Scan to download
BTC $80,738.64 -0.48%
ETH $2,279.02 -2.03%
BNB $659.60 +1.00%
XRP $1.45 -0.83%
SOL $95.04 +0.02%
TRX $0.3483 -0.96%
DOGE $0.1091 -0.07%
ADA $0.2735 -2.32%
BCH $439.86 -2.20%
LINK $10.30 -2.08%
HYPE $40.84 -0.98%
AAVE $97.29 -2.61%
SUI $1.26 -0.79%
XLM $0.1634 -2.54%
ZEC $552.29 -2.09%
BTC $80,738.64 -0.48%
ETH $2,279.02 -2.03%
BNB $659.60 +1.00%
XRP $1.45 -0.83%
SOL $95.04 +0.02%
TRX $0.3483 -0.96%
DOGE $0.1091 -0.07%
ADA $0.2735 -2.32%
BCH $439.86 -2.20%
LINK $10.30 -2.08%
HYPE $40.84 -0.98%
AAVE $97.29 -2.61%
SUI $1.26 -0.79%
XLM $0.1634 -2.54%
ZEC $552.29 -2.09%

CertiK Report: North Korean hackers caused approximately 60% of digital asset thefts by 2025, with attack patterns shifting to "offline infiltration."

2026-05-12 21:19:57
Collection

Web3 security company CertiK has released the "Skynet North Korea Cyber Threat Report." The data shows that since 2016, North Korean hacker groups have plundered approximately $6.75 billion in digital assets. In 2025 alone, the losses from thefts they orchestrated reached as high as $2.06 billion, accounting for nearly 60% of the total losses in the global cryptocurrency industry for the entire year (including the $1.5 billion Bybit theft case). As of early 2026, this threat trend continues, with losses accounting for about 55%.

The report emphasizes that the attack patterns of North Korean hackers have undergone a fundamental shift, evolving from simple code vulnerability exploitation to a national-level attack system that combines social engineering, deep supply chain attacks, and "physical infiltration." In the recent Drift protocol incident, attackers even spent six months lurking at offline industry conferences, establishing trust through real funds and interpersonal interactions before executing their attack.

CertiK security experts warn that in the face of such systemic attacks, simple technical defenses have become weak. Cryptocurrency institutions urgently need to fully implement a "zero trust" hiring model, strengthen third-party supply chains, establish fund circuit breaker mechanisms, and collaborate with professional security organizations to build a comprehensive lifecycle defense system covering code audits, round-the-clock risk monitoring, and on-chain anti-money laundering/KYT (Know Your Transaction) fund tracking.

app_icon
ChainCatcher Building the Web3 world with innovations.