BitcoinWorld North Korean Hackers’ Alarming $19.5M Crypto Theft Shakes Lykke Exchange The cryptocurrency world often buzzes with innovation, but it also faces persistent threats. A recent development has sent ripples through the industry: North Korean hackers are now officially linked to a substantial $19.5 million crypto theft from the UK-based Lykke exchange. This incident underscores the ongoing challenges in securing digital assets against sophisticated cybercriminals. What Happened with the Lykke Exchange Theft? In a significant cybersecurity breach, the notorious North Korean group, Lazarus, has been identified as the perpetrator behind a $19.5 million crypto theft targeting the UK exchange Lykke. The attack occurred in June 2024, leading to the loss of a considerable sum in both Bitcoin (BTC) and Ethereum (ETH). The UK’s Office of Financial Sanctions Implementation (OFSI) confirmed this link, highlighting the persistent threat posed by these state-sponsored actors. Targeted Attack: Lykke exchange fell victim to a highly coordinated cyberattack. Significant Loss: Approximately $19.5 million in BTC and ETH was stolen. Official Confirmation: The UK’s OFSI officially attributed the attack to the Lazarus Group. This incident unfortunately had severe consequences for Lykke. The exchange faced liquidation in March, a direct aftermath of the devastating cyberattack, as reported by The Daily Hodl. It serves as a stark reminder of how a single security breach can unravel an entire operation. How Do North Korean Hackers Launder Stolen Crypto? Following the theft, the stolen Bitcoin and Ethereum embarked on a complex journey through various laundering channels. Understanding these methods is crucial for authorities trying to track and recover funds. The Lazarus Group, like other sophisticated cybercriminals, employs a multi-layered approach to obscure the origins of their illicit gains. Key laundering methods identified in this case include: Thorchain: A decentralized cross-chain liquidity protocol that allows swapping assets without a central intermediary, making transactions harder to trace. No-KYC Exchanges: Platforms that do not require users to undergo ‘Know Your Customer’ verification, providing anonymity to the criminals. OTC Desks: Over-the-counter desks in regions like China, Cambodia, and Russia facilitate large, private transactions, often bypassing traditional regulatory scrutiny. These methods allow North Korean hackers to convert stolen digital assets into fiat currency or other untraceable assets, funding their illicit activities, including weapons programs. Protecting Your Assets from Cyber Threats The Lykke incident involving North Korean hackers serves as a critical warning for both cryptocurrency exchanges and individual users. While exchanges must invest heavily in robust security infrastructure, users also play a vital role in safeguarding their digital wealth. Implementing strong security practices is no longer optional; it is essential. For exchanges, this means: Multi-layered Security: Implementing advanced encryption, multi-factor authentication, and cold storage solutions. Regular Audits: Conducting frequent security audits and penetration testing to identify vulnerabilities. Incident Response Plans: Having clear, actionable plans for responding to and mitigating cyberattacks. For individual crypto holders, consider these actionable insights: Use Hardware Wallets: Store significant amounts of crypto offline in hardware wallets. Enable 2FA: Always use two-factor authentication on all exchange accounts. Be Skeptical: Be wary of phishing attempts and suspicious links. Strong Passwords: Use unique, complex passwords for each platform. The persistent threat from groups like the Lazarus Group highlights the need for continuous vigilance and adaptation in the face of evolving cybercrime tactics. The crypto community must unite to enhance security protocols and share intelligence to counter these sophisticated threats effectively. This collective effort is crucial for the long-term integrity and trust in the digital asset space. FAQs Q1: Who are the Lazarus Group?A1: The Lazarus Group is a state-sponsored cybercrime organization believed to be operated by North Korea. They are notorious for high-profile cyberattacks, particularly targeting financial institutions and cryptocurrency exchanges globally. Q2: How much was stolen from Lykke exchange?A2: Approximately $19.5 million in cryptocurrency, specifically Bitcoin (BTC) and Ethereum (ETH), was stolen from the Lykke exchange. Q3: What happened to Lykke exchange after the attack?A3: Lykke exchange was unfortunately liquidated in March, following the devastating impact of the June 2024 cyberattack attributed to North Korean hackers. Q4: How do hackers like Lazarus Group launder stolen crypto?A4: They use various methods including decentralized exchanges like Thorchain, no-KYC (Know Your Customer) exchanges to maintain anonymity, and over-the-counter (OTC) desks in countries like China, Cambodia, and Russia to convert crypto into fiat currency. Q5: What can users do to protect their crypto from such attacks?A5: Users should use hardware wallets for cold storage, enable two-factor authentication (2FA), use strong, unique passwords, and be highly vigilant against phishing attempts and suspicious links. If you found this article insightful, please consider sharing it with your network on social media. Spreading awareness about these threats helps protect our community. To learn more about the latest crypto market trends, explore our article on key developments shaping Bitcoin price action. This post North Korean Hackers’ Alarming $19.5M Crypto Theft Shakes Lykke Exchange first appeared on BitcoinWorld and is written by Editorial