North Korea Crypto Ban and State-Sponsored Hacking Operations in 2025

North Korea Crypto Ban and State-Sponsored Hacking Operations in 2025 Feb, 14 2026

North Korea doesn’t just ignore crypto bans-it weaponizes them. While the world talks about regulating digital assets, Pyongyang has turned cryptocurrency theft into a high-stakes national strategy. In 2025, North Korean hackers stole over $2.17 billion from crypto exchanges and DeFi platforms, making it the most devastating year for digital asset theft in history. That’s more than the entire total of 2024, and it’s all part of a coordinated, state-backed effort to bypass international sanctions and fund nuclear weapons programs.

The ByBit Hack: A Turning Point

The biggest shock came on February 21, 2025, when the ByBit exchange was breached in an attack called "TraderTraitor" by the FBI. Around $1.5 billion in crypto was stolen in a single operation. What made this different wasn’t just the size-it was how they did it.

ByBit stored most of its assets in "cold wallets," hardware devices kept offline to avoid hacking. These were supposed to be untouchable. Yet North Korean operatives found a way in. They didn’t brute-force the system. They didn’t exploit a software bug. They went after the people.

Using social engineering, they infiltrated the exchange’s IT team. Some employees were tricked into installing malware. Others were recruited through fake job offers. The FBI later confirmed that North Korean workers, posing as remote developers from Southeast Asia or Eastern Europe, had been hired by Western tech firms-including some linked to crypto infrastructure. These insiders had direct access to security systems, and they used it.

After the theft, the stolen funds were quickly converted into Bitcoin, Ethereum, and stablecoins, then scattered across thousands of wallet addresses. The goal? To make tracking impossible. And it worked-for a while.

How North Korea Turns Crypto Into Weapons

North Korea’s crypto strategy isn’t random. It’s a three-part system designed to launder money, hide identities, and fund weapons programs.

First, they target exchanges. Binance, KuCoin, Gate.io, and others have all been hit in past years. But ByBit was the crown jewel. The hackers didn’t just steal-they studied how these platforms operate, what security layers they use, and how long it takes to freeze funds. They timed their attack perfectly.

Second, they use third-country laundering hubs. Cambodia became a key node. The U.S. Treasury’s FinCEN identified the Huione Group as a major player. Huione Crypto issues untraceable stablecoins. Huione Guarantee provides the tech tools for scams. Between 2021 and 2025, over $37.6 million in North Korean-linked crypto flowed through them. And that’s just what we know.

Third, they deploy thousands of IT workers abroad. The UN estimates these workers generate up to $600 million a year for the regime. They work remotely for companies in the U.S., Canada, Germany, and Australia. They use fake IDs, fake resumes, and fake Zoom backgrounds to appear as local freelancers. They get paid in crypto. No bank account. No paper trail. Just digital cash flowing straight to Pyongyang.

A disguised hacker at home sending stolen crypto through a Cambodian laundering hub.

Who’s Trying to Stop Them?

The U.S. government didn’t sit back. On the same day as the ByBit hack, the Treasury’s OFAC sanctioned the Korea Sobaeksu Trading Company and three individuals tied to the operation. Kim Se Un and Jo Kyong Hun were named as key players in managing the cybercrime pipeline. Myong Chol Min was linked to crypto laundering networks.

The Department of Justice unsealed indictments against seven North Korean nationals for violating sanctions through fake cigarette smuggling and crypto theft. The State Department offered rewards up to $7 million for information leading to arrests.

The FBI didn’t stop at legal actions. They reached out to crypto companies directly. They shared lists of blockchain addresses tied to the TraderTraitor operation. Exchanges, bridges, and DeFi protocols were told: block these wallets. Don’t process transactions from them. Don’t even route traffic through them.

Senators Elizabeth Warren and Jack Reed demanded answers. In a letter to Treasury and Justice, they asked: What are you doing to stop this? What’s holding you back? Their deadline: June 2, 2025. The message was clear-this isn’t just a crime problem. It’s a national security emergency.

Why Traditional Crypto Bans Don’t Work

Many countries have banned cryptocurrency trading to stop money laundering. But North Korea doesn’t trade crypto. They steal it. And they don’t need to use local banks or exchanges to move it.

Their entire system is built on anonymity. They don’t need to buy Bitcoin-they take it. They don’t need to convert it-they use stablecoins that can’t be frozen. They don’t need to hide their identity-they’re already hidden, working remotely from halfway across the world.

A ban on crypto trading in South Korea or Japan won’t stop a hacker in Pyongyang from stealing funds from a U.S.-based exchange. A ban on mining in Russia won’t stop a North Korean worker in Vietnam from receiving payments in crypto for writing code.

The real problem? The global system still treats crypto like a financial product. But for North Korea, it’s a weapon-and they’ve built a whole supply chain around it.

A Bitcoin on trial as North Korean hackers evade arrest with jetpacks and blockchain arrows.

What’s Next?

Experts warn that 2026 will be worse. North Korea is learning. They’re building custom tools to bypass blockchain analytics. They’re hiring more hackers. They’re partnering with criminal gangs in China, Myanmar, and Africa to move funds faster.

Crypto exchanges are now spending 30% more on cybersecurity. Some have started requiring biometric verification for all employees with access to hot wallets. Others are using AI to detect unusual transaction patterns in real time.

But that’s reactive. What’s needed is global coordination. Right now, each country acts alone. The U.S. sanctions. South Korea monitors. Japan audits. But North Korea moves across borders, through networks, and across time zones with ease.

Until there’s a unified international response-shared threat intelligence, joint blockchain tracing teams, real-time freezing of suspect wallets-these attacks will keep growing.

What This Means for Regular Crypto Users

You might think this doesn’t affect you. But it does.

If a major exchange gets hacked, prices crash. Trust erodes. Smaller platforms shut down. Insurance funds get drained. Your portfolio loses value-even if you never touched a North Korean wallet.

And if crypto becomes too risky, regulators will crack down harder. More KYC. More limits. More surveillance. The freedom that made crypto appealing in the first place could vanish-not because of bad actors like you, but because of bad actors like Pyongyang.

The truth is simple: North Korea isn’t trying to use crypto. They’re trying to break it. And if we don’t fix the holes, they’ll keep winning.

Has North Korea ever been caught stealing crypto?

Yes. The FBI and U.S. Treasury have publicly attributed multiple major hacks to North Korea, including the 2022 Harmony Bridge breach ($100 million), the 2023 Axie Infinity attack ($625 million), and the 2025 ByBit hack ($1.5 billion). In each case, investigators traced stolen funds to blockchain addresses linked to known DPRK-operated wallets. The U.S. has issued sanctions against individuals and companies tied to these operations, and the Department of Justice has unsealed indictments against North Korean nationals.

Why can’t blockchain technology stop North Korea from stealing crypto?

Blockchain is transparent, but not foolproof. While every transaction is recorded, it doesn’t reveal who owns the wallet. North Korea uses thousands of addresses, mixes funds across chains, and converts assets into privacy coins or stablecoins to obscure origins. They also rely on human errors-phishing, fake jobs, insider access-to bypass security, not technical exploits. No blockchain can prevent a hacker hired as a remote developer from stealing access codes.

How do North Korean hackers get paid in crypto without being traced?

They don’t need to cash out. Many work as freelance developers for foreign companies, receiving payments directly in Bitcoin or USDT. They use decentralized wallets, avoid exchanges, and rely on peer-to-peer trading platforms. Some use crypto-to-crypto bridges to move funds between blockchains, making tracking harder. Others launder funds through third-party services in Cambodia or Laos, where regulations are weak or nonexistent.

Can cryptocurrency exchanges protect themselves from North Korean attacks?

Yes, but it requires more than software. Exchanges must implement strict employee vetting, require multi-factor authentication for all internal systems, monitor for unusual login patterns, and use AI to detect behavioral anomalies. Cold wallet access should be restricted to physically secure locations with biometric controls. Many exchanges still rely on outdated security models designed for retail fraud-not state-sponsored cyberwarfare.

What role does China play in North Korea’s crypto theft?

China doesn’t officially support North Korea’s crypto operations, but its border regions-especially near Dandong-serve as key transit points for laundering. Chinese underground exchanges, unregulated P2P platforms, and cash-based crypto dealers help convert stolen digital assets into fiat currency. While Chinese authorities have cracked down on some operations, enforcement remains inconsistent, and corruption in local financial networks allows these flows to continue.