    Brokers and companies in China, Russia, and Cambodia were identified as key players in this process. In China, nationals Ye Dinrong and Tan Yongzhi of Shenzhen Chain Element Network Technology, along with trader Wang Yicong, helped move funds and create fake IDs. Russian intermediaries converted about $60 million from the Bybit hack through OTC brokers, while Cambodia’s Huione Pay was used to transfer stolen funds despite its license not being renewed by the central bank.

    You may also like:

    The MSMT also said that North Korean hackers have worked with Russian-speaking cybercriminals since the 2010s. In 2025, actors linked to Moonstone Sleet leased ransomware tools from the Russia-based group Qilin.

    In response, the 11 jurisdictions making up the MSMT issued a joint statement urging UN member countries to raise awareness on these cyber activities and called on the UN Security Council to restore its Panel of Experts “in the same strength and structure it had prior to its disbandment.”

    SPECIAL OFFER (Sponsored)

    Binance Free $600 (CryptoPotato Exclusive): Use this link to register a new account and receive $600 exclusive welcome offer on Binance (full details).

    LIMITED OFFER for CryptoPotato readers at Bybit: Use this link to register and open a $500 FREE position on any coin!



    Source link

    hacking North Korea
    Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
    Previous ArticleBriana Culberson Shares a Rare Look at Her $132 Las Vegas Wedding: “This Is Only 1 of 2 Pics” | Bravo
    Next Article ‘Money Will Pour In’ – CEO Predicts Bitcoin Will Explode To $180K

    Related Posts

    Myriad Moves: Bitcoin Odds Flip Bearish as Traders Expect Longest US Gov Shutdown in History – Decrypt

    October 31, 2025

    Strategy reports $2.8B net income in Q3 2025 despite muted Bitcoin performance

    October 31, 2025

    TRUMP Token Breaks Out: What’s Fueling the 40% Surge?

    October 30, 2025

    What The XRP RSI Making Higher Highs Means For The Price

    October 30, 2025
    Leave A Reply Cancel Reply

    ads
    Don't Miss
    Technology & Gadgets
    5 Mins Read

    How to remotely access and control someone else's iPhone (with their permission)

    ZDNETSometimes, a family member or friend will contact me asking for technical help with their…

    Client Challenge

    October 31, 2025

    Steadfast Group CEO “stands aside” as complaint investigated

    October 31, 2025

    Biglaw Firm Adds Another Day To In-Person Requirement – See Also – Above the Law

    October 31, 2025
    Top
    Technology & Gadgets
    5 Mins Read

    How to remotely access and control someone else's iPhone (with their permission)

    ZDNETSometimes, a family member or friend will contact me asking for technical help with their…

    Client Challenge

    October 31, 2025

    Steadfast Group CEO “stands aside” as complaint investigated

    October 31, 2025
    Our Picks
    Technology & Gadgets
    5 Mins Read

    How to remotely access and control someone else's iPhone (with their permission)

    ZDNETSometimes, a family member or friend will contact me asking for technical help with their…

    Finance & Investment
    1 Min Read

    Client Challenge

    Client Challenge JavaScript is disabled in your browser. Please enable JavaScript to proceed. A required…

    Pages
    • About Us
    • Contact Us
    • Disclaimer
    • Homepage
    • Privacy Policy
    Facebook X (Twitter) Instagram YouTube TikTok
    • Home
    © 2025 Global News HQ .

    Type above and press Enter to search. Press Esc to cancel.

    Go to mobile version