TeamBitcoinWorld North Korean Hackers’ Alarming $19.5M Crypto Theft Shakes Lykke Exchange The cryptocurrency world often buzzes with innovation, but it also faces persistent threats. A recent development has sent ripples through the industry: North Korean hackers are now officially linked to a substantial $19.5 million crypto theft from the UK-based Lykke exchange. This incident underscores the ongoing challenges in securing digital assets against sophisticated cybercriminals. What Happened with the Lykke Exchange Theft? In a significant cybersecurity breach, the notorious North Korean group, Lazarus, has been identified as the perpetrator behind a $19.5 million crypto theft targeting the UK exchange Lykke. The attack occurred in June 2024, leading to the loss of a considerable sum in both Bitcoin (BTC) and Ethereum (ETH). The UK’s Office of Financial Sanctions Implementation (OFSI) confirmed this link, highlighting the persistent threat posed by these state-sponsored actors. Targeted Attack: Lykke exchange fell victim to a highly coordinated cyberattack. Significant Loss: Approximately $19.5 million in BTC and ETH was stolen. Official Confirmation: The UK’s OFSI officially attributed the attack to the Lazarus Group. This incident unfortunately had severe consequences for Lykke. The exchange faced liquidation in March, a direct aftermath of the devastating cyberattack, as reported by The Daily Hodl. It serves as a stark reminder of how a single security breach can unravel an entire operation. How Do North Korean Hackers Launder Stolen Crypto? Following the theft, the stolen Bitcoin and Ethereum embarked on a complex journey through various laundering channels. Understanding these methods is crucial for authorities trying to track and recover funds. The Lazarus Group, like other sophisticated cybercriminals, employs a multi-layered approach to obscure the origins of their illicit gains. Key laundering methods identified in this case include: Thorchain: A decentralized cross-chain liquidity protocol that allows swapping assets without a central intermediary, making transactions harder to trace. No-KYC Exchanges: Platforms that do not require users to undergo ‘Know Your Customer’ verification, providing anonymity to the criminals. OTC Desks: Over-the-counter desks in regions like China, Cambodia, and Russia facilitate large, private transactions, often bypassing traditional regulatory scrutiny. These methods allow North Korean hackers to convert stolen digital assets into fiat currency or other untraceable assets, funding their illicit activities, including weapons programs. Protecting Your Assets from Cyber Threats The Lykke incident involving North Korean hackers serves as a critical warning for both cryptocurrency exchanges and individual users. While exchanges must invest heavily in robust security infrastructure, users also play a vital role in safeguarding their digital wealth. Implementing strong security practices is no longer optional; it is essential. For exchanges, this means: Multi-layered Security: Implementing advanced encryption, multi-factor authentication, and cold storage solutions. Regular Audits: Conducting frequent security audits and penetration testing to identify vulnerabilities. Incident Response Plans: Having clear, actionable plans for responding to and mitigating cyberattacks. For individual crypto holders, consider these actionable insights: Use Hardware Wallets: Store significant amounts of crypto offline in hardware wallets. Enable 2FA: Always use two-factor authentication on all exchange accounts. Be Skeptical: Be wary of phishing attempts and suspicious links. Strong Passwords: Use unique, complex passwords for each platform. The persistent threat from groups like the Lazarus Group highlights the need for continuous vigilance and adaptation in the face of evolving cybercrime tactics. The crypto community must unite to enhance security protocols and share intelligence to counter these sophisticated threats effectively. This collective effort is crucial for the long-term integrity and trust in the digital asset space. FAQs Q1: Who are the Lazarus Group?A1: The Lazarus Group is a state-sponsored cybercrime organization believed to be operated by North Korea. They are notorious for high-profile cyberattacks, particularly targeting financial institutions and cryptocurrency exchanges globally. Q2: How much was stolen from Lykke exchange?A2: Approximately $19.5 million in cryptocurrency, specifically Bitcoin (BTC) and Ethereum (ETH), was stolen from the Lykke exchange. Q3: What happened to Lykke exchange after the attack?A3: Lykke exchange was unfortunately liquidated in March, following the devastating impact of the June 2024 cyberattack attributed to North Korean hackers. Q4: How do hackers like Lazarus Group launder stolen crypto?A4: They use various methods including decentralized exchanges like Thorchain, no-KYC (Know Your Customer) exchanges to maintain anonymity, and over-the-counter (OTC) desks in countries like China, Cambodia, and Russia to convert crypto into fiat currency. Q5: What can users do to protect their crypto from such attacks?A5: Users should use hardware wallets for cold storage, enable two-factor authentication (2FA), use strong, unique passwords, and be highly vigilant against phishing attempts and suspicious links. If you found this article insightful, please consider sharing it with your network on social media. Spreading awareness about these threats helps protect our community. To learn more about the latest crypto market trends, explore our article on key developments shaping Bitcoin price action. This post North Korean Hackers’ Alarming $19.5M Crypto Theft Shakes Lykke Exchange first appeared on BitcoinWorld and is written by Editorial Team

North Korean Hackers’ Alarming $19.5M Crypto Theft Shakes Lykke Exchange

2025/08/20 03:15

BitcoinWorld

North Korean Hackers’ Alarming $19.5M Crypto Theft Shakes Lykke Exchange

The cryptocurrency world often buzzes with innovation, but it also faces persistent threats. A recent development has sent ripples through the industry: North Korean hackers are now officially linked to a substantial $19.5 million crypto theft from the UK-based Lykke exchange. This incident underscores the ongoing challenges in securing digital assets against sophisticated cybercriminals.

What Happened with the Lykke Exchange Theft?

In a significant cybersecurity breach, the notorious North Korean group, Lazarus, has been identified as the perpetrator behind a $19.5 million crypto theft targeting the UK exchange Lykke. The attack occurred in June 2024, leading to the loss of a considerable sum in both Bitcoin (BTC) and Ethereum (ETH). The UK’s Office of Financial Sanctions Implementation (OFSI) confirmed this link, highlighting the persistent threat posed by these state-sponsored actors.

  • Targeted Attack: Lykke exchange fell victim to a highly coordinated cyberattack.
  • Significant Loss: Approximately $19.5 million in BTC and ETH was stolen.
  • Official Confirmation: The UK’s OFSI officially attributed the attack to the Lazarus Group.

This incident unfortunately had severe consequences for Lykke. The exchange faced liquidation in March, a direct aftermath of the devastating cyberattack, as reported by The Daily Hodl. It serves as a stark reminder of how a single security breach can unravel an entire operation.

How Do North Korean Hackers Launder Stolen Crypto?

Following the theft, the stolen Bitcoin and Ethereum embarked on a complex journey through various laundering channels. Understanding these methods is crucial for authorities trying to track and recover funds. The Lazarus Group, like other sophisticated cybercriminals, employs a multi-layered approach to obscure the origins of their illicit gains.

Key laundering methods identified in this case include:

  • Thorchain: A decentralized cross-chain liquidity protocol that allows swapping assets without a central intermediary, making transactions harder to trace.
  • No-KYC Exchanges: Platforms that do not require users to undergo ‘Know Your Customer’ verification, providing anonymity to the criminals.
  • OTC Desks: Over-the-counter desks in regions like China, Cambodia, and Russia facilitate large, private transactions, often bypassing traditional regulatory scrutiny.

These methods allow North Korean hackers to convert stolen digital assets into fiat currency or other untraceable assets, funding their illicit activities, including weapons programs.

Protecting Your Assets from Cyber Threats

The Lykke incident involving North Korean hackers serves as a critical warning for both cryptocurrency exchanges and individual users. While exchanges must invest heavily in robust security infrastructure, users also play a vital role in safeguarding their digital wealth. Implementing strong security practices is no longer optional; it is essential.

