$400 million worth of crypto stolen to fund North Korean weapons of mass destruction, says report
Stolen cryptocurrency was used to fund North Korean weapons of mass destruction, according to a recent report.
What you need to know
- North Korean hackers stole $400 million worth of cryptocurrency in 2021, according to Chainalysis.
- Phishing lures, code exploits, malware, and other methods were used to extract the digital funds.
- Revenue obtained through these attacks is used to fund North Korea's weapons of mass destruction and ballistic missiles, according to the UN.
Last year was a record year for North Korean theft of cryptocurrency, according to a report by Chainalysis. The outlet claims that cybercriminals connected to the North Korean government stole $400 million worth of digital assets, including Ether, Bitcoin, and other cryptocurrencies. Investment firms were the primary victims of the attacks, which came in the form of phishing lures, code exploits, malware, and other methods.
According to Chainalysis, the Democratic People's Republic of Korea (DPRK) laundered the funds to build weapons of mass destruction (WMDs) and ballistic missiles.
Due to the complexity of the attacks, several security experts have classified the cyber actors from the DPRK as advanced persistent threats (APTs). Chainalysis focuses heavily on APT 38, aka "Lazarus Group." That group is reportedly led by the DPRK's primary intelligence agency, the Reconnaissance General Bureau. The Lazarus Group was involved with the Sony Pictures and WannaCry cyberattacks. Since 2018, the APT has stolen sums typically more than $200 million per year.
Chainalysis notes that many of the attacks it covered were likely perpetrated by the Lazarus Group.
In 2021, the number of hacks connected to North Korea rose from four to seven. The value of those attacks grew 40% compared to 2020.
Ether made up 58% of the value of stolen funds. Bitcoin accounted for less than 25% of the value of stolen funds. The trend toward Ether is likely related to the fact that the cryptocurrency's value rose dramatically last year.
The money laundering process required after stealing cryptocurrency is complicated. It involves swapping altcoins for Ether, mixing Ether, and swapping that mixed Ether for Bitcoin. Mixers played an increased role in money laundering in 2021, according to Chainalysis. Over 65% of DRPK's stolen funds were said to have gone through mixers.
Get the Windows Central Newsletter
All the latest news, reviews, and guides for Windows and Xbox diehards.
Chainalysis goes into more depth regarding the technical process of laundering money. The outlet is bullish in its accusation of the cybercriminals. "These behaviors, put together, paint a portrait of a nation that supports cryptocurrency-enabled crime on a massive scale. Systematic and sophisticated, North Korea's government—be it through the Lazarus Group or its other criminal syndicates—has cemented itself as an advanced persistent threat to the cryptocurrency industry in 2021."
If you're looking for a more legitimate way to obtain cryptocurrency, you can check out the best GPUs for crypto mining.
Sean Endicott is a tech journalist at Windows Central, specializing in Windows, Microsoft software, AI, and PCs. He's covered major launches, from Windows 10 and 11 to the rise of AI tools like ChatGPT. Sean's journey began with the Lumia 740, leading to strong ties with app developers. Outside writing, he coaches American football, utilizing Microsoft services to manage his team. He studied broadcast journalism at Nottingham Trent University and is active on X @SeanEndicott_ and Threads @sean_endicott_.