North Korea Stole $2B in Crypto Last Year. It’s Buying Missiles With It.

North Korea Stole $2B in Crypto Last Year. It’s Buying Missiles With It.

Here’s something nobody in your boardroom wants to hear over coffee: your organisation’s last ransomware payment may be funding North Korea’s ballistic missile programme. Not funding it loosely in the vague geopolitical sense. Funding it specifically, directly, and with the blessing of a state that the US intelligence community has publicly assessed as “sophisticated and agile” in cyber operations. This morning, while you’re reading this, CSIS is running a live event on exactly this problem — US-ROK cyber cooperation specifically focused on North Korea’s cryptocurrency operations and how to stop them. The fact that a think tank has to convene a joint US-South Korean scholarly research effort to figure out how to handle a nation-state running what is effectively the most prolific crypto theft operation in human history tells you a great deal about where we are.

What’s Actually Happening

On February 21, 2025, North Korea’s Lazarus Group — tracked by the US government as TraderTraitor and APT38 — transferred approximately $1.5 billion in Ethereum and associated tokens out of the Bybit exchange in what became the single largest cryptocurrency theft in recorded history. The method was a supply chain attack on Safe{Wallet}’s developer infrastructure: the Lazarus Group compromised a developer machine, injected malicious JavaScript into the signing interface served to Bybit’s multi-sig signers, and altered what the signers saw on screen while the underlying transaction pointed to a Lazarus-controlled address. Three authorised signers approved what they believed was a routine internal transfer. One HTTP request. One and a half billion dollars. Gone.

Within 48 hours, per TRM Labs’ on-chain forensics, at least $160 million had already been laundered through dozens of wallets, cross-chain bridges, and decentralised exchanges. TRM’s analysis of the broader laundering pattern identifies a structured 45-day multi-wave process: immediate layering via DeFi and mixing services in the first five days, integration through second-tier exchanges and bridges by day ten, and final conversion to fiat through Chinese-language over-the-counter trading services by day 45. Blockchain investigator ZachXBT’s forensic work confirmed attribution via test transactions and wallet graph analysis connecting the Bybit funds to addresses used in prior Lazarus operations including Phemex, BingX, and Poloniex.

The Bybit heist was one incident in what Chainalysis and the Hacker News’ December analysis assessed as a $2.02 billion year for North Korea’s cyber theft operations across 2025. The $1.5 billion Bybit figure alone dwarfs the 2024 total of $1.34 billion across 47 separate heists. And then in late November 2025, Lazarus struck again: per Recorded Future’s analysis, South Korean exchange Upbit lost approximately $36 million to a hack that South Korean officials attributed to Lazarus Group based on TTPs and laundering patterns consistent with prior TraderTraitor operations.

The US intelligence community has connected the accounting directly. The 2026 ODNI Annual Threat Assessment, presented to Congress on March 18, assesses that North Korea’s cyber programme “probably stole $2 billion” in 2025 and that those proceeds are “helping to fund the regime, including further development of its strategic weapons programs.” The UN has tracked this pattern for years: a 2024 UN Panel of Experts report documented North Korea funding “a significant share” of its weapons programmes, including ballistic missile development, through cryptocurrency theft.

Which brings us to today. This morning, CSIS and South Korea’s National Security Research Institute jointly host a US-ROK cyber cooperation event specifically examining how cryptocurrency enables North Korean cybercrime and how two countries who both have a great deal to lose can build a joint strategy to stop it. The first panel examines the role of cryptocurrency in the threat landscape and what regulatory and policy levers can actually impede laundering at scale. The second examines active cyber deterrence — South Korea’s 2024 National Cybersecurity Strategy introduced proactive cyber defence concepts that partially mirror the US DoD’s Defend Forward doctrine, and the CSIS paper published alongside the event argues that alignment between the two approaches is both possible and strategically necessary. The timing of this event — six days before Trump flies to Beijing for his summit with Xi, in a week where the US-South Korea alliance is under visible strain from Trump’s transactional approach to defence commitments — is not coincidental.

The Cyber Layer Nobody Is Writing About

The financial crime coverage of the Bybit hack was voluminous and reasonably good. The national security coverage was thin, and what existed focused on the headline number. What the coverage almost entirely missed is the enterprise security implication of the specific attack vector Lazarus used, and why it matters far beyond the cryptocurrency sector.

The Bybit attack was not a smart contract exploit. It was not a cryptographic break. It was a UI injection at the signing layer — malicious JavaScript that altered what authorised users saw on screen while modifying the underlying transaction they were signing. Sygnia’s post-mortem confirms this: the attack compromised the JavaScript front-end served to Bybit’s signers from Safe{Wallet}’s infrastructure, not Bybit’s own systems. The signers did everything right. They followed their procedures. They approved what appeared to be a legitimate transaction. The visual layer lied to them. This is sometimes called blind signing — approving a hash without being able to verify the decoded transaction destination — and it is a class of attack that applies well beyond cryptocurrency multisig wallets.

