DPRK Hackers Steal Record $2 Billion in Crypto Despite Bybit Breach Response


North Korea-linked operators stole $2 billion in cryptocurrency across 2025, marking their most aggressive year yet. The Bybit exchange hack on February 21, 2025, took $1.46 billion in a single blow, history’s largest confirmed crypto theft. Far from slowing down, DPRK groups intensified attacks through 2026. Elliptic’s full analysis confirms social engineering drives every major incident

January 2026 saw double the exploits compared to January 2025. Total known DPRK crypto theft now exceeds $6 billion. Funds directly finance weapons programs. Attackers expanded beyond exchanges to developers and contributors.

Social engineering remains the entry point. AI-generated fake identities fool even experts. Victims face convincing job offers or urgent tech fixes. Once engaged, malware grabs private keys instantly.

Bybit funds laundered through refund scams, junk tokens, and Chinese OTC desks. Over $1 billion cleaned by August 2025. Infrastructure matured post-Bybit, not declined.

DangerousPassword campaign compromises social accounts first. Fake video calls show “audio errors” pushing malicious SDK installs. Contagious Interview offers dream developer jobs with infected code repos.

Both generated $37.5 million from January to mid-February 2026 alone. Corporate devices become ransomware vectors. One infected wallet drains entire teams.

Attack Campaigns Table

CampaignMethodPayout (2026)
DangerousPasswordFake Zoom/Teams + SDK malware$20M+
Contagious InterviewJob lures + infected repos$17.5M
Bybit Follow-upsExchange smart contract exploits$1.46B (2025)

Developers face highest risk now. Unsolicited collaborations carry malware. Enterprises must verify all remote contributors rigorously.

Social Engineering Tactics

AI crafts LinkedIn profiles and messages that pass scrutiny. Victims reference “shared connections” or past projects convincingly.

Fake interviews request “skills tests” via GitHub. Repos hide keyloggers in npm dependencies or build scripts.

Video call traps push urgent “connection fixes” downloading trojanized tools. Seed phrases harvested within minutes.

Organizations lost millions to single careless clicks. Crypto firms report daily attempts. Verification gaps persist across teams.

Defense Measures

  • Vet all unsolicited job offers and collaborations.
  • Block command-line installs from unverified sources.
  • Scan GitHub repos before cloning.
  • Train developers on AI social engineering red flags.
  • Monitor wallets for DPRK laundering patterns.

DPRK operations show no signs of stopping. Global crypto security demands new defenses beyond technical controls. Human vigilance remains the weakest link.

FAQ

How much did DPRK steal in 2025?

$2 billion across multiple attacks. Bybit’s $1.46B was the largest single theft.

What funds their weapons programs?

Laundered crypto through OTC desks and mixing services. Over $6B total since tracking began.

Primary attack vector?

Social engineering via AI-crafted identities. Targets developers and contributors.

What are DangerousPassword and Contagious Interview?

Fake video calls and job interviews delivering key-stealing malware.

How to protect crypto teams?

Verify identities, scan repos, block unapproved installs. Elliptic report linked above.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages