North Korean Lazarus Group Successfully Launders $300M from Record Crypto Heist

Fri Apr 18 2025 16:41:39 GMT+0300 (Eastern European Summer Time)
North Korean Lazarus Group Successfully Launders $300M from Record Crypto Heist

North Korean hackers have slashed $300 million from a $1.5 billion crypto breach, challenging global cybersecurity firms in an ongoing chase to recover stolen assets.


The Lazarus Group, believed to be linked to North Korea, managed to launder $300 million from their historic $1.5 billion hack of crypto exchange ByBit, raising concerns about their advanced tactics in cybercrime and money laundering.


In a bold and meticulously planned offense, North Korean hackers, operating under the notorious Lazarus Group, have successfully laundered an impressive $300 million of the $1.5 billion they stole from the cryptocurrency exchange ByBit just two weeks ago. Experts believe this ultimate breach marks one of the most significant hacks in the crypto sphere, adding to the ongoing saga of North Korea's cyber capabilities.

According to cybersecurity professionals, tracking and blocking the hackers' movements has turned into an intricate game of digital cat-and-mouse. Dr. Tom Robinson, co-founder of the crypto analysis firm Elliptic, stated that the Lazarus Group continues to work tirelessly, potentially up to 24 hours a day, as they navigate the complexities of converting their stolen cryptocurrency into cash. This alarming possibility raises questions surrounding whether these funds may be funneled toward the regime's military ambitions.

Dr. Robinson described the hackers as highly skilled and organized, likely employing a team of individuals working in shifts, equipped with automated tools—enabling them to obfuscate their money laundering tactics. In what has become a grim forecast for recovery efforts, Elliptic's analyses align with ByBit's reports that 20% of the stolen assets have now gone undetectable.

On February 21, the hackers managed to manipulate ByBit's systems through a supplier to divert a staggering 401,000 Ethereum coins to their own digital wallets, instead of the intended recipient. ByBit's CEO, Ben Zhou, reassured customers their personal funds remained secure, and the company has since sought to restore the stolen assets through investor loans while setting up a bounty initiative known as the "Lazarus Bounty" to incentivize the public to help trace the stolen funds.

Despite efforts to freeze these assets via cooperation with crypto exchanges, challenges persist. More than $90 million have reportedly been moved on the exchange eXch, where its owner, Johann Roberts, claims they were initially unaware of the nature of these transactions. The discrepancy suggests a broader issue within various crypto platforms that are reluctant—or unable—to counter cybercriminal operations effectively.

Moreover, North Korea's involvement in sophisticated cyberattacks appears to be focused predominantly on the cryptocurrency sector, given its relative vulnerability. Previous attacks linked to the Lazarus Group include the 2019 UpBit hack, the $275 million KuCoin breach, and the 2022 Ronin Bridge theft, leading some financial authorities to label North Korea as a country leveraging cybercrime for economic gain.

As cybersecurity firms work to dismantle these high-profile cybercriminal networks, the challenge remains daunting. With most members of the Lazarus Group seemingly secure within North Korea's borders, the prospects for apprehension remain bleak, further complicating international efforts to restore justice in the realm of cyber misdeeds.

Follow us

© 2024 SwissX REDD UK ltd. All Rights Reserved.