BitcoinWorld North Korean Hackers’ Alarming $19.5M Crypto Theft Shakes Lykke Exchange The cryptocurrency world often buzzes with innovation, but it also faces persistent threats. A recent development has sent ripples through the industry: North Korean hackers are now officially linked to a substantial $19.5 million crypto theft from the UK-based Lykke exchange. This incident underscores the ongoing challenges in securing digital assets against sophisticated cybercriminals. What Happened with the Lykke Exchange Theft? In a significant cybersecurity breach, the notorious North Korean group, Lazarus, has been identified as the perpetrator behind a $19.5 million crypto theft targeting the UK exchange Lykke. The attack occurred in June 2024, leading to the loss of a considerable sum in both Bitcoin (BTC) and Ethereum (ETH). The UK’s Office of Financial Sanctions Implementation (OFSI) confirmed this link, highlighting the persistent threat posed by these state-sponsored actors. Targeted Attack: Lykke exchange fell victim to a highly coordinated cyberattack. Significant Loss: Approximately $19.5 million in BTC and ETH was stolen. Official Confirmation: The UK’s OFSI officially attributed the attack to the Lazarus Group. This incident unfortunately had severe consequences for Lykke. The exchange faced liquidation in March, a direct aftermath of the devastating cyberattack, as reported by The Daily Hodl. It serves as a stark reminder of how a single security breach can unravel an entire operation. How Do North Korean Hackers Launder Stolen Crypto? Following the theft, the stolen Bitcoin and Ethereum embarked on a complex journey through various laundering channels. Understanding these methods is crucial for authorities trying to track and recover funds. The Lazarus Group, like other sophisticated cybercriminals, employs a multi-layered approach to obscure the origins of their illicit gains. Key laundering methods identified in this case include: Thorchain: A decentralized cross-chain liquidity protocol that allows swapping assets without a central intermediary, making transactions harder to trace. No-KYC Exchanges: Platforms that do not require users to undergo ‘Know Your Customer’ verification, providing anonymity to the criminals. OTC Desks: Over-the-counter desks in regions like China, Cambodia, and Russia facilitate large, private transactions, often bypassing traditional regulatory scrutiny. These methods allow North Korean hackers to convert stolen digital assets into fiat currency or other untraceable assets, funding their illicit activities, including weapons programs. Protecting Your Assets from Cyber Threats The Lykke incident involving North Korean hackers serves as a critical warning for both cryptocurrency exchanges and individual users. While exchanges must invest heavily in robust security infrastructure, users also play a vital role in safeguarding their digital wealth. Implementing strong security practices is no longer optional; it is essential. For exchanges, this means: Multi-layered Security: Implementing advanced encryption, multi-factor authentication, and cold storage solutions. Regular Audits: Conducting frequent security audits and penetration testing to identify vulnerabilities. Incident Response Plans: Having clear, actionable plans for responding to and mitigating cyberattacks. For individual crypto holders, consider these actionable insights: Use Hardware Wallets: Store significant amounts of crypto offline in hardware wallets. Enable 2FA: Always use two-factor authentication on all exchange accounts. Be Skeptical: Be wary of phishing attempts and suspicious links. Strong Passwords: Use unique, complex passwords for each platform. The persistent threat from groups like the Lazarus Group highlights the need for continuous vigilance and adaptation in the face of evolving cybercrime tactics. The crypto community must unite to enhance security protocols and share intelligence to counter these sophisticated threats effectively. This collective effort is crucial for the long-term integrity and trust in the digital asset space. FAQs Q1: Who are the Lazarus Group?A1: The Lazarus Group is a state-sponsored cybercrime organization believed to be operated by North Korea. They are notorious for high-profile cyberattacks, particularly targeting financial institutions and cryptocurrency exchanges globally. Q2: How much was stolen from Lykke exchange?A2: Approximately $19.5 million in cryptocurrency, specifically Bitcoin (BTC) and Ethereum (ETH), was stolen from the Lykke exchange. Q3: What happened to Lykke exchange after the attack?A3: Lykke exchange was unfortunately liquidated in March, following the devastating impact of the June 2024 cyberattack attributed to North Korean hackers. Q4: How do hackers like Lazarus Group launder stolen crypto?A4: They use various methods including decentralized exchanges like Thorchain, no-KYC (Know Your Customer) exchanges to maintain anonymity, and over-the-counter (OTC) desks in countries like China, Cambodia, and Russia to convert crypto into fiat currency. Q5: What can users do to protect their crypto from such attacks?A5: Users should use hardware wallets for cold storage, enable two-factor authentication (2FA), use strong, unique passwords, and be highly vigilant against phishing attempts and suspicious links. If you found this article insightful, please consider sharing it with your network on social media. Spreading awareness about these threats helps protect our community. To learn more about the latest crypto market trends, explore our article on key developments shaping Bitcoin price action. This post North Korean Hackers’ Alarming $19.5M Crypto Theft Shakes Lykke Exchange first appeared on BitcoinWorld and is written by Editorial