North Korea Shatters Records With $2 Billion Crypto Theft — Total Now $6.75 Billion

North Korea crypto theft data showing $2 billion stolen in 2025

On December 18, 2025, new data revealed that North Korea has driven a record-breaking $2.02 billion in cryptocurrency theft this year, pushing its all-time total to an astonishing $6.75 billion.

The findings highlight a dramatic escalation in the scale of cyberattacks linked to the Democratic People’s Republic of Korea (DPRK), even as the number of confirmed incidents has sharply declined.

According to Chainalysis, the surge reflects increasingly sophisticated tactics and a shift toward fewer but far more damaging operations.

The report shows that DPRK-linked hackers accounted for 76% of all service compromises in 2025, marking the most severe year on record.

Despite a 74% drop in known attack frequency, the total value stolen soared by 51% compared to 2024.

This trend underscores a strategic evolution: instead of frequent small breaches, North Korean threat actors are now executing fewer, high-impact attacks targeting major exchanges and centralized services.

North Korea’s Crypto Theft Hits $2 Billion in 2025

One of the biggest contributors to this year’s spike was the massive Bybit hack in February 2025, which alone accounted for $1.5 billion in stolen funds.

Chainalysis notes that centralized platforms remain vulnerable due to private key compromises, which represented 88% of losses in Q1 2025.

Meanwhile, personal wallet compromises surged to 158,000 incidents affecting at least 80,000 victims, although the total value stolen from individuals dropped to $713 million.

The report also highlights that the top three hacks of 2025 accounted for 69% of all service-related losses.

The largest incidents were more than 1,000 times bigger than the median theft, marking the first time this threshold has been crossed. This widening gap shows how catastrophic single breaches have become in the crypto ecosystem.

DPRK’s Laundering Tactics Grow More Sophisticated

North Korean cybercriminals continue to rely heavily on Chinese-language money laundering networks, cross-chain bridges, and mixing services.

Over 60% of their laundering activity involves transfers under $500,000, a tactic designed to avoid detection.

Chainalysis reports that DPRK-linked actors follow a predictable 45-day laundering cycle after major hacks, moving funds through multiple waves of DeFi protocols, mixers, and no-KYC exchanges.

In contrast, other cybercriminal groups show stronger preferences for decentralized exchanges, lending protocols, and peer-to-peer platforms.

The DPRK’s unique laundering footprint reflects its reliance on Asia-Pacific illicit networks and its need to bypass international sanctions.

With billions already stolen and laundering methods becoming more advanced, the challenge for exchanges and regulators will be detecting and stopping these operations before another Bybit-scale breach occurs.

William Ross
About William Ross 529 Articles
I am a cryptocurrency enthusiast and writer with over five years of experience in the industry.I have been following the development and innovation of Bitcoin and Ethereum since their inception, and I enjoy sharing my insights and analysis with readers.I have written for various reputable platforms, such as CoinDesk, Cointelegraph, and Decrypt, covering topics such as market trends, regulation, security, and adoption.I believe that cryptocurrency is the future of finance and technology, and I am passionate about educating and informing people about its benefits and challenges.