Overview of SWIFT CSCF v2025
As part of its Customer Security Programme (CSP), SWIFT has updated its security requirements for clients and released the Customer...
Read MoreNorth Korea has emerged in recent years as one of the biggest cyber warfare state actors. The isolated nation has been especially prolific in the realm of cryptocurrency theft. The Kim regime has allegedly been using these crypto-thefts to fund its controversial nuclear weapons programme, according to the US government. North Korean hackers made a significant entry onto the cybercrime scene with their infamous 2014 hack of Sony Pictures, demonstrating their cyber capabilities.
Over the course of 2024, state-sponsored North Korean hackers were responsible for the theft of over $659 million in cryptocurrency, according to a joint statement by the US, Japan, and South Korea. This figure includes North Korean hackers’ theft of $235 million from Indian crypto exchange WazirX, $308 million stolen from Japan’s DMM Bitcoin, and $50 million stolen from each of Upbit and Radiant Capital. A recent UN report estimated that North Korean hackers stole $3 billion in cryptocurrency between 2017 and 2023, and a report from Chainalysis claimed that North Korean hackers were responsible for 61% of all cryptocurrency stolen in 2024, totalling an amount of $1.3 billion. In December 2024, a federal court in St. Louis, USA indicted 14 North Koreans on charges of allegedly being part of a long-running conspiracy aimed at extorting funds from US companies to funnel into the North Korean nuclear weapons programme. [1]
These hacks have allegedly been primarily performed by the North Korean Lazarus Group, an allegedly state-sponsored hacking group. The hacking group used social engineering methods alongside malware and notably infiltrated organisations by posing as job candidates. The Lazarus Group has also been accused of creating copies of legitimate open-source software packages that they planted backdoors into in order to steal credentials, including cryptocurrency-related applications, authentication packages, and Web3 technologies. North Korea specifically targets cryptocurrency due to the decentralised and anonymous nature of the currency, allowing for easier money laundering. This allows the regime to bypass international sanctions and gain foreign currency without the oversight of banks and regulators.
With the isolationist regime likely to remain sanctioned, its reliance on cybercrime will only continue to grow. Its state-sponsored hackers’ techniques will become increasingly refined, potentially exploiting emerging technologies such as AI. The ongoing efforts to combat state-sponsored hackers require constant vigilance, innovation, and international co-operation. These incidents have brought into focus the threat posed by North Korean hacking groups and the vulnerabilities they exploit in the digital financial sector, highlighting the need to enhance cybersecurity measures and stay ahead of emerging threats.
At AJC, we offer tailored cyber security services to help strengthen organisations’ cyber defences. Our bespoke training focuses on protecting against social engineering tactics used by sophisticated hacking groups. We also collaborate with our clients to enhance their cyber security measures, ensuring their organisations are well-prepared to address emerging cyber threats.
To learn more about AJC’s Cyber Security services and how we can help your organisation, visit our website or contact us today at 020 7101 4861 or info@ajollyconsulting.co.uk.
Image accreditation: André François McKenzie (2018) on Unsplash.com. Last accessed on 13th February 2025. Available at: https://unsplash.com/photos/gold-colored-bitcoin-iGYiBhdNTpE
As part of its Customer Security Programme (CSP), SWIFT has updated its security requirements for clients and released the Customer...
Read More Financial fraud is on the rise, with cybercriminals using increasingly sophisticated tactics to exploit businesses and consumers alike. As...
Read MoreHave you ever wondered what would happen if ‘insert cloud here’ failed or didn’t work ? Would your pictures, files,...
Read More