For exchanges, this means:

  • Multi-layered Security: Implementing advanced encryption, multi-factor authentication, and cold storage solutions.
  • Regular Audits: Conducting frequent security audits and penetration testing to identify vulnerabilities.
  • Incident Response Plans: Having clear, actionable plans for responding to and mitigating cyberattacks.

For individual crypto holders, consider these actionable insights:

  • Use Hardware Wallets: Store significant amounts of crypto offline in hardware wallets.
  • Enable 2FA: Always use two-factor authentication on all exchange accounts.
  • Be Skeptical: Be wary of phishing attempts and suspicious links.
  • Strong Passwords: Use unique, complex passwords for each platform.

The persistent threat from groups like the Lazarus Group highlights the need for continuous vigilance and adaptation in the face of evolving cybercrime tactics. The crypto community must unite to enhance security protocols and share intelligence to counter these sophisticated threats effectively. This collective effort is crucial for the long-term integrity and trust in the digital asset space.

FAQs

Q1: Who are the Lazarus Group?
A1: The Lazarus Group is a state-sponsored cybercrime organization believed to be operated by North Korea. They are notorious for high-profile cyberattacks, particularly targeting financial institutions and cryptocurrency exchanges globally.

Q2: How much was stolen from Lykke exchange?
A2: Approximately $19.5 million in cryptocurrency, specifically Bitcoin (BTC) and Ethereum (ETH), was stolen from the Lykke exchange.

Q3: What happened to Lykke exchange after the attack?
A3: Lykke exchange was unfortunately liquidated in March, following the devastating impact of the June 2024 cyberattack attributed to North Korean hackers.

Q4: How do hackers like Lazarus Group launder stolen crypto?
A4: They use various methods including decentralized exchanges like Thorchain, no-KYC (Know Your Customer) exchanges to maintain anonymity, and over-the-counter (OTC) desks in countries like China, Cambodia, and Russia to convert crypto into fiat currency.

Q5: What can users do to protect their crypto from such attacks?
A5: Users should use hardware wallets for cold storage, enable two-factor authentication (2FA), use strong, unique passwords, and be highly vigilant against phishing attempts and suspicious links.

If you found this article insightful, please consider sharing it with your network on social media. Spreading awareness about these threats helps protect our community.

To learn more about the latest crypto market trends, explore our article on key developments shaping Bitcoin price action.

This post North Korean Hackers’ Alarming $19.5M Crypto Theft Shakes Lykke Exchange first appeared on BitcoinWorld and is written by Editorial Team

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Upbit to Raise Cold Wallet Ratio to 99% Amid Liquidity Concerns

Upbit to Raise Cold Wallet Ratio to 99% Amid Liquidity Concerns

The post Upbit to Raise Cold Wallet Ratio to 99% Amid Liquidity Concerns appeared on BitcoinEthereumNews.com. South Korea’s largest cryptocurrency exchange, Upbit, announced plans to increase its cold wallet storage ratio to 99%, following a major security breach last month. The announcement comes as part of a comprehensive security overhaul following hackers’ theft of approximately 44.5 billion won ($31 million) in Solana-based assets on November 27. Upbit Strengthens Security After Second November 27 Breach According to operator Dunamu, Upbit currently maintains 98.33% of customer digital assets in cold storage as of late October, with only 1.67% held in hot wallets. The exchange stated it has completed a full wallet infrastructure overhaul and aims to reduce hot wallet holdings to below 1% in the coming months. Dunamu emphasized that customer asset protection remains Upbit’s top priority, with all breach-related losses covered by the company’s reserves. Sponsored Sponsored The breach marked Upbit’s second major hack on the same date six years ago. In 2019, North Korean hacking groups Lazarus and Andariel stole 342,000 ETH from the exchange’s hot wallet. This time, attackers drained 24 different Solana network tokens in just 54 minutes during the early morning hours. Under South Korea’s Virtual Asset User Protection Act, exchanges must store at least 80% of customer assets in cold wallets. Upbit significantly exceeds this threshold and maintains the lowest hot wallet ratio among domestic exchanges. Data released by lawmaker Huh Young showed that other Korean exchanges were operating with cold wallet ratios of 82% to 90% as of June. Upbit Outpaces Global Industry Standards Upbit’s security metrics compare favorably with those of major global exchanges. Coinbase stores approximately 98% of customer funds in cold storage, while Kraken maintains 95-97% of its funds offline. OKX, Gate.io, and MEXC each keep around 95% of their funds in cold wallets. Binance and Bybit have not disclosed specific ratios but emphasize that the majority of…
Share
BitcoinEthereumNews2025/12/10 13:37
Tidal Trust Files For ‘Bitcoin AfterDark ETF’, Could Off-Hours Trading Boost Returns?

