Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

740+ Articles
120+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Crypto Infrastructure Company Blames $290 Million Theft on North Korean Hackers
Crypto Infrastructure Company Blames $290 Million Theft on North Korean Hackers
NEWS

Crypto Infrastructure Company Blames $290 Million Theft on North Korean Hackers

A major cryptocurrency infrastructure company has attributed a $290 million theft to North Korean state-sponsored hackers, as the industry continues to grapple with the fallout of a wide-ranging campaign targeting multiple prominent platforms in April 2026.

Dylan H.

News Desk

April 21, 2026
4 min read

A major cryptocurrency infrastructure company has formally attributed a $290 million theft to North Korean state-sponsored hackers, adding to mounting evidence of a coordinated campaign by DPRK-linked groups against the crypto industry in April 2026.

The attribution comes as multiple prominent cryptocurrency platforms grapple with the aftermath of a wide-ranging operation that researchers have linked to North Korea's Lazarus Group and associated threat clusters. The scale and coordination of the campaign underscore the persistent and growing threat that DPRK-linked threat actors pose to the crypto sector.

Attribution and Evidence

Blockchain security researchers and the affected company's own incident response team identified multiple technical and behavioral indicators linking the theft to North Korean operatives:

Attribution FactorDetail
On-chain fund movementStolen assets routed through wallet addresses and mixing patterns consistent with prior DPRK campaigns
Cross-chain bridgingFunds laundered via bridge protocols and privacy tools matching Lazarus Group's post-theft playbook
Operational infrastructureAttacker-controlled wallets overlapped with infrastructure identified in prior DPRK-attributed thefts
Attack methodologyTechnical approach consistent with DPRK's known DeFi exploitation and social engineering techniques
Temporal correlationTheft occurred in the same window as other DPRK-attributed crypto incidents in April 2026

The Broader Campaign

The theft is not an isolated incident. Multiple crypto platforms reported significant security incidents in April 2026, with researchers attributing several to DPRK-linked actors. The pattern suggests a coordinated campaign rather than opportunistic attacks:

  • North Korean hackers have refined their methodology from direct smart contract exploitation to targeting the human and operational security layer — compromising developer machines, key management systems, and insider access
  • The $290M theft follows a $280–285 million heist from Drift in early 2026 that was traced to a six-month in-person social engineering operation by DPRK operatives
  • Blockchain analytics firms estimate DPRK-linked hackers have stolen over $1.5 billion in cryptocurrency in 2024 alone

North Korea's Crypto Funding Machine

The U.S. government has repeatedly identified cryptocurrency theft as a primary mechanism for North Korea to fund its weapons programs and evade international sanctions. The systematic nature of DPRK crypto operations reflects a state-directed enterprise rather than typical financially motivated cybercrime:

Strategic Goal: Fund DPRK regime programs (ballistic missiles, nuclear development)
Execution Model: Lazarus Group + affiliated clusters operating as state-directed units
Annual Capacity: Estimated $1–2 billion+ per year in crypto theft
Target Selection: DeFi protocols, crypto exchanges, infrastructure providers with high TVL

The UN Panel of Experts and multiple Western intelligence agencies have documented DPRK's crypto theft apparatus, which employs thousands of IT workers and dedicated hacking units.

Industry Response

Following the disclosure, the affected company has:

  • Suspended relevant operations while the investigation continues
  • Engaged blockchain security firms to trace stolen funds
  • Coordinated with centralized exchanges and law enforcement to freeze associated addresses

The FBI, CISA, and Treasury's OFAC have all issued guidance on protecting crypto assets from DPRK-linked threat actors. Organizations in the crypto sector managing significant on-chain liquidity should treat DPRK threat actor profiles as mandatory risk management reading.

Key Takeaways

  1. North Korean state-sponsored hackers continue to target the crypto industry at scale — the $290M theft is consistent with DPRK's documented operational pattern
  2. The April 2026 campaign targeted multiple prominent platforms, suggesting coordinated operations across multiple DPRK-linked teams
  3. Modern DPRK crypto attacks increasingly target off-chain components (developer machines, key holders, HR processes) rather than on-chain bugs alone
  4. Organizations should assume sophisticated, patient adversaries — the Drift hack involved six months of in-person social engineering before execution
  5. Response time is critical: rapid coordination with exchanges can freeze stolen funds before laundering is complete

Source: The Record — Crypto infrastructure company blames $290 million theft on North Korean hackers

#Cryptocurrency#North Korea#Lazarus Group#DeFi#Cyber Espionage#Blockchain Security

Related Articles

KelpDAO Suffers $290 Million Heist Tied to Lazarus Hackers

North Korean state-sponsored hackers from the Lazarus Group are behind a $290 million cryptocurrency theft from DeFi platform KelpDAO, marking one of the largest crypto heists of 2026.

5 min read

'It Reads Like a Spy Novel': $280M Drift Theft Linked to North Korean Fake Companies

A post-mortem of the $280 million Drift Protocol crypto theft reveals a sophisticated six-month North Korean social engineering operation involving fake...

4 min read

Drift $280M Crypto Theft Linked to 6-Month In-Person DPRK Infiltration

Drift Protocol has revealed that the $280 million hack it suffered was the culmination of a six-month long operation in which North Korean-linked threat...

5 min read
Back to all News