Over $3.4 billion in crypto stolen throughout 2025, with North Korea again the top culprit
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读这篇文章,了解主要内容。 文章主要讲的是2025年加密货币行业遭受了超过34亿美元的损失,其中大部分是由朝鲜黑客造成的。Chainalysis的报告指出,朝鲜黑客通过更复杂的洗钱手段和针对大型中心化平台的攻击,导致了更高的损失金额。特别是提到了Bybit和Upbit平台的盗窃事件。 接下来,我需要提取关键信息:总损失金额、主要责任方、攻击手段、具体案例以及洗钱方式。这些是用户可能关心的重点。 然后,我要把这些信息浓缩成100字以内的中文摘要,确保语言简洁明了,不使用任何开头模板。可能的结构是先总述损失情况,再指出责任方和攻击手段,最后提到具体案例和洗钱方式。 最后检查字数是否符合要求,并确保信息准确无误。 </think> 2025年加密货币行业损失超34亿美元,其中20.2亿美元由朝鲜黑客通过洗钱和攻击中心化平台窃取。主要案例包括Bybit被盗15亿美元及Upbit失窃3000万美元。 2025-12-18 18:16:20 Author: therecord.media(查看原文) 阅读量:2 收藏

More than $3.4 billion was stolen from the cryptocurrency industry in 2025, according to a new report, with the majority of those losses tied to North Korean hackers. 

Blockchain security company Chainalysis published its annual report covering the year’s crypto theft, finding a general shift toward larger, costlier attacks and new tactics used by North Korean hackers to launder stolen funds.

While Chainalysis noted an increase in the number of private owners having their cryptocurrency stolen, one of the main takeaways from this year’s report is North Korea’s ability to focus its efforts on a smaller number of attacks with higher payouts. 

Andrew Fierman, head of national security intelligence at Chainalysis, told Recorded Future News they saw North Korean-linked operators “maintained a consistent laundering cycle using mixers, DeFi protocols, bridges, and no-KYC exchanges in addition to underground informal Chinese money laundering networks.”

Of the $3.4 billion in crypto stolen from January to December, Chainalysis attributed at least $2.02 billion to North Korean hackers. The figure is $681 million more than what the country’s hackers are estimated to have stolen in 2024.

Much of the figure is attributed to the $1.5 billion theft from Dubai-based platform Bybit in February, but two weeks ago South Korean officials also accused North Korea of stealing $30 million worth of cryptocurrency from crypto platform Upbit. 

Fierman declined to say what other incidents Chainalysis is tying to North Korea but said the country focused on large, centralized targets with significant reserves in 2025. 

The hackers typically were able to steal private keys — pivotal cryptographic secrets that grant a person full control over digital assets. 

Fierman tied the incidents to North Korea’s parallel IT worker campaign, where members of the country’s military surreptitiously get hired at Western tech companies. 

The IT worker campaign has been adept at getting North Koreans hired at crypto exchanges, custodians, and web3 firms, allowing them to steal information later used for attacks or place backdoors that enable lateral movement within the crypto industry.

“This year was defined by a small number of large private key compromises of centralized services, which materially shaped the totals. Social engineering continues to be the primary attack vector – whether by posing as IT workers or as recruiters to earn trust and gain access to victims’ systems,” Fierman explained. 

“However, North Korea continues to be creative in its approach to exploiting security vulnerabilities, as noted by the supply chain exploit via a third-party vendor in the ByBit hack.”

North Korea has used the IT worker campaign and the crypto thefts as a key revenue source to make up for being cut off from the global financial system. 

Chainalysis said this was the most severe year on record for North Korean crypto thefts because the country is responsible for 76% of all crypto service compromises based on value stolen. 

Since Chainalysis began tracking the figures in 2022, North Korea has stolen $6.75 billion in crypto. The United Nations said last year that it is tracking dozens of incidents over a five-year period that have netted North Korea about $3 billion.

North Korea also stood out in 2025 because they laundered the stolen funds in ways different from most cybercriminals. Pyongyang hackers typically launder funds in $500,000 chunks rather than the typical $1 million to $10 million range.

They also prefer to use Chinese language platforms that have weak compliance controls like Cambodian site Huione — which was sanctioned by U.S. officials this year. Chainalysis said last year that Huione has processed more than $49 billion in cryptocurrency transactions since 2021.

“Their heavy use of professional Chinese-language money laundering services and over-the-counter (OTC) traders suggests that DPRK threat actors are tightly integrated with illicit actors across the Asia-Pacific region, and is consistent with Pyongyang’s historical use of China-based networks to gain access to the international financial system,” Chainalysis experts said.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.


文章来源: https://therecord.media/over-3-billion-crypto-stolen-2025-north-korea
如有侵权请联系:admin#unsafe.sh