North Korean Cybercriminals Involved in Crypto Scams

North Korean cybercriminals have stolen $66 million in cryptocurrency through sophisticated social engineering tactics, targeting firms in Hong Kong and Bahrain.

North Korean cybercriminals have recently been implicated in two major cryptocurrency heists, totaling approximately $66 million. Utilizing sophisticated social engineering tactics, these cybercriminals targeted a Hong Kong firm and a Bahrain exchange, showcasing their advanced capabilities in cybercrime.

Key Takeaways

  • North Korean cybercriminals stole $66 million in cryptocurrency through social engineering.
  • The attacks were attributed to a group known as Citrine Sleet, also referred to as UNC4736 and AppleJeus.
  • The decentralized finance platform Radiant Capital was one of the primary targets, losing $50 million.
  • U.S. cybersecurity firm Mandiant confirmed the involvement of North Korean actors with high confidence.

Overview Of The Attacks

The attacks were characterized by their sophistication, with the cybercriminals employing fake recruiter scams to lure victims. This method involved creating convincing job offers to gain the trust of potential targets, ultimately leading to the theft of significant amounts of cryptocurrency.

Details Of The Heists

  1. Targeted Entities:
  2. Methodology:

Implications For The Crypto Industry

The involvement of state-sponsored cybercriminals in cryptocurrency theft raises significant concerns for the security of digital assets. As these attacks become more prevalent, the need for enhanced security measures and awareness among cryptocurrency users is paramount.

Conclusion

The recent activities of North Korean cybercriminals highlight the evolving landscape of cyber threats, particularly in the realm of cryptocurrency. As these actors continue to refine their tactics, both individuals and organizations must remain vigilant and proactive in safeguarding their digital assets against such sophisticated attacks.

Sources

[ newsletter ]
Stay ahead of Web3 threats—subscribe to our newsletter for the latest in blockchain security insights and updates.

Thank you! Your submission has been received!

Oops! Something went wrong. Please try again.

[ More Posts ]

Unlocking Enhanced Security: A Deep Dive into Multi Signature Wallets
10.9.2025
[ Featured ]

Unlocking Enhanced Security: A Deep Dive into Multi Signature Wallets

Explore multi signature wallets: understand their security benefits, configurations, and who benefits most. Learn about their operational mechanics and advancements.
Read article
Discover the Best Crypto Wallet-Finder Bot for Your Needs
10.9.2025
[ Featured ]

Discover the Best Crypto Wallet-Finder Bot for Your Needs

Discover the best crypto wallet-finder bot to monitor transactions, track balances, and stay updated on your crypto investments. Explore top tools.
Read article
Mastering DEX Screener: A Comprehensive Guide on How to Use DEXscreener Effectively
10.9.2025
[ Featured ]

Mastering DEX Screener: A Comprehensive Guide on How to Use DEXscreener Effectively

Master DEX Screener with our guide. Learn how to use DEXscreener for technical analysis, finding trending tokens, and making informed meme coin trades.
Read article