The same technique — compromising the rendering layer to show legitimate-looking interfaces that execute malicious underlying operations — is directly applicable to enterprise web applications, cloud management consoles, and any web-based approval workflow where the interface is served from a third-party supply chain. Think about how many enterprise applications in your environment are SaaS-delivered and rely on JavaScript served from vendor infrastructure. Think about how many approval workflows — expense approvals, access provisioning, payment authorisations — are web-based and trust the rendering layer to show the user what they’re actually approving. The Bybit attack is a worked example of what happens when that trust is misplaced.

Per TRM Labs, “heavy use of professional Chinese-language money laundering services and over-the-counter traders suggests that DPRK threat actors are tightly integrated” with Chinese underground financial networks. That integration — state-sponsored hackers operating through Chinese OTC networks to convert crypto to fiat — is why enforcement against individual wallet addresses has limited impact. The FBI’s PSA following the Bybit hack released 51 Ethereum addresses and urged exchanges to block TraderTraitor transactions. That is a meaningful action with genuinely limited effectiveness against a group that can launder $200 million within 48 hours and has an entire underground financial infrastructure to absorb volume.

The CSIS event’s focus on cryptocurrency policy is one lens. My earlier analysis of why Handala’s Iran-linked operation against Stryker and the broader cyber-kinetic reality of Operation Epic Fury established a consistent pattern: when state actors use cyber operations for strategic objectives, the enterprise security community is perpetually downstream of the intelligence community’s understanding of the threat. Lazarus Group has been running supply chain attacks, fake job interview malware delivery, and dependency poisoning in the npm/crypto/Web3 ecosystem for years. The techniques show up in enterprise security research long after they’ve already been deployed in production.

My research on Bitcoin and the dark web as instruments of financial coercion and criminal enterprise addressed this pattern over a decade ago: cryptocurrency’s pseudonymous properties, combined with mixer and cross-chain laundering infrastructure, create a financial ecosystem that is functionally hostile to conventional law enforcement at scale. The Bybit operation is the latest, largest, and most technically sophisticated demonstration of that thesis. The proceeds are now, per the ODNI, in missiles.

Why It Matters Beyond the Conflict Zone

The enterprise translation operates at three levels.

First, for any organisation operating in digital assets, DeFi, or financial technology: the Bybit attack is a threat model update. Lazarus Group does not exclusively target exchanges. Their documented tactics include fake job interviews targeting developers, sending malicious test assignments or code review requests that install macOS and Windows backdoors. They target individual engineers at high-value organisations. A developer at a fintech firm who gets a LinkedIn message from what appears to be a crypto VC’s technical team is a realistic Lazarus vector. The FBI’s Lazarus Group advisory is a required read, not a nice-to-have.

Second, for enterprises who have paid ransomware operators: TRM Labs’ analysis of North Korean laundering networks documents the use of the same OTC infrastructure — Huione and similar Chinese-language services — across both TraderTraitor operations and other criminal groups. Ransomware payments that flow through this infrastructure may be commingled with North Korean theft proceeds at the laundering layer. I’m not suggesting legal liability for ransomware victims. I’m suggesting that the financial ecosystem your payment enters is the same one funding Pyongyang’s weapons programme, and that is a fact your CFO, legal team, and board should be aware of when making ransomware response decisions.

Third, and most broadly: the CSIS event today is explicitly examining whether active cyber deterrence and US-ROK joint operations against North Korean cyber infrastructure can actually impose enough cost to change Lazarus Group’s calculus. The academic conclusion is that it can, but only with sustained allied coordination and regulatory frameworks that make laundering harder at every choke point. That conclusion has direct implications for enterprise security. Sanctions enforcement, exchange reporting obligations, and wallet-screening requirements are not abstract regulatory compliance exercises — they are the choke points the policy community is betting on to slow the flow.

What Went Wrong

Two structural failures, named explicitly because naming them is how they get fixed.

First, the safe signing problem. The Bybit multi-sig architecture was sound. The Safe{Wallet} platform is widely deployed and generally well-regarded. The failure was in the assumption that the JavaScript rendering layer of a third-party web application is part of your trusted security boundary. It is not. Bybit’s signers were approving transactions through a UI rendered by infrastructure they didn’t control, without hardware-level transaction decoding that would have revealed the malicious destination address before signing. Hardware wallets with decoded transaction display — showing the actual destination address in human-readable form on a device that cannot be compromised by JavaScript injection — exist. Bybit didn’t use them for this workflow. After $1.5 billion, that decision has been thoroughly post-mortemed.

