TechFlow News, April 12: According to a CoinDesk report, as North Korea’s infiltration methods targeting the cryptocurrency industry grow increasingly sophisticated, security experts note that North Korea’s crypto theft operations differ fundamentally from those of other state-sponsored hacking groups—both in motive and methodology—making it one of the most dangerous threats facing the crypto ecosystem.
At the motivational level, Dave Schwed, Chief Operating Officer of SVRN, stated that nearly all of North Korea’s exports are under sanctions and its economy lacks a functional system; “crypto theft provides it with an avenue to instantly acquire liquid assets globally—without requiring cooperation from any counterparty.” The United Nations and multiple intelligence agencies have confirmed that crypto theft constitutes the primary funding source for North Korea’s nuclear weapons and ballistic missile programs. In contrast, Russia and Iran still possess commodities, trade partners, and alternative financing channels; for them, cryptocurrencies serve merely as a payment tool—not as a revenue source itself.
At the methodological level, Alexander Urbelis, Chief Information Security Officer at ENS Labs and Professor of Cybersecurity at King’s College London, pointed out that North Korea’s attacks focus intensely on “individuals who hold private keys or who have access to key-management infrastructure”—including exchanges, wallet service providers, DeFi protocols, and engineers or founders possessing signing authority. Its tactics closely resemble those of intelligence agencies—including months-long identity spoofing, relationship building, and supply-chain infiltration. The six-month-long infiltration attack against the Drift platform serves as a recent illustrative case.
At the structural-vulnerability level, Urbelis noted that once confirmed, cryptocurrency transactions are irreversible—lacking the compliance reviews, fund freezes, or transaction reversals found in traditional financial systems. This makes pre-attack prevention virtually the only effective option. During the Bybit vulnerability incident earlier last year, approximately $1.5 billion in assets were transferred within roughly 30 minutes—a speed and scale nearly impossible in traditional banking systems. “This is currently the most intractable operational security challenge confronting the crypto industry—and I believe the entire industry has yet to find a solution,” Urbelis said.




