10x Research Market Updates

10x Research Market Updates

Share this post

10x Research Market Updates
10x Research Market Updates
Lazarus Group: The North Korean Hackers Behind Bybit’s $1.5 Billion Crypto Heist
Copy link
Facebook
Email
Notes
More
User's avatar
Discover more from 10x Research Market Updates
Actionable Market Insights - Make Smarter Decisions Faster – Subscribe and Access Expert Insights on Digital Assets and Financial Markets. / info@10xResearch.com | Author of "Crypto Titans" |
Over 37,000 subscribers
Already have an account? Sign in

Lazarus Group: The North Korean Hackers Behind Bybit’s $1.5 Billion Crypto Heist

10x Research's avatar
10x Research
Feb 21, 2025
12

Share this post

10x Research Market Updates
10x Research Market Updates
Lazarus Group: The North Korean Hackers Behind Bybit’s $1.5 Billion Crypto Heist
Copy link
Facebook
Email
Notes
More
Share

👇1-11) North Korean hackers are behind most crypto attacks, deploying specialized teams focusing exclusively on a single exchange or crypto service provider. The Bybit exchange hack, which resulted in the loss of $1.46 billion in staked Ether and other ERC-20 tokens on February 21, 2025, stands as the largest crypto hack in history—twice the size of the second-largest breach. Notably, North Korean hacking groups like Lazarus have been linked to several major attacks, including Ronin ($625m), KuCoin ($285m), and the Binance Bridge ($570m).

Share


Largest crypto hacks ($ millions at the time)


👇2-11) State-sponsored North Korean hackers initially targeted South Korean crypto exchanges because they often maintained escrow accounts holding Bitcoins in hot wallets connected to the internet. South Korea’s largest exchange (at the time), Bithumb, was raided at least four times. Usually, under the guise of being a trusted business partner, the hackers would plant malware on an exchange employee’s computer before finding ways to access the keys to the exchange’s hot wallets.

👇3-11) Moving large sums of cryptocurrencies around would be tough if the exchanges had adequate know-your-customer (KYC) and anti-money-laundering (AML) procedures. The preferred method for criminals to conceal a cryptocurrency trace is to use DeFi (decentralized finance) platforms and swap currencies without ever taking custody of the funds, as DeFi does not require any KYC or AML documentation. Based on data from Chainalysis, North Korean hackers used the DeFi protocol Uniswap to launder 275 million dollars of hacked cryptocurrencies from the KuCoin exchange on September 26, 2020. This was one of the largest hacks ever.

👇4-11) Eventually, hackers need to move stolen coins to an exchange or venue that can help them convert crypto back into fiat. However, to cover their tracks, criminal groups tend to leave sizable amounts of cryptocurrency untouched for many years after hacks.

👇5-11) In 2018, the Hong Kong-based exchange Bitfinex was hacked by the North Korean Lazarus Group for nearly 250 million dollars of cryptocurrencies—including ninety-five million dollars in Bitcoin and 141 million in Ethereum, plus smaller amounts of Zcash, Dogecoin, Ripple, Litecoin, and Ethereum Classic. The stolen coins were moved through other exchanges, with some of the Bitcoins then being transferred into an account held by Chinese citizens Tian Yinyin and Li Jiadong, who had successfully opened accounts at other exchanges using fake pictures and names. Tian moved more than thirty-four million dollars to his bank account, while Li used nine banks to funnel thirty-three million dollars.

👇6-11) Tian and Li are also believed to have laundered other misappropriated cryptocurrencies for North Korea after previous crypto exchange hacks, gaming the KYC process by uploading photoshopped government IDs and cashing out using several Chinese banks (several Chinese financial institutions offer accounts to North Koreans or front companies with relationships with the North Korean government). Both Tian and Li remain fugitives at large to this day.

