North Korea-linked hackers stole $577 million in just two attacks during the first four months of 2026, accounting for approximately 76% of all cryptocurrency hack losses globally in that period, according to a report published by blockchain analytics firm TRM Labs in late April. The figures reveal a threat actor that is becoming more precise, more patient, and more effective — even as the global crypto industry invests heavily in security infrastructure.
The two attacks — targeting Drift Protocol and KelpDAO — brought North Korea’s total crypto theft since 2017 to more than $6 billion. TRM Labs described the operations as “some of the most sophisticated state-sponsored financial attacks ever recorded.”
The Two Attacks That Defined 2026’s Hack Landscape
Drift Protocol was the larger of the two breaches, with North Korean operatives — identified by investigators as operating under the DPRK’s Lazarus Group umbrella — conducting what CoinDesk described as a “long con.” Investigators believe the attackers spent months embedding themselves within the Drift ecosystem, including potential in-person engagement with team members, before executing an exploit that extracted approximately $285 million.
The patience and operational depth of the Drift attack marks a qualitative escalation from previous North Korean operations. Earlier campaigns often relied on phishing and private key theft. The Drift operation suggests a more sophisticated playbook involving social engineering, insider positioning, and layered attack execution.
KelpDAO was the second major breach, contributing the remainder of the $577 million total. Details of that exploit remain under active investigation, but TRM Labs confirmed North Korean attribution based on on-chain fund flow patterns, IP overlap with previously identified DPRK-linked infrastructure, and the use of mixing services consistent with prior Lazarus Group operational signatures.
A Dangerous Escalation in Pace and Precision
TRM Labs’ report goes beyond the raw dollar figures to document a shift in how North Korean cyber units operate. The firm noted that the average time between attack execution and initial fund laundering has compressed significantly in recent campaigns, suggesting the units have developed more streamlined processes for converting stolen crypto into usable state resources.
The DPRK and Lazarus Group are widely believed to fund a significant portion of North Korea’s weapons development programs through crypto theft. United Nations investigators have estimated that proceeds from these operations helped finance the country’s ballistic missile program in prior years.
“These aren’t financially-motivated criminal groups. They are state actors with state resources, long time horizons, and strategic targets,” TRM Labs’ report stated.
The Industry’s Response — and Its Limits
The crypto security industry has not been idle. Major protocols now run continuous bug bounty programs, engage specialized audit firms, and maintain security councils capable of coordinating emergency responses. THORChain’s response to its own $10.8 million exploit earlier this month — halting trading and deploying a patch within 13 hours — illustrates how the industry’s incident response capabilities have improved.
But the North Korean threat operates at a level that conventional security measures struggle to match. When attackers are willing to spend months building trust within a target organization, technical security controls become only one layer of a much larger problem.
U.S. Treasury officials have repeatedly designated North Korean entities involved in crypto theft operations, and the FBI’s Virtual Asset Unit has expanded its capacity to track illicit crypto flows. But North Korea’s use of Monero, privacy bridges, and distributed laundering networks continues to complicate asset recovery efforts.
International Response and Geopolitical Dimensions
South Korea and the United States have jointly sanctioned multiple entities linked to the Lazarus Group’s crypto operations. The UN Panel of Experts on North Korea has published detailed technical reports on the group’s techniques, and Interpol has issued purple notices related to crypto theft methodologies.
Despite this, recovery rates remain extremely low. Of the $577 million stolen in the two 2026 attacks, virtually none has been recovered as of TRM Labs’ reporting date. The funds have been partially routed through Monero transactions, cross-chain bridges, and mixers that significantly impede tracing.
The geopolitical dimension matters for the broader crypto industry: as digital assets become more systemically significant, state-sponsored attacks against crypto infrastructure move from being a niche security problem to a national security concern.
What Protocols Can Do
TRM Labs and other security researchers have published guidance for protocols operating at the scale that makes them North Korean targets. The recommendations include enhanced team member background verification, multi-sig controls that require hardware verification for large transactions, time-locked withdrawals above certain thresholds, and regular red-team exercises simulating insider threat scenarios.
For protocols processing hundreds of millions in daily volume, these measures represent real operational costs. But the alternative — becoming a $285 million line item in a DPRK state budget report — is a significantly worse outcome.
FAQ
Which groups are responsible for North Korea’s crypto hacking? TRM Labs attributes the attacks primarily to Lazarus Group and affiliated units operating under the DPRK’s Reconnaissance General Bureau. These groups have been active in crypto theft since at least 2017.
How does North Korea launder stolen crypto? North Korean operatives typically use a combination of cross-chain bridges, Monero privacy transactions, mixer services, and OTC brokers in jurisdictions with limited anti-money laundering enforcement. The process has become increasingly automated and rapid.
Has any stolen crypto from 2026’s attacks been recovered? As of TRM Labs’ April report, negligible amounts of the $577 million stolen in 2026 have been recovered. Asset recovery in North Korean cases is extremely rare due to the sophistication of their laundering operations.
Sources: TRM Labs report, CoinDesk, The Block, Crypto.news, Bitbo, UN Panel of Experts on North Korea.