
Main Points:
- North Korea-linked hackers (e.g. Lazarus Group, “TraderTraitor”) are escalating large-scale crypto thefts, especially via exchange hacks.
- The Bybit hack (~US$1.5 billion in February 2025) is historically large, and along with other similar incidents, has driven 2025’s crypto service thefts to surpass all of 2024.
- Attack vectors include social engineering, insider manipulation, malware, fake job interviews, compromised vendor relationships, screen sharing, phishing, etc. Trust relationships are being exploited.
- Personal wallet breaches and “wrench attacks” are increasing; criminals are not only targeting institutions but also individuals.
- Laundering methods are evolving: bridges, mixing services, rapid conversion among chains, splitting across many wallets to obscure tracing.
- Mitigations emphasized: strict hiring and vetting, limited permissions, separation of functions (support vs engineering etc.), strong controls over cold/warm wallets, audit of vendors, isolation of devices, careful review of screen sharing & external links.
1. Surge in Crypto Theft & Record Incidents

In the first half of 2025, over US$2.17 billion has already been stolen from cryptocurrency services, exceeding the total losses from all of 2024. A single event, the Bybit hack, in which roughly US$1.5 billion worth of assets were taken, accounts for about 69% of that total. This makes 2025 potentially the worst year ever for crypto service losses.
Comparing to previous years:
- In 2024, the total stolen by DPRK-linked hackers was about US$1.34 billion across 47 incidents.
- In 2023, DPRK actors stole about US$660.5 million over about 20 incidents.
So the magnitude, frequency, and audacity of the attacks are increasing sharply.
2. Methods & Attack Vectors: From Inside & Outside

The attackers are not relying solely on brute-force or pure technical exploits. Instead, they use layered tactics:
- Social Engineering & Recruitment Schemes: Fake job offers, interviews, sometimes impersonating employers or using “technical assessments” with hidden malware. These allow infiltration into development, security, or finance teams. (Mirrors the described “interview code with malware,” fake update during Zoom etc.)
- Insider Compromise: Once inside, bad actors may move laterally, gaining trust, escalating privileges, and exfiltrating data or keys over time.
- Malware & Phishing: Modified apps, malicious updates, phishing via email or support tickets.
- Vendor / Outsourcing Risk: Breaching third-party suppliers as initial entry points. Compromising vendors’ security to get into the target exchange or service.
- Targeting Support Channels: Customer support staff or internal support tools, helpdesk, maybe ticketing systems; often lower in technical oversight, but can give a foothold.
- Compromise of Private Keys / Cold & Warm Wallet Infrastructure: The Bybit incident was reportedly via a cold wallet transfer manipulated during a routine movement from cold to warm wallet, where the logic or contract address was disguised.
3. The Role of North Korean-Linked Groups & State Sponsorship
Groups linked to North Korea such as Lazarus Group and a subgroup called TraderTraitor are being increasingly implicated. Their objectives are dual: financial gain for the regime, and evading sanctions.
The Bybit hack was attributed by the FBI and others to these actors.
In prior years, North Korean hackers had stolen in the hundreds of millions across many incidents; but now the size of single incidents is growing, and their share of total damage is rising.
4. Expansion to Individuals & New Threat Types

It’s not just large centralized exchanges. Several new trends:
- Personal wallet compromises are rising. Chainalysis notes that by mid-2025, nearly 23.35% of value stolen comes from attacks on personal wallets.
- Physical coercion / “wrench attacks” are correlated with Bitcoin price surges—as value rises, richer targets are more likely to be attacked in person.
- Growing reach into new regions: Victims in the U.S., Germany, Russia, Canada, Japan, Indonesia; fastest growth in Eastern Europe, Middle East & North Africa (MENA), and CSAO (Central & South Asia & Oceania).
5. Laundering, Cover-Ups & the Difficulties of Tracing
Once assets are stolen, criminals use a variety of methods to hide, move, and eventually convert into usable assets (fiat or other stable assets):
- Use of bridges and mixing services to move across blockchains.
- Splitting funds across many wallets, across many chains. Conversion into Bitcoin, stablecoins, etc.
- Rapid conversion and diffusion to avoid detection. Each extra step adds obscurity.
- The increasing professionalization of tracing tools and regulator efforts have some effect, but attackers adjust: more frequent, more automated, more distributed.
6. What’s New & Recent Trends (2025 Developments)
- Bybit hack (February 2025): ~$1.5 billion stolen; linked to DPRK.
- In H1 2025, total stolen by attackers from crypto services already exceeds all of 2024.
- Projected full-year losses from crypto service attacks could reach US$4 billion or more, if trends continue.
- Increase in value stolen from individuals and risk of physical attacks. Higher profile.
- More attention to regulatory, compliance, blockchain intelligence tools; governments and firms are being forced to improve internal security, vetting, audit, vendor risk, etc.
7. Recommended Defenses and Practical Measures
Given these threats, the following are essential for firms, exchanges, individuals interested in blockchain as business / investment:
- Rigorous hiring/vetting of staff: background checks, verifying identity, skills; beware fake job offers, overseas contractors who may be fronts.
- Least privilege principle: limit permissions, separate functions; especially for support vs engineering vs finance.
- Vendor & Outsource Risk Management: ensure third-party suppliers are audited, secure, monitored. They are frequent entry points.
- Secure wallet architecture: cold wallets, multi-sig, strong separation of transfer roles (e.g. cold → warm), careful monitoring of transactions especially those involving smart contracts or automation.
- Strict procedures for screen sharing, external link usage, code review: even internal staff should be wary; use verification channels.
- Logging, audit trails, network segmentation & device isolation: to limit damage in case of infiltration, and to detect anomalous behavior early.
- Incident response / bounty & recovery programs: as in the case of Bybit, offering bounties to trace stolen funds; also cooperation with law enforcement.
- Regulatory compliance, blockchain intelligence tools: using tools to monitor illicit addresses; sharing threat intel; aligning policies with jurisdictions.
Graph/Illustration Suggestion
Insert here: A bar or line graph showing Year-by-Year “Total Crypto Theft by DPRK-linked Actors” (2019-2025), and another line showing % of total crypto theft from exchanges vs individuals (personal wallets) over time.
Also Insert: Map highlighting regions with fastest growth in victim counts (Eastern Europe, MENA, CSAO etc.)
Conclusion
In summary, the evolving tactics of North Korean-linked cyber actors are making crypto ecosystems increasingly exposed—not only large centralized exchanges but individual users and internal trust relationships are under serious threat. What stands out is the scale: 2025 is on track to be the worst year to date for losses, much of it driven by a handful of huge heists like the Bybit event. Meanwhile, the attack vectors are increasingly sophistical—social engineering, vendor infiltration, impersonation, and manipulation of trust channels.
For those seeking new opportunities in crypto or blockchain, this presents both a warning and a driver: projects and platforms that can provide hardened security, verified identities, trust systems, compliance, auditable smart contracts, wallet security, etc., are going to be in high demand. Also, there is a premium on vigilance: anyone involved in the ecosystem—developers, investors, exchange workers—must assume that attackers may target the human as much as the code.