Second, the policy lag. The IC has known for years that Lazarus Group funds state weapons programmes through cryptocurrency theft. The regulatory and operational response has been perennially behind the operational tempo. The CSIS event happening today is a research effort examining what a joint US-South Korea policy framework would look like. That framework doesn’t exist yet. The $2 billion 2025 figure is the cost of that gap.

The Fix — Fixer’s Advice

For organisations operating in digital assets, Web3, fintech, or any financial platform that handles cryptocurrency:

Transaction signing architecture: The Bybit attack is the canonical argument for hardware signing with decoded transaction display. Any multi-sig workflow where signers are approving transactions through a browser-rendered UI that is served from third-party infrastructure is vulnerable to UI injection at the signing layer. Deploy hardware wallets — specifically devices that decode and display transaction destinations on the device screen, not in the browser window — for any high-value transfer approval workflow. The category of device that would have prevented the Bybit attack is commercially available. Trezor, Ledger, and GridPlus Lattice all provide decoded display. The operational friction is real. So is losing $1.5 billion.

Supply chain review for signing infrastructure: If your organisation uses Safe{Wallet} or any other multi-sig platform, your threat model now explicitly includes the possibility that the JavaScript served from that platform’s CDN or build infrastructure has been tampered with. Pin the JavaScript versions you depend on. Use Subresource Integrity (SRI) hashes in HTML to cryptographically verify that the JavaScript your signers load matches the expected code. Treat your signing interface like production code that requires supply chain provenance verification — because it is.

Developer security — Lazarus fake job vectors: Lazarus Group’s documented social engineering vectors specifically target developers. The fake recruiter, the code review request, the GitHub collaboration invitation. Train your development teams explicitly on this pattern. A test assignment ZIP from a crypto VC’s supposed engineering team, a “take-home challenge” from a financial technology company’s recruiter, a GitHub pull request from a researcher you just connected with on LinkedIn — all of these are documented Lazarus delivery mechanisms. Detection is not about technical sophistication. It’s about recognising the recruitment-as-malware-delivery pattern and having a protocol: unzip nothing, execute nothing, until you’ve verified the sender through a channel you established independently.

Wallet screening and regulatory posture: The FBI’s wallet screening request after Bybit has teeth. If your platform handles cryptocurrency, implement real-time screening of incoming and outgoing transactions against Lazarus Group-linked addresses published by the FBI, OFAC, and blockchain analytics firms including Chainalysis and Elliptic. This is both the legally correct thing to do under OFAC sanctions compliance requirements and the operationally correct thing to do to avoid knowingly processing laundering flows. Chainalysis and TRM Labs both maintain live feeds. Integrate them.

Incident response planning for exchange-level theft: If you operate a cryptocurrency exchange or custody service, the Bybit playbook — emergency bridge loan, immediate communication with users, bounty programme for frozen assets, coordinated blockchain analytics engagement — is now the industry standard. Document your version of that playbook before you need it, because you will not have time to write it after the alert fires.

Board-level disclosure awareness: North Korean crypto theft is no longer an industry-specific niche risk. The ODNI assessment has made it a boardroom-level geopolitical fact. Your board should understand that your organisation’s cryptocurrency holdings, custody practices, and any DeFi exposure represent potential Lazarus Group targeting surface, and that the proceeds of successful attacks fund the weapons programme of a nuclear state. That context changes the risk calculus from “financial crime risk” to “national security risk” in a way that warrants explicit governance attention.

Final Call-Out

The CSIS event happening this morning is a policy forum trying to build a framework for something the industry has been losing for eight years. North Korea ran the largest cryptocurrency theft in history in February 2025, laundered it within six weeks through Chinese underground financial networks, and the ODNI confirmed the proceeds are funding ballistic missiles. The policy community knows this. The IC knows this. The exchange that lost $1.5 billion in eight seconds absolutely knows this. The question is whether the rest of the enterprise security world has updated its threat model to include “state-directed, weapons-financing supply chain attack” as a category of risk that requires specific architecture and governance responses. Based on the coverage I’ve seen, the answer is: not yet.

Keywords

North Korea Lazarus Group crypto theft 2026, Bybit $1.5 billion hack Lazarus, TraderTraitor cryptocurrency heist, DPRK weapons financing cryptocurrency, US ROK cyber cooperation CSIS, Lazarus Group UI injection signing attack, Safe{Wallet} supply chain compromise, North Korea ballistic missile cyber funding, cryptocurrency exchange security, how to prevent Lazarus Group attack

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.