TeamBitcoinWorld North Korean Hackers’ Alarming $19.5M Crypto Theft Shakes Lykke Exchange The cryptocurrency world often buzzes with innovation, but it also faces persistent threats. A recent development has sent ripples through the industry: North Korean hackers are now officially linked to a substantial $19.5 million crypto theft from the UK-based Lykke exchange. This incident underscores the ongoing challenges in securing digital assets against sophisticated cybercriminals. What Happened with the Lykke Exchange Theft? In a significant cybersecurity breach, the notorious North Korean group, Lazarus, has been identified as the perpetrator behind a $19.5 million crypto theft targeting the UK exchange Lykke. The attack occurred in June 2024, leading to the loss of a considerable sum in both Bitcoin (BTC) and Ethereum (ETH). The UK’s Office of Financial Sanctions Implementation (OFSI) confirmed this link, highlighting the persistent threat posed by these state-sponsored actors. Targeted Attack: Lykke exchange fell victim to a highly coordinated cyberattack. Significant Loss: Approximately $19.5 million in BTC and ETH was stolen. Official Confirmation: The UK’s OFSI officially attributed the attack to the Lazarus Group. This incident unfortunately had severe consequences for Lykke. The exchange faced liquidation in March, a direct aftermath of the devastating cyberattack, as reported by The Daily Hodl. It serves as a stark reminder of how a single security breach can unravel an entire operation. How Do North Korean Hackers Launder Stolen Crypto? Following the theft, the stolen Bitcoin and Ethereum embarked on a complex journey through various laundering channels. Understanding these methods is crucial for authorities trying to track and recover funds. The Lazarus Group, like other sophisticated cybercriminals, employs a multi-layered approach to obscure the origins of their illicit gains. Key laundering methods identified in this case include: Thorchain: A decentralized cross-chain liquidity protocol that allows swapping assets without a central intermediary, making transactions harder to trace. No-KYC Exchanges: Platforms that do not require users to undergo ‘Know Your Customer’ verification, providing anonymity to the criminals. OTC Desks: Over-the-counter desks in regions like China, Cambodia, and Russia facilitate large, private transactions, often bypassing traditional regulatory scrutiny. These methods allow North Korean hackers to convert stolen digital assets into fiat currency or other untraceable assets, funding their illicit activities, including weapons programs. Protecting Your Assets from Cyber Threats The Lykke incident involving North Korean hackers serves as a critical warning for both cryptocurrency exchanges and individual users. While exchanges must invest heavily in robust security infrastructure, users also play a vital role in safeguarding their digital wealth. Implementing strong security practices is no longer optional; it is essential. For exchanges, this means: Multi-layered Security: Implementing advanced encryption, multi-factor authentication, and cold storage solutions. Regular Audits: Conducting frequent security audits and penetration testing to identify vulnerabilities. Incident Response Plans: Having clear, actionable plans for responding to and mitigating cyberattacks. For individual crypto holders, consider these actionable insights: Use Hardware Wallets: Store significant amounts of crypto offline in hardware wallets. Enable 2FA: Always use two-factor authentication on all exchange accounts. Be Skeptical: Be wary of phishing attempts and suspicious links. Strong Passwords: Use unique, complex passwords for each platform. The persistent threat from groups like the Lazarus Group highlights the need for continuous vigilance and adaptation in the face of evolving cybercrime tactics. The crypto community must unite to enhance security protocols and share intelligence to counter these sophisticated threats effectively. This collective effort is crucial for the long-term integrity and trust in the digital asset space. FAQs Q1: Who are the Lazarus Group?A1: The Lazarus Group is a state-sponsored cybercrime organization believed to be operated by North Korea. They are notorious for high-profile cyberattacks, particularly targeting financial institutions and cryptocurrency exchanges globally. Q2: How much was stolen from Lykke exchange?A2: Approximately $19.5 million in cryptocurrency, specifically Bitcoin (BTC) and Ethereum (ETH), was stolen from the Lykke exchange. Q3: What happened to Lykke exchange after the attack?A3: Lykke exchange was unfortunately liquidated in March, following the devastating impact of the June 2024 cyberattack attributed to North Korean hackers. Q4: How do hackers like Lazarus Group launder stolen crypto?A4: They use various methods including decentralized exchanges like Thorchain, no-KYC (Know Your Customer) exchanges to maintain anonymity, and over-the-counter (OTC) desks in countries like China, Cambodia, and Russia to convert crypto into fiat currency. Q5: What can users do to protect their crypto from such attacks?A5: Users should use hardware wallets for cold storage, enable two-factor authentication (2FA), use strong, unique passwords, and be highly vigilant against phishing attempts and suspicious links. If you found this article insightful, please consider sharing it with your network on social media. Spreading awareness about these threats helps protect our community. To learn more about the latest crypto market trends, explore our article on key developments shaping Bitcoin price action. This post North Korean Hackers’ Alarming $19.5M Crypto Theft Shakes Lykke Exchange first appeared on BitcoinWorld and is written by Editorial Team

