DPRK’s ‘Quality Over Quantity’ Pivot: $2B Stolen in 2025
Chainalysis data shows North Korea stole $2.02B in 2025, a 51% jump driven by the Bybit hack and insider IT threats.
North Korea’s state-sponsored hackers have abandoned volume for precision, logging a record $2.02 billion in stolen crypto assets this year. A new report from Chainalysis reveals the pivot: despite executing 74% fewer attacks than in 2024, the total value looted surged 51%.
The efficiency metrics are alarming. Lazarus Group and its affiliates are no longer spamming the network with low-level exploits. Instead, they are successfully hunting whales. The 2025 total. now pressing a cumulative all-time haul of $6.75 billion. was heavily skewed by the massive Bybit breach in February, which siphoned ~$1.5 billion in Ethereum tokens.
The Human Vector
Code vulnerabilities are taking a backseat to social engineering. The Chainalysis data indicates that 76% of service compromises in 2025 involved the “IT worker” vector. North Korean operatives gaining employment at crypto firms to secure privileged access.
North Korean threat actors are increasingly achieving these outsized results often by embedding IT workers – one of DPRK’s principal attack vectors – inside crypto services.
Once inside, the extraction is clinical. The report details a standardized 45-day laundering window for major thefts, moving funds from immediate obfuscation (mixers) to final integration (OTC desks). This operational discipline suggests the DPRK has effectively industrialized its cyber-finance division, treating hacks less like crimes and more like quarterly revenue targets.
Institutional Context
For centralized exchanges and custodians, the threat profile has shifted. The perimeter is no longer just the smart contract; it is the payroll. The dramatic drop in attack frequency suggests Lazarus is spending months on reconnaissance and infiltration rather than probing for quick DeFi flash loan exploits. Security teams must now audit their colleagues as rigorously as their code.