Shocking News! The U.S. Slams Heavy Sanctions on North Korean Hackers, Is a Major Earthquake in the Crypto World Coming?
Today, the U.S. Treasury Department suddenly dealt a heavy blow—listing core member Song Kum Hyok of the North Korean hacker organization as a "Specially Designated National" on the sanctions list, directly accusing him of assisting North Korean IT personnel in infiltrating global technology and cryptocurrency companies through identity forgery, stealing funds, and funneling them back to North Korea! Even more shocking, this action is directly linked to the Lazarus Group—this group identified by the United Nations as the "biggest tumor in the crypto world," which has orchestrated several major heists, including the $1.46 billion theft from Bybit!
According to details disclosed by the U.S. Department of Justice, North Korea has built a massive "remote IT worker" network:
Identity forgery infiltrating companies: Hackers pose as developers in global tech firms using fake resumes and forged U.S.-Mexico companies, stealing sensitive data and cryptocurrency wallet information. Precision strikes on exchanges: In February 2025, the Lazarus Group stole $1.46 billion in ETH from Bybit through social engineering attacks and multi-signature vulnerabilities, setting a record for the largest single theft in crypto history! Money laundering methods upgraded: After stealing funds, hackers use mixers, cross-chain bridges, and DEXs to quickly split the funds, even converting some of the stolen money into stablecoins to evade tracking.
Even more terrifying, Chainalysis data shows: In 2024, North Korean hackers stole $1.34 billion through 47 attacks, accounting for 61% of the total amount stolen for the year! These funds are directly flowing into North Korea's nuclear weapons program, and the crypto world has become their "ATM."
Mixers face a shutdown: The precedent set by Tornado Cash may repeat itself, and issuers of stablecoins like USDC and USDT may be required to freeze addresses related to North Korea.
Cross-chain bridges become loopholes: Hackers use cross-chain protocols like ThorChain for money laundering, and regulators may enforce real-name systems for cross-chain transactions.
Tap the profile picture, follow me, and don't miss any firsthand news updates! Let's feast together in the bull market!