How Many Crypto Thefts Have North Korean Hackers Committed in the Last Five Years?

The Bit Journal Editor
By The Bit Journal Editor Add a Comment
7 Min Read

In recent years, the digital currency ecosystem has increasingly become a target for cybercriminals, with North Korean hackers at the forefront. These hackers have orchestrated numerous high-profile crypto thefts, leveraging sophisticated methods to infiltrate exchanges and wallets. Their activities have prompted a global response aimed at bolstering security measures and preventing further losses. By exploring the extent of crypto thefts committed by North Korean hackers over the past five years, we can better understand the threats and the ongoing efforts to combat them.

Notable Crypto Thefts by North Korean Hackers

In the last five years, North Korean hackers have become notorious for a string of high-profile crypto thefts. Their sophisticated techniques and persistent efforts have led to substantial financial gains. Here are some notable instances:

  • 2017: Bithumb Heist

    • North Korean hackers targeted the South Korean exchange Bithumb, stealing over $7 million worth of cryptocurrencies, primarily Bitcoin and Ethereum.
  • 2018: Coincheck Attack

    • The Japanese cryptocurrency exchange Coincheck fell victim to a massive breach, resulting in the theft of $530 million in digital assets. Evidence suggests North Korean involvement.
  • 2019: UpBit Breach

    • The South Korean exchange UpBit experienced a significant hack, leading to the loss of $50 million in cryptocurrency. Experts link this incident to North Korean hacking groups.

Comparison of Major Thefts

Year Exchange Amount Stolen Cryptocurrency
2017 Bithumb $7 million Bitcoin, Ethereum
2018 Coincheck $530 million Various
2019 UpBit $50 million Various

These incidents highlight the persistent and lucrative nature of North Korean hacking efforts, underscoring the importance of robust security measures in the crypto industry.

Methods Used by Hackers to Steal Cryptocurrency

North Korean hackers employ a variety of sophisticated methods to steal cryptocurrency. Understanding these tactics can help individuals and organizations better protect their digital assets.

Phishing Attacks

  • Hackers often create fake websites or emails that mimic legitimate cryptocurrency exchanges.
  • Once users enter their credentials, the hackers gain access to their accounts and transfer the funds.

Malware Infections

  • Keyloggers: These track and record keystrokes to capture sensitive information like passwords.
  • Remote Access Trojans (RATs): These allow hackers to take control of the victim’s device and conduct illicit transactions.

Social Engineering

  • Hackers exploit human psychology to deceive individuals into revealing private information.
  • Tactics include posing as trusted entities or luring victims through social media engagements.

Supply Chain Attacks

  • North Korean hackers infiltrate software updates or third-party services used by cryptocurrency platforms.
  • This allows them to insert malicious code that captures sensitive data during the transaction process.

By identifying and understanding these methods, organizations can implement more effective security measures to safeguard against North Korean crypto thefts.

Advertisement Banner

Global Response and Preventive Measures to Combat Crypto Theft

The global community has recognized the seriousness of crypto thefts, particularly those attributed to North Korean hackers. To combat this growing threat, various international organizations and governments have implemented several preventive measures.

International Cooperation

  • Sanctions: Countries like the United States have imposed stringent sanctions against North Korean entities suspected of cybercrimes, including cryptocurrency theft.
  • Intelligence Sharing: Nations are increasingly sharing intelligence and collaborating to track and apprehend cybercriminals.

Technological Innovations

  • Advanced Encryption: Financial institutions and crypto exchanges are employing advanced encryption methods to shield digital assets from unauthorized access.
  • AI and Machine Learning: Integrating AI and machine learning can help detect suspicious activities in real-time, allowing for rapid responses to potential threats.

Regulatory Frameworks

  • KYC & AML Policies: Know Your Customer (KYC) and Anti-Money Laundering (AML) policies require platforms to verify the identities of users, reducing anonymous transactions that facilitate crypto theft.
  • Legislation: Governments are passing new laws to tighten the security standards for digital assets and impose stricter penalties for cybercrimes.

Educational Initiatives

  • Public Awareness Campaigns: Raising awareness among individuals and businesses about how to protect their digital assets is crucial. These campaigns focus on best practices for maintaining security, such as using multi-factor authentication.

By leveraging these strategies, the global community aims to reduce the instances of crypto theft attributed to North Korean hackers and safeguard the burgeoning world of cryptocurrency.

Frequently Asked Questions

How many crypto thefts have North Korean hackers committed in the last five years?

Over the last five years, North Korean hackers have been linked to numerous crypto thefts. While the exact number can vary depending on sources and methods of attribution, estimates suggest that these state-sponsored groups have conducted dozens of sophisticated cyber heists, targeting various cryptocurrency exchanges and individual wallets.

What is the estimated value of cryptocurrency stolen by North Korean hackers?

The total estimated value of cryptocurrency stolen by North Korean hacking groups in the past five years runs into the billions of dollars. These thefts have been a significant source of revenue for the regime, which uses these funds to circumvent international sanctions and fund various programs, including its nuclear weapons development.

Which hacking groups are most commonly associated with these thefts?

The Lazarus Group, a state-sponsored cybercrime organization, is the most notorious hacking group associated with North Korean crypto thefts. Known for its sophisticated cyber techniques, this group has been responsible for some of the largest and most publicized attacks on cryptocurrency exchanges worldwide.

How do these hackers typically carry out their crypto thefts?

North Korean hackers often employ a variety of sophisticated techniques to carry out their crypto thefts. These methods include spear-phishing campaigns, exploiting software vulnerabilities, implanting malware, and conducting social engineering attacks. Once they gain access to cryptocurrency wallets or exchange platforms, they quickly transfer the stolen funds to addresses under their control, often using mixers and other obfuscation tools to cover their tracks.


The price predictions and financial analysis presented on this website are for informational purposes only and do not constitute financial, investment, or trading advice. While we strive to provide accurate and up-to-date information, the volatile nature of cryptocurrency markets means that prices can fluctuate significantly and unpredictably.

You should conduct your own research and consult with a qualified financial advisor before making any investment decisions. The Bit Journal does not guarantee the accuracy, completeness, or reliability of any information provided in the price predictions, and we will not be held liable for any losses incurred as a result of relying on this information.

Investing in cryptocurrencies carries risks, including the risk of significant losses. Always invest responsibly and within your means.

Share This Article
Leave a review