Security Experts:

Connect with us

Hi, what are you looking for?



North Korean Hackers Stole $400 Million Worth of Cryptocurrency in 2021

North Korea-linked hacking group Lazarus stole close to $400 million worth of crypto-assets last year, Chainalysis reports.

North Korea-linked hacking group Lazarus stole close to $400 million worth of crypto-assets last year, Chainalysis reports.

The most well-known APT operating on behalf of the North Korean government and active for more than a decade, Lazarus is believed to have been involved in multiple high-profile attacks, including the $81 million cyber theft from the central bank of Bangladesh in 2016, and the WannaCry attack.

Starting in 2018, Lazarus conducted multiple cryptocurrency heists to generate revenue in support of North Korea’s military programs.

After stealing roughly $500 million in crypto-assets in 2018, the group pilfered only $200-$300 million in 2019 and 2020. In 2021, however, it managed to divert close to $400 million in crypto-coins.

The higher amount, Chainalysis says, is the result of intensified activities: there were seven North Korea-linked hacks in 2021, compared to only four in 2020. Furthermore, the value extracted from these attacks went up by 40%.

Chainalysis also noticed that Lazarus no longer focuses on stealing Bitcoin. In 2021, only 20% of the stolen crypto-assets were Bitcoin, with Ether accounting for 58% and ERC-20 tokens or altcoins for 22%.

Lazarus’ crypto-heist efforts, Kaspersky notes in a new report, also include creating fake cryptocurrency software development companies to distribute legitimate-looking applications and steal funds from the unsuspecting victims.

Lazarus’ SnatchCrypto campaign, which has been ongoing since 2017, has hit small and medium-sized companies worldwide, including organizations in the Czech Republic, China, Hong Kong, India, Poland, Russia, Singapore, Slovenia, Ukraine, the US, the UAE, and Vietnam.

In 2021, Kaspersky’s researchers observed Lazarus studying successful cryptocurrency startups to identify topics of interest and compromise these organizations without raising suspicion. The group abused the brand and employee names of 15 venture businesses to conduct their attacks.

As part of the campaign, the hackers built a complex infrastructure, as well as exploits and malware implants, and distributed a full-featured Windows backdoor that features surveillance functions.

The hacking group intercepted notifications of large transfers and, when the users attempted to move funds to other accounts, they injected their own logic into the transaction process, changing the recipient’s address and draining the account.

The stolen funds were then laundered using a complex mechanism involving mixers and swapping the funds for other cryptocurrencies. Following the hack in August 2021, the North Korean hackers laundered $91 million.

However, Lazarus has yet to launder $170 million in funds stolen in 49 separate hacks.

“This suggests that DPRK-linked hackers aren’t always quick to move stolen cryptocurrencies through the laundering process. It’s unclear why the hackers would still be sitting on these funds, but it could be that they are hoping law enforcement interest in the cases will die down, so they can cash out without being watched,” Chainalysis says.

Related: North Korean Hackers Targeting IT Supply Chain: Kaspersky

Related: U.S. Charges North Korean Hackers Over $1.3 Billion Bank Heists

Related: Here’s How North Korean Hackers Stole Data From Isolated Network Segment

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.