Blockchain analytics firm Arkham Intelligence published a report on May 12, 2026, examining the on-chain footprint, laundering infrastructure, and operational tacticsBlockchain analytics firm Arkham Intelligence published a report on May 12, 2026, examining the on-chain footprint, laundering infrastructure, and operational tactics

Arkham Report Examines Lazarus Group’s Crypto Laundering Network and Evolving Attack Methods

2026/05/13 05:40
4분 읽기
이 콘텐츠에 대한 의견이나 우려 사항이 있으시면 [email protected]으로 연락주시기 바랍니다

Blockchain analytics firm on May 12, 2026, examining the on-chain footprint, laundering infrastructure, and operational tactics tied to , the North Korean state-linked hacking syndicate behind some of the largest crypto exploits in the industry.

The research tracked Lazarus-linked activity from 2017 through 2026, including exchange breaches, ransomware campaigns, bridge exploits, and decentralized finance attacks that Arkham said totaled more than $6 billion in stolen cryptocurrency.

Lazarus Group is widely believed to operate under North Korea’s Reconnaissance General Bureau and has been repeatedly tied by U.S. authorities and blockchain investigators to major cyberattacks targeting the crypto industry.

Arkham described Lazarus as “the single most financially successful cybercriminal organization in crypto history” and said North Korean-linked actors accounted for more than 70% of crypto exploit losses recorded so far in 2026.

The report also detailed how Lazarus operations evolved from malware and phishing campaigns into long-term infiltration efforts involving social engineering, fake partnerships, and cross-chain laundering infrastructure.

Arkham Traces Lazarus Laundering Flows Across Crypto Infrastructure

The report outlined how Lazarus moves stolen assets through a network of decentralized protocols, centralized exchanges, and over-the-counter brokers to obscure transaction trails before cashing out funds.

According to the research, Lazarus usually moves funds off the originally exploited chain shortly after an attack, frequently using THORChain and other cross-chain bridges to convert assets into bitcoin.

Bitcoin’s role in the laundering process is due to its UTXO model, which makes transaction tracing more difficult than on account-based EVM blockchains. It’s similar to the process of breaking large bills into thousands of smaller bills, dispersing them across countless wallets, and later recombining them during cash-out operations.

Lazarus-linked actors have also used mixers, including Sinbad.io and YoMix, to further obscure transaction trails before funds reach exchanges, brokers, or over-the-counter networks.

The report additionally mentions that Russian exchanges and Chinese OTC brokers are used as destinations in Lazarus cash-out activity.

Lazarus continues relying on cross-chain infrastructure, mixers, and fragmented wallet activity to complicate blockchain tracing efforts during the laundering process.

Drift Protocol Attack Involved Months-Long Social Engineering Operation

One section of the report focused on the April 1, 2026 exploit against Drift Protocol, which Arkham described as one of the first publicly documented Lazarus operations involving in-person interactions as an attack vector.

According to the report, North Korean proxies interacted with Drift employees throughout March 2026, including meeting employees at conferences and depositing more than $1 million to appear as legitimate counterparties and protocol partners.

After gaining the trust of the protocol team, Lazarus convinced Drift Security Council members to pre-authorize Solana transactions.

The attackers later used those pre-authorized transactions after Drift migrated its Security Council to a new 2/5 configuration without a timelock, allowing Lazarus-linked actors to drain approximately $285 million from the protocol.

The report described the operation as a significant escalation in social engineering tactics targeting crypto organizations.

KelpDAO Exploit Used Compromised RPC Nodes and Forged Messages

The research also examined the , which Arkham linked to Lazarus.

According to the report, the attackers compromised two LayerZero RPC nodes and combined false data feeds with a distributed denial-of-service attack to forge a malicious cross-chain message.

The forged message allowed Lazarus-linked actors to withdraw 116,500 rsETH valued at approximately $292 million.

Arkham said portions of the stolen funds were later moved through Umbra Cash, THORChain, and decentralized finance lending protocols as part of the laundering process.

The report added that the attack demonstrated Lazarus’ growing focus on cross-chain infrastructure and validator-related attack surfaces.

Lazarus Remains at the Center of Crypto Security Concerns

Lazarus Group is one of the most closely monitored organizations in due to the scale of its attacks and its links to the North Korean state.

Law enforcement agencies, cybersecurity researchers, and blockchain analytics firms have repeatedly connected the group to attacks involving exchanges, bridges, wallet providers, and DeFi protocols.

Arkham concluded that Lazarus continues adapting its operational methods as blockchain tracing capabilities and compliance monitoring systems become more advanced, with social engineering and cross-chain infrastructure becoming increasingly important parts of the group’s strategy.

면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, [email protected]으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.

No Chart Skills? Still Profit

No Chart Skills? Still ProfitNo Chart Skills? Still Profit

Copy top traders in 3s with auto trading!