North Korean Hackers’ Alarming $19.5M Crypto Theft Shakes Lykke Exchange

2025/08/20 03:15
5 min read

BitcoinWorld

North Korean Hackers’ Alarming $19.5M Crypto Theft Shakes Lykke Exchange

The cryptocurrency world often buzzes with innovation, but it also faces persistent threats. A recent development has sent ripples through the industry: North Korean hackers are now officially linked to a substantial $19.5 million crypto theft from the UK-based Lykke exchange. This incident underscores the ongoing challenges in securing digital assets against sophisticated cybercriminals.

What Happened with the Lykke Exchange Theft?

In a significant cybersecurity breach, the notorious North Korean group, Lazarus, has been identified as the perpetrator behind a $19.5 million crypto theft targeting the UK exchange Lykke. The attack occurred in June 2024, leading to the loss of a considerable sum in both Bitcoin (BTC) and Ethereum (ETH). The UK’s Office of Financial Sanctions Implementation (OFSI) confirmed this link, highlighting the persistent threat posed by these state-sponsored actors.

  • Targeted Attack: Lykke exchange fell victim to a highly coordinated cyberattack.
  • Significant Loss: Approximately $19.5 million in BTC and ETH was stolen.
  • Official Confirmation: The UK’s OFSI officially attributed the attack to the Lazarus Group.

This incident unfortunately had severe consequences for Lykke. The exchange faced liquidation in March, a direct aftermath of the devastating cyberattack, as reported by The Daily Hodl. It serves as a stark reminder of how a single security breach can unravel an entire operation.

How Do North Korean Hackers Launder Stolen Crypto?

Following the theft, the stolen Bitcoin and Ethereum embarked on a complex journey through various laundering channels. Understanding these methods is crucial for authorities trying to track and recover funds. The Lazarus Group, like other sophisticated cybercriminals, employs a multi-layered approach to obscure the origins of their illicit gains.

Key laundering methods identified in this case include:

  • Thorchain: A decentralized cross-chain liquidity protocol that allows swapping assets without a central intermediary, making transactions harder to trace.
  • No-KYC Exchanges: Platforms that do not require users to undergo ‘Know Your Customer’ verification, providing anonymity to the criminals.
  • OTC Desks: Over-the-counter desks in regions like China, Cambodia, and Russia facilitate large, private transactions, often bypassing traditional regulatory scrutiny.

These methods allow North Korean hackers to convert stolen digital assets into fiat currency or other untraceable assets, funding their illicit activities, including weapons programs.

Protecting Your Assets from Cyber Threats

The Lykke incident involving North Korean hackers serves as a critical warning for both cryptocurrency exchanges and individual users. While exchanges must invest heavily in robust security infrastructure, users also play a vital role in safeguarding their digital wealth. Implementing strong security practices is no longer optional; it is essential.

For exchanges, this means:

  • Multi-layered Security: Implementing advanced encryption, multi-factor authentication, and cold storage solutions.
  • Regular Audits: Conducting frequent security audits and penetration testing to identify vulnerabilities.
  • Incident Response Plans: Having clear, actionable plans for responding to and mitigating cyberattacks.

For individual crypto holders, consider these actionable insights:

  • Use Hardware Wallets: Store significant amounts of crypto offline in hardware wallets.
  • Enable 2FA: Always use two-factor authentication on all exchange accounts.
  • Be Skeptical: Be wary of phishing attempts and suspicious links.
  • Strong Passwords: Use unique, complex passwords for each platform.

