The Democratic People’s Republic of Korea (DPRK) continues to pose the most significant nation-state threat to cryptocurrency security, achieving a record-breaking year for stolen funds despite an assessed dramatic reduction in attack frequency.
A report by Chainalysis reveals that North Korean hackers stole $2.02 billion in cryptocurrency in 2025, a 51% year-over-year increase, pushing their all-time total to $6.75 billion despite fewer attacks.
North Korean threat actors are increasingly achieving these outsized hacks often by embedding IT workers one of DPRK’s principal attack vectors inside crypto services to gain privileged access and enable high impact compromises.
Fueled in large part by the historic $1.5 billion breach of Dubai-based exchange Bybit in February the largest single heist on record these sophisticated operations highlight Pyongyang’s growing reliance on cyber theft to bypass international sanctions and fund its nuclear and missile programs, as noted by the United Nations and U.S. authorities.
With fewer but far more impactful attacks, often involving social engineering, insider infiltration, and targeted compromises of centralized platforms, North Korea has solidified its position as the dominant force in high-stakes crypto crime, pushing its cumulative known thefts since tracking began to approximately $6.75 billion.
While no major incidents were publicly reported in January, the year saw significant escalations in high-value thefts and broader espionage.
In February 2025, the largest single crypto heist in history occurred on February 21, when hackers stole approximately $1.5 billion in Ethereum from the Dubai-based exchange Bybit. U.S. authorities, including the FBI’s Internet Crime Complaint Center (IC3), attributed this to North Korea, citing the exploitation of vulnerabilities in third-party software. This incident alone accounted for a significant portion of the year’s total thefts and highlighted North Korea’s advanced capabilities in targeting centralized exchanges.
In April, North Korean cyber espionage expanded beyond crypto, with reports of increased infiltration targeting European defense and government sectors. This included attempts to steal sensitive technology and intelligence, potentially to support missile programs.
While not a direct “hack” in the theft sense, these operations violated UN sanctions and marked a broadening of North Korea’s cyber strategy.
On November 27, South Korea’s Upbit exchange suffered a $30–36 million theft from its Solana hot wallet, draining assets like SOL, USDC, BONK, JUP, and others. Forensic analysis linked the attack to North Korea’s Lazarus Group, noting similarities to their 2019 Upbit hack (including the exact anniversary timing).
South Korean authorities launched an on-site investigation, and Upbit committed to full user reimbursement from its reserves.
– December: Early-month reports confirmed North Korea’s role in the Upbit incident, with experts noting it as part of a pattern targeting South Korean exchanges.
Broader discussions highlighted North Korea’s exploitation of Android zero-days to target crypto exchanges and IT engineers, alongside a major exposure of 400,000 secrets in the “Shai Hulud 2.0” attack (though direct attribution to North Korea was not confirmed).
By mid-December, Chainalysis released its annual report, quantifying the $2 billion+ in 2025 thefts and noting Amazon’s blocking of 1,800 fake North Korean IT workers as part of broader countermeasures. Speculation arose about potential large-scale infrastructure attacks, but no confirmed incidents occurred by December 20.
Overall, 2025’s activities were dominated by crypto-focused hacks, with the Bybit and Upbit incidents standing out. Other thefts likely filled the gap to reach the $2 billion total, but details remain sparse due to the covert nature of these operations.






