North Korean hackers escalate crypto attacks | Over $2 billion stolen by 2025, funds flowed to major exchanges
Summary:By 2025, a North Korean national hacker group had stolen over $2 billion in crypto assets, targeting major exchanges, bridge protocols, and wallets. This article provides an in-depth analysis of their fund flows, typical cases, coin mixing techniques, and the global regulatory response.

1. Nation-state attacks enter a new phase: Over $2 billion stolen
In 2025, the global crypto security sector faced unprecedented geopolitical risk threats. According to a joint report by Elliptic and Chainalysis , North Korean hacker groups (primarily including the Lazarus Group ) had stolen over $2 billion in digital assets through attacks on exchanges, DeFi protocols, cross-chain bridges, and wallets by the end of September, setting a new record.
📉 Compared with the same period in 2024, the scale of attacks has surged by about 67% , and the targets have expanded from traditional exchanges to Layer2, NFT markets and stablecoin protocols.
2. Evolution of Attack Targets and Methods: From Exchanges to Cross-Chain Bridges
The attack logic of North Korean hackers has changed significantly:
| Target of attack | Proportion (2025) | Features |
|---|---|---|
| Cross-chain Bridge | 41% | Asset concentration and weak contract protections allow for theft of hundreds of millions of dollars in a single transaction |
| CEX centralized exchange | twenty four% | Penetration through employee social engineering attacks, phishing emails, etc. |
| DeFi lending protocols | 18% | Exploiting unaudited contracts and flash loan attacks |
| Wallet/DApp users | 17% | Emerging methods such as social engineering and AI fake customer service |
📍Strategy Evolution:
2022–2023: Focus on attacks on centralized exchanges
2024–2025: Gradual shift to cross-chain bridges and smart contract vulnerabilities
Second half of 2025: Combining AI social engineering and intelligent attacks to achieve "multi-point breakthroughs"
3. Capital Flows Revealed: Coin Mixers and Small Exchanges Become a Hotbed for Money Laundering
According to Elliptic ChainTracer ’s tracking data, approximately 72% of the stolen assets have been transferred through multiple layers of mixers and exchanges:
| Fund flow channels | Proportion | Functional Description |
|---|---|---|
| Tornado Cash / Railgun Mixer | 37% | Concealing the source of funds and transaction paths |
| Decentralized cross-chain bridges (such as Multichain and Orbit) | twenty one% | Transfer assets across chains to avoid on-chain tracking |
| Small and medium-sized exchanges (CEX) | 25% | Exploiting weak KYC/AML to launder fiat currency |
| NFT Platform/OTC | 9% | Disguised as NFT transactions to complete cleaning |
🔎 Analysis shows that the most commonly used trading exits by North Korean hackers include:
MEXC (multiple hacker fund inflows)
HTX (formerly Huobi)
KuCoin
Gate.io
OKX Small Account
These platforms usually have low KYC thresholds or have "face recognition agent" vulnerabilities, allowing hackers to easily complete currency laundering operations.
IV. Typical Case Review: Overview of Hundred-Hundred-Million-Dollar Attacks
| time | Case | Amount stolen | Attack Methods | Where the funds go |
|---|---|---|---|---|
| 2022/03 | Ronin Bridge Attack | $620M | Private key theft + multi-signature control | MEXC / Tornado Cash |
| 2023/06 | Atomic Wallet Hack | $100M | Phishing Email + Authorization Hijacking | KuCoin / Railgun |
| 2024/01 | Harmony Bridge Attack | $100M | Smart Contract Vulnerabilities | HTX / Tornado Cash |
| 2025/05 | Poly Network breached | $210M | Contract parameter tampering | Gate.io / OTC Trading |
| 2025/08 | Orbit Bridge Attack | $310M | Multi-chain signature bypass | OKX / Tornado Cash |
📊Trend Analysis:
The amount of attacks is getting bigger and bigger, with single thefts often exceeding $200 million ;
Hackers prefer targets with concentrated assets and complex contracts;
Most stolen funds were mixed and transferred within 48 hours .
5. International Regulatory Response: From Sanctions to “On-Chain Countermeasures”
Global regulators are no longer just issuing statements on North Korea’s crypto attacks, but are now entering a phase of on-chain countermeasures and judicial freezes :
🇺🇸US OFAC : Multiple Lazarus-related wallet addresses have been added to the sanctions list;
🇪🇺EU Financial Intelligence Unit : requires exchanges to report suspicious flows in real time;
🇰🇷South Korean police : Jointly established a multinational "on-chain intelligence team" with the FBI and Interpol to track currency laundering activities.
📌 In July 2025, the U.S. Treasury Department froze an Ethereum address involving $270 million in stolen assets for the first time, showing that on-chain justice has become a reality.
6. Investor Risk Warning: Five Signs of Identifying a Nation-Level Attack
| Risk Signals | illustrate |
|---|---|
| 🛑 High-value single attack ($100M+) | The scale of funding for state-level attacks far exceeds that of ordinary hackers |
| 🧠 Social Work + Technology Combination | Attack methods often combine phishing, Trojans, and vulnerability exploits |
| 🧬 Multi-layer transfer chain | Funds flow through multiple chains, mixers, and exchanges |
| 🌍 Involving sanctioned wallets | Often associated addresses can be found in OFAC and Chainalysis alerts |
| 🪙 Targeting Infrastructure | The focus of the attack is cross-chain bridges, lending platforms, and Layer 2 rather than retail wallets. |
📊 Conclusion: Nation-level hackers have become a new variable in global financial security
The attacks by North Korean hackers such as the "Lazarus Group" are no longer just cybersecurity incidents, but part of financial security, international politics and even national security .
They have built a large-scale, systematic crypto-financial crime industry chain through on-chain vulnerabilities, social engineering attacks and currency mixing technology.
In the future, as geopolitical tensions escalate, similar attacks will only become more frequent and covert. For investors and platforms, the only way to respond is to:
✅ Strengthen security audits ✅ Improve risk control awareness ✅ Real-time monitoring of abnormal flows on the chain
⚠️Risk Warning and Disclaimer
BrokerHivex is a financial media platform that displays information from the public internet or user-uploaded content. BrokerHivex does not support any trading platform or instrument. We are not responsible for any trading disputes or losses arising from the use of this information. Please note that the information displayed on the platform may be delayed, and users should independently verify its accuracy.
Evaluate
Su***ey