The persistent threat from groups like the Lazarus Group highlights the need for continuous vigilance and adaptation in the face of evolving cybercrime tactics. The crypto community must unite to enhance security protocols and share intelligence to counter these sophisticated threats effectively. This collective effort is crucial for the long-term integrity and trust in the digital asset space.

FAQs

Q1: Who are the Lazarus Group?
A1: The Lazarus Group is a state-sponsored cybercrime organization believed to be operated by North Korea. They are notorious for high-profile cyberattacks, particularly targeting financial institutions and cryptocurrency exchanges globally.

Q2: How much was stolen from Lykke exchange?
A2: Approximately $19.5 million in cryptocurrency, specifically Bitcoin (BTC) and Ethereum (ETH), was stolen from the Lykke exchange.

Q3: What happened to Lykke exchange after the attack?
A3: Lykke exchange was unfortunately liquidated in March, following the devastating impact of the June 2024 cyberattack attributed to North Korean hackers.

Q4: How do hackers like Lazarus Group launder stolen crypto?
A4: They use various methods including decentralized exchanges like Thorchain, no-KYC (Know Your Customer) exchanges to maintain anonymity, and over-the-counter (OTC) desks in countries like China, Cambodia, and Russia to convert crypto into fiat currency.

Q5: What can users do to protect their crypto from such attacks?
A5: Users should use hardware wallets for cold storage, enable two-factor authentication (2FA), use strong, unique passwords, and be highly vigilant against phishing attempts and suspicious links.

If you found this article insightful, please consider sharing it with your network on social media. Spreading awareness about these threats helps protect our community.

To learn more about the latest crypto market trends, explore our article on key developments shaping Bitcoin price action.

This post North Korean Hackers’ Alarming $19.5M Crypto Theft Shakes Lykke Exchange first appeared on BitcoinWorld and is written by Editorial Team

Market Opportunity
Bitcoin Logo
Bitcoin Price(BTC)
$68,140.02
$68,140.02$68,140.02
+1.08%
USD
Bitcoin (BTC) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Bardahl Consolidates Global B2B Commerce with Intershop Platform Implementation

Bardahl Consolidates Global B2B Commerce with Intershop Platform Implementation

Bardahl selects Intershop to unify global B2B commerce operations, replacing legacy systems with a scalable platform for digital transformation and growth across
Share
Citybuzz2026/02/26 06:43
Wormhole Unveils W Token 2.0 with Enhanced Tokenomics

Wormhole Unveils W Token 2.0 with Enhanced Tokenomics

The post Wormhole Unveils W Token 2.0 with Enhanced Tokenomics appeared on BitcoinEthereumNews.com. Joerg Hiller Sep 17, 2025 13:57 Wormhole introduces W Token 2.0, featuring upgraded tokenomics, a strategic Wormhole Reserve, and a 4% base yield, aiming to optimize ecosystem growth and align incentives. Wormhole has announced a significant upgrade to its native token, unveiling the W Token 2.0. This upgrade introduces new tokenomics including the establishment of a Wormhole Reserve, a 4% base yield, and an optimized unlock schedule, marking a pivotal development in the ecosystem, according to Wormhole. The W Token Evolution Launched in October 2020, Wormhole’s W token has been central to the platform’s mission of creating a connected internet economy. The latest upgrade aims to enhance the token’s utility across more than 40 blockchains. With a capped supply of 10 billion, the W token supports governance, staking, and ecosystem growth, aligning incentives for network security and development. Introducing the Wormhole Reserve The Wormhole Reserve will accumulate value from both onchain and offchain activities, supporting the ecosystem’s expansion. As Wormhole adoption grows, the token will capture value through network expansions and ecosystem applications, ensuring that growth is directly reflected in the token’s value. 4% Base Yield and Governance Rewards Wormhole 2.0 introduces a 4% base yield for W holders who actively participate in governance. The yield, derived from existing token supplies and protocol revenues, is designed to incentivize active participation without inflating the token supply. Optimized Unlock Schedule Updating its token release schedule, Wormhole replaces annual cliffs with bi-weekly unlocks, starting October 3, 2025. This change aims to reduce market pressure and provide a more stable environment for investors and contributors. The bi-weekly schedule will span over 4.5 years, affecting categories such as Guardian Nodes and Community & Launch. Wormhole’s Future Vision With these upgrades, Wormhole aims to expand its role as…
Share
BitcoinEthereumNews2025/09/18 15:48
SEC Approves New Standards for Digital Asset ETF Listings

SEC Approves New Standards for Digital Asset ETF Listings

Detail: https://coincu.com/news/sec-digital-asset-etf-listings/
Share
Coinstats2025/09/18 07:38