Security

Cyber-crime

Crypto klepto North Korea stole $659M over just 5 heists last year

US, Japan, South Korea vow to intensify counter efforts


North Korean blockchain bandits stole more than half a billion dollars in cryptocurrency in 2024 alone, the US, Japan, and South Korea say.

The sum of stolen assets totaled a little more than $659 million across five major incidents, although just two contributed a large portion of that.

The BitcoinDMM crypto exchange was raided for $308 million in May 2024 – the biggest haul of the five heists - by a group tracked by law enforcement agencies as TraderTraitor.

To pull it off, the North Korean attackers upended their usual playbook of seeking employment at Western organizations and assumed the role of recruiter. 

They reached out to a staffer at Japanese enterprise crypto wallet company Ginco in March with a pre-employment test, which turned out to be a malicious Python script. The job seeker uploaded it to their personal GitHub page, which was then compromised.

TraderTraitor exploited stolen session cookies to impersonate the Ginco employee to gain access to the company's unencrypted comms system in May. From there, the group tampered with a transaction request made by a BitcoinDMM worker to forward the stolen funds to North Korean wallets.

The attack on Indian crypto exchange WazirX also raked in a pretty penny for Kim's crew – $235 million to be precise. 

Mere months after the BitcoinDMM attack, WazirX was hit in July and according to Arkham data, by September North Korea had laundered most of the stolen assets using the Tornado Cash mixer service.

Cyvers Alerts first detected the compromise of the exchange's multi-signature wallet on July 18, claiming the stolen assets comprised around 45 percent of the exchange's total reserves. WazirX halted operations the following day and engaged all the outside expertise it could.

The exchange's postmortem report revealed that the attackers compromised the transaction authorization processes at both WazirX and Liminal, the two signatories that approve transactions on the affected wallet.

It said four of six signatures are required to authorize a transaction – three from WazirX and one from Liminal. The North Korean attackers obtained all four, but the exchange still found no evidence of compromise on its signers' machines.

WazirX said one of two possible scenarios could be true, claiming that Liminal's infrastructure was likely breached in both:

  1. Considered by WazirX as the more likely explanation, it involves malicious transactions sent by a potentially compromised Liminal to exchange signers. It believes that because no new connection requests were made to hardware wallets, the request came from an address whitelisted by Liminal, and that expected token names and the destination address were seen on the Liminal interface and email notifications.

  2. All three exchange signers were compromised by malware by unknown means, despite no malware being found. WazirX emphasized that this would also mean a breach at Liminal had to have taken place to obtain the fourth signature.

The other named incidents affected Upbit, Rain Management, and Radiant Capital.

The three countries raising awareness of North Korea's actions said the schemes being concocted to steal these huge sums are sophisticated and well disguised.

The FBI said in September, around the time it started noticing a significant uptick in North Korea's targeting of the crypto industry: "North Korean social engineering schemes are complex and elaborate, often compromising victims with sophisticated technical acumen. Given the scale and persistence of this malicious activity, even those well versed in cybersecurity practices can be vulnerable to North Korea's determination to compromise networks connected to cryptocurrency assets.

"North Korean malicious cyber actors conducted research on a variety of targets connected to cryptocurrency exchange-traded funds (ETFs) over the last several months. This research included pre-operational preparations suggesting North Korean actors may attempt malicious cyber activities against companies associated with cryptocurrency ETFs or other cryptocurrency-related financial products."

The three said this week they will continue to work together to counter North Korea's attempted attacks, and called for deeper collaboration between the public and private sectors to step up these efforts.

They also once again drew attention to North Korea's ongoing attempts to siphon funds out of enemy economies by securing employment at Western companies, typically in IT roles.

The public communications about these schemes have been coming for a few years now but intensified during 2024. The US government maintains that the money generated from this activity is used to fund North Korea's weapons programs.

High-profile incidents, such as the one involving KnowBe4 in July, alerted the industry that North Korea can even infiltrate major cybersecurity companies.

Kim's spy passed four video interviews after faking a US identity and landed a software engineering job on the vendor's AI team. He wasn't caught until he started loading malware using his company-issued Mac.

Other cases reported by incident responders demonstrated that even after being outed and ousted, North Korean workers demanded six-figure ransoms for data they stole during their undercover work.

The US Department of Justice said last month that in the past six years, these rogue employment schemes have netted North Korea $88 million. ®

Send us news
12 Comments

Pastor's divine 'dream' crypto scheme indicted by Uncle Sam

Plus: Man who tossed Bitcoin drive worth millions barred from digging in dump

Datacus extractus: Harry Potter publisher breached without resorting to magic

PLUS: Allstate sued for allegedly tracking drivers; Dutch DDoS; More fake jobs from Pyongyang; and more

When food delivery apps reached Indonesia, everyone put on weight

PLUS: Salt Typhoon and IT worker scammers sanctioned; Alibaba Cloud’s K8s go global; Amazon acquires Indian BNPL company

Trump's freshly minted meme coin passes $10B market cap

Crypto critics unhappy as BTC hits all-time high and Melania launches her own currency

Fortinet: FortiGate config leaks are genuine but misleading

Competition hots up with Ivanti over who can have the worst start to a year

Medusa ransomware group claims attack on UK's Gateshead Council

Pastes allegedly stolen documents on leak site with £600K demand

Russia's Star Blizzard phishing crew caught targeting WhatsApp accounts

FSB cyberspies venture into a new app for espionage, Microsoft says

China's Salt Typhoon spies spotted on US govt networks before telcos, CISA boss says

We are only seeing 'the tip of the iceberg,' Easterly warns

FBI wipes Chinese PlugX malware from thousands of Windows PCs in America

Hey, Xi: Zài jiàn!

Miscreants 'mass exploited' Fortinet firewalls, 'highly probable' zero-day used

Ransomware 'not off the table,' Arctic Wolf threat hunter tells El Reg

Microsoft sues 'foreign-based' cyber-crooks, seizes sites used to abuse AI

Scumbags stole API keys, then started a hacking-as-a-service biz, it is claimed

Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

'Codefinger' crims on the hunt for compromised keys