HomeCrypto Q&AWho is the Lazarus Group, and how did they steal over $1.5 billion in crypto?

Who is the Lazarus Group, and how did they steal over $1.5 billion in crypto?

2025-04-15
Beginners Must Know
"Unveiling the Lazarus Group: Masterminds Behind $1.5 Billion Crypto Heists."
The Lazarus Group: North Korea’s Cybercrime Syndicate and the $1.5 Billion Crypto Heist

The Lazarus Group is a notorious cybercrime organization linked to North Korea’s Reconnaissance General Bureau (RGB), the country’s primary intelligence agency. Known for its sophisticated and high-profile attacks, the group has targeted financial institutions and cryptocurrency exchanges worldwide. In February 2025, the Lazarus Group made headlines by stealing $1.5 billion from the crypto exchange Bybit, marking the largest cryptocurrency hack in history. This incident revealed not only the group’s technical prowess but also its evolving strategies to evade detection.

Who is the Lazarus Group?

The Lazarus Group operates as a cyber warfare unit under North Korea’s RGB. Its activities are believed to fund the regime’s military and nuclear programs, circumventing international sanctions. The group has been implicated in numerous cyberattacks, including the 2014 Sony Pictures hack, the WannaCry ransomware attack in 2017, and multiple cryptocurrency thefts. Over the years, the Lazarus Group has refined its tactics, shifting from direct attacks on exchanges to exploiting vulnerabilities in supporting infrastructure.

The $1.5 Billion Bybit Hack: How It Happened

Initially, the Bybit hack was thought to be a phishing scam, but investigations uncovered a far more sophisticated operation. Instead of targeting Bybit directly, the Lazarus Group compromised Safe{Wallet}, a widely used digital wallet system integrated with the exchange. By inserting a backdoor into the wallet’s software, the hackers gained access to users’ funds without triggering immediate alarms.

Key Tactics Used in the Attack

1. Infrastructure Exploitation: The Lazarus Group focused on the underlying systems supporting crypto exchanges rather than the exchanges themselves. This indirect approach made detection more difficult, as security teams often prioritize protecting exchange platforms over third-party services.

2. Stealth and Delayed Theft: The hackers siphoned funds gradually, avoiding large, suspicious transactions. By spreading the theft over time, they minimized the risk of triggering automated security alerts.

3. Money Laundering Techniques: After stealing the cryptocurrency, the group employed advanced laundering methods. They split the $1.5 billion into smaller amounts, funneled them through hundreds of digital wallets, and eventually converted the funds into Bitcoin (BTC). According to Chainalysis, the Lazarus Group often holds stolen assets for months or even years before cashing out, further complicating tracking efforts.

North Korea’s Broader Cybercrime Campaign

The Bybit heist is part of a larger pattern of North Korean cyberattacks on the cryptocurrency industry. The United Nations estimates that from 2017 to 2023, North Korea stole approximately $3 billion through crypto hacks. In 2024 and 2025 alone, the regime plundered $1.7 billion from two major exchanges, WazirX and Bybit.

The Lazarus Group is not the only North Korean hacking faction. Other groups, such as AppleJeus, Dangerous Password, and Spinout, employ varied tactics like phishing, fake job offers, and malware disguised as legitimate software. These groups often collaborate, sharing tools and techniques to maximize their effectiveness.

Global Response and Challenges

Law enforcement agencies have intensified efforts to combat North Korean cybercrime. The FBI has identified and indicted several alleged Lazarus Group members, including two individuals charged in 2021 for global cybercrimes. However, the group’s ability to adapt and its ties to a nation-state make it a persistent threat.

The Bybit hack underscores the need for stronger security measures in the crypto industry, including:

- Enhanced wallet security protocols.
- Improved monitoring of third-party services linked to exchanges.
- Tighter anti-money laundering (AML) regulations to track and disrupt fund laundering.

Conclusion

The Lazarus Group remains one of the most dangerous cybercrime entities in the world. Its $1.5 billion theft from Bybit demonstrates a shift toward more covert and sophisticated methods, targeting the infrastructure that supports crypto exchanges rather than the exchanges themselves. As North Korea continues to refine its hacking strategies, the global financial and cybersecurity communities must adapt to counter this evolving threat. Understanding the Lazarus Group’s operations is critical to developing effective defenses and safeguarding the future of digital assets.
Related Articles
How to Invest in Crypto as a Complete Beginner in 2025
2025-09-03 04:01:09
How are RWAs different from traditional financial assets?
2025-05-22 10:16:47
How does DeFi differ from traditional finance systems?
2025-05-22 10:16:47
Can you elaborate on how equitable distribution is achieved in the new tokenomic model?
2025-05-22 10:16:46
What implications does this collaboration have for blockchain gaming acceptance?
2025-05-22 10:16:46
How does U.S. Steel Corporation's performance compare to its competitors in light of the new price target?
2025-05-22 10:16:46
How important does Buterin consider institutional adoption of cryptocurrencies?
2025-05-22 10:16:45
What types of insights or findings should be highlighted during the analysis of news articles?
2025-05-22 10:16:44
What role do stablecoins play in facilitating transactions within the cryptocurrency ecosystem?
2025-05-22 10:16:44
What is Mashinsky's perspective on the role of self-regulation within the crypto industry?
2025-05-22 10:16:44
Latest Articles
Smart Contract Development and Auditing: Building Trust in the Heart of DeFi
2025-11-07 04:20:42
Decentralized Identity (DID): Revolutionizing the Notions of Trust and Privacy within Web3
2025-11-07 04:12:16
Rise of DAOs: How Decentralized Autonomous Organizations are Changing the Governance of Communities
2025-11-07 04:05:09
Rise of Web3 Social Ownership: Reclaiming Control in the Internet Era
2025-11-06 04:06:23
DePIN: The Bridge from Blockchain to the Real World
2025-11-06 03:58:44
How to Make Web3 Wallets Smarter with Account Abstraction
2025-11-05 03:39:55
A Simple Guide to Tokenising Real-World Assets on Blockchain
2025-11-05 03:21:05
AI + Blockchain 2025: Intelligence and Trust are Entwining to Secure the Future of Crypto
2025-11-05 03:11:28
A Trader’s Guide to Surviving a Crypto Crash
2025-11-04 07:11:51
Tokenized Real Estate and RWAs in 2025: When Property Goes On-Chain
2025-11-04 07:02:07
Promotion
Limited-Time Offer for New Users
Exclusive New User Benefit, Up to 6000USDT

Hot Topics

Technical Analysis
hot
Technical Analysis
1606 Articles
DeFi
hot
DeFi
90 Articles
Memecoin
hot
Memecoin
0 Articles
Fear and Greed Index
Reminder: Data is for Reference Only
16
Extreme fear

Live Chat

Customer Support Team

Just Now

Dear LBank User

Our online customer service system is currently experiencing connection issues. We are working actively to resolve the problem, but at this time we cannot provide an exact recovery timeline. We sincerely apologize for any inconvenience this may cause.

If you need assistance, please contact us via email and we will reply as soon as possible.

Thank you for your understanding and patience.

LBank Customer Support Team