👇7-11) The Lazarus Group is believed to be associated with the North Korean government and has been linked to cyberattacks and ransomware, which fund North Korea’s military ambitions. The attacks on South Korea’s crypto exchanges were executed similarly to the WannaCry hack that targeted Sony Pictures in May 2017, which is why experts have attributed many hacks to the Lazarus Group. Lazarus hackers would impersonate job recruiters and target specific individuals believed to have access to private keys. They would also use token offerings and social media to launch attacks.

👇8-11) Anne Neuberger, U.S. deputy national security advisor for cyber security, said in July 2022 that North Korea uses cybercrimes to gain financing for up to thirty percent of its missile program. North Korean hackers are sent to Shenyang in China for special training, and their hacking apprenticeship puts them through six years of special education. Chainalysis estimates North Korea stole approximately 1.7 billion dollars in cryptocurrencies in 2022 alone. Thirty million were recovered after analysts traced back the flow of funds that had moved through “crypto mixers”—DeFi protocols that can shuffle holdings of different users to obfuscate the funds’ origins. Some analysts believe North Korea was also behind the Coincheck hack in January 2018.

👇9-11) U.S. officials have also linked the Lazarus Group to the 625-million-dollar theft of the crypto game Axie Infinity in March 2022. The Axie Infinity blockchain was hacked via a fake LinkedIn job offer which duped a senior engineer at the company into applying for a job that did not exist. After multiple rounds of interviews, the engineer received a fake job offer delivered as a PDF document that he downloaded. This allowed spyware to infiltrate the Ronin Network, an Ethereum sidechain that Axie Infinity is built on, enabling the hacker to take control of four of the nine validators on the network. Validators create transaction blocks and update the data in crypto oracles (feeds that bring data from off-chain sources and put them on the blockchain for smart contract use).

👇10-11) North Korea has no free internet; the government controls online access. Every cyberattack is either explicitly authorized or directly orchestrated by the regime. The state handpicked and trained the country's hackers, with recruitment starting as early as age 11. These selected individuals receive special privileges, including spacious apartments and exemption from military service. The most talented are sent to China, North Korea’s closest remaining ally, for further training.

👇11-11) Since at least 2010, the Lazarus Group has been behind high-profile cyberattacks, mainly targeting Korean and Japanese crypto exchanges. These relentless breaches have led to significant financial losses and a decline in market share for affected platforms.

Share


12

Share this post

10x Research Market Updates
10x Research Market Updates
Lazarus Group: The North Korean Hackers Behind Bybit’s $1.5 Billion Crypto Heist
Copy link
Facebook
Email
Notes
More
Share

Discussion about this post

User's avatar
Bitcoin -5%. Why Understanding Macro Risks Is Crucial for Bitcoin Right Now
Global Liquidity and Inflation Are Driving Bitcoin.
Jan 8 • 
10x Research
25

Share this post

10x Research Market Updates
10x Research Market Updates
Bitcoin -5%. Why Understanding Macro Risks Is Crucial for Bitcoin Right Now
Copy link
Facebook
Email
Notes
More
Smart Bitcoin Traders Rely on These 3 Key Indicators to Stay Profitable $$$
These three indicators now matter the most for successful traders.
Jan 9 • 
10x Research
28

Share this post

10x Research Market Updates
10x Research Market Updates
Smart Bitcoin Traders Rely on These 3 Key Indicators to Stay Profitable $$$
Copy link
Facebook
Email
Notes
More
Rally is ON - Bitcoin >$100,000 - This is our Favorite Bitcoin Mining Stock NOW
We Like this ONE Bitcoin Mining Stock....as an AI play...
Jan 7 • 
10x Research
25

Share this post

10x Research Market Updates
10x Research Market Updates
Rally is ON - Bitcoin >$100,000 - This is our Favorite Bitcoin Mining Stock NOW
Copy link
Facebook
Email
Notes
More

Ready for more?

© 2025 10x Research
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture

Share

Copy link
Facebook
Email
Notes
More

Create your profile

User's avatar

Only paid subscribers can comment on this post

Already a paid subscriber? Sign in

Check your email

For your security, we need to re-authenticate you.

Click the link we sent to , or click here to sign in.