Tidal Trust Files For ‘Bitcoin AfterDark ETF’, Could Off-Hours Trading Boost Returns?

The post Tidal Trust Files For ‘Bitcoin AfterDark ETF’, Could Off-Hours Trading Boost Returns? appeared on BitcoinEthereumNews.com. Tidal Trust has filed for the first Bitcoin AfterDark ETF with the U.S. SEC. The product looks to capture overnight price movements of the token. What Is the Bitcoin AfterDark ETF? Tidal Trust has filed with the SEC for its proposed Bitcoin AfterDark ETF product. It is an ETF that would hold the coin only during non-trading hours in the United States. This filing also seeks permission for two other BTC-linked products managed with Nicholas Wealth Management. Source: SEC According to the registration documents, the ETF would buy Bitcoin at the close of U.S. markets and then sell the position the following morning upon the reopening of trading. In other words, it will effectively hold BTC only over the night “The fund trades those instruments during U.S. overnight hours and closes them out shortly after the U.S. market opens each trading day,” the filing said. During the day, the fund’s assets switch to U.S. Treasuries, money-market funds, and similar cash instruments. That means even when the fund has 100% notional exposure to Bitcoin overnight, a substantial portion of its capital may still sit in Treasuries during the day. Eric Balchunas, senior ETF analyst cited earlier research and said, “most of Bitcoin’s gains historically occur outside U.S. market hours.” If those patterns persist, the Bitcoin AfterDark ETF token will outperform more traditional spot BTC products, he said. Source: X Balchunas added that the effect may be partly driven by positioning in existing Bitcoin ETFs and related derivatives activity. The SEC has of late taken an increasingly more accommodating approach toward crypto-related ETFs. This September, for instance, REX Shares launched the first Ethereum Staking ETF. It represented direct ETH exposure and paid out on-chain staking rewards.  Also on Tuesday, BlackRock filed an application for an iShares Staked Ethereum ETF. The filing states…
Share
BitcoinEthereumNews2025/12/10 13:00
Tempo Testnet Goes Live with Stablecoin Tools and Expanded Partners

Tempo Testnet Goes Live with Stablecoin Tools and Expanded Partners

The post Tempo Testnet Goes Live with Stablecoin Tools and Expanded Partners appeared on BitcoinEthereumNews.com. The Tempo testnet, developed by Stripe and Paradigm, is now live, enabling developers to run nodes, sync the chain, and test stablecoin features for payments. This open-source platform emphasizes scale, reliability, and integration, paving the way for instant settlements on a dedicated layer-1 blockchain. Tempo testnet launches with six core features, including stablecoin-native gas and fast finality, optimized for financial applications. Developers can create stablecoins directly in browsers using the TIP-20 standard, enhancing accessibility for testing. The project has secured $500 million in funding at a $5 billion valuation, with partners like Mastercard and Klarna driving adoption; Klarna launched a USD-pegged stablecoin last month. Discover the Tempo testnet launch by Stripe and Paradigm: test stablecoins, run nodes, and explore payment innovations on this layer-1 blockchain. Join developers in shaping the future of crypto payments today. What is the Tempo Testnet? Tempo testnet represents a pivotal milestone in the development of a specialized layer-1 blockchain for payments, created through a collaboration between Stripe and Paradigm. This public testnet allows participants to run nodes, synchronize the chain, and experiment with essential features tailored for stablecoin operations and financial transactions. By focusing on instant settlements and low fees, it addresses key limitations in traditional blockchains for real-world payment use cases. Source: Patrick Collison The Tempo testnet builds on the project’s foundation, which was first announced four months ago, with an emphasis on developer-friendly tools. It supports a range of functionalities that prioritize reliability and scalability, making it an ideal environment for testing before the mainnet rollout. As per the official announcement from Tempo, this phase will involve ongoing enhancements, including new infrastructure partnerships and stress tests under simulated payment volumes. One of the standout aspects of the Tempo testnet is its open-source nature, inviting broad community involvement. This approach not only accelerates development…
Share
BitcoinEthereumNews2025/12/10 13:01