🔥 Land A High Paying Web3 Job In 90 Days LEARN MORE

North Korean hackers have lost more than $700,000 in trading on Hyperliquid. Are they preparing to hack the platform?

In this post:

  • North Korean hackers lost $700K trading on Hyperliquid, sparking fears of system testing for future attacks.
  • DPRK hackers stole $1.34B in crypto in 2024, targeting large and small entities with increasing speed and scale.
  • The US and UAE disrupted DPRK money laundering, sanctioning entities linked to funding North Korea’s weapons programs.

_Marked addresses linked to North Korean hackers have reportedly engaged in trading activities on Hyperliquid, resulting in losses of more than $700,000. The trading activities have stirred concerns within the crypto community, with some speculating that these actions may signal North Korean hackers testing Hyperliquid’s systems for vulnerabilities.

As reported by Chinese correspondent Colin Wu, Tayvano, a crypto enthusiast on X, has warned the Hyperliquid team of an imminent threat, saying the Democratic People’s Republic of Korea (DPRK) “does not trade; it tests.”

Hyperliquid (HYPE) recently hit the $11 billion trading volume mark, fueled by its recent airdrop event. Analysts are optimistic the token will surge past its recent highs of $35.02. However, recent activities from DPRK hackers have the community a little worried.

Expert offers to help Hyperliquid ‘mitigate imminent threat’

Just two weeks ago, crypto KOL Tayvano reached out to Hyperliquid, offering insights and assistance to counter the perceived risks. In a letter to the crypto project, Tayvano highlighted the dangers posed by the familiarity North Korean hackers have with Hyperliquid’s platform.

North Korean hackers have lost more than $700,000 in trading on Hyperliquid. Are they preparing to hack the platform?
Source: X

“I would like to walk you through some of the measures that your team can and should take to mitigate risk of a sophisticated attack,” Tayvano wrote. The letter further emphasized the evolving tactics of DPRK hackers, describing them as “creative, persistent, and highly sophisticated,” with access to zero-day vulnerabilities, such as those recently patched by Chrome.

See also  Soneium starts banning meme tokens for copyright infringement

Tayvano proposed an open communication channel between Hyperliquid and security experts to share updates and countermeasures effectively, aiming to prevent the platform from becoming a high-profile target.

DPRK hacks dominate 2024 crypto theft

According to a Chainalysis report, North Korean state-sponsored hackers stole an estimated $1.34 billion in cryptocurrency in 2024 alone, accounting for more than half of all crypto-related thefts this year. The frequency and scale of the attacks have intensified, with the hackers targeting a wider range of organizations.

Notably, DPRK-linked exploits yielding profits of $50 to $100 million—or more—occurred significantly more often this year compared to 2023. Chainalysis attributes this trend to the hackers’ growing expertise in executing massive exploits.

In addition to large-scale thefts, DPRK hackers have also conducted smaller attacks, pulling in as little as $10,000. These activities showcase their ability to target both high-value entities and smaller-scale opportunities.

The rise in DPRK cyber activities has also been linked to North Korean IT workers infiltrating crypto and Web3 companies. Using sophisticated tactics such as false identities, third-party hiring intermediaries, and exploiting remote work opportunities, these individuals have compromised networks and stolen proprietary information.

One notable case involved the U.S. Department of Justice (DOJ) indicting 14 North Korean nationals accused of posing as remote IT workers at U.S. companies. These individuals reportedly stole more than $88 million through extortion and data theft.

See also  Microsoft appoints former Meta executive to lead new AI engineering division

Sanctions and blacklists: Something for the pain?

As international efforts to disrupt North Korea’s illicit activities continue, countries are now joining hands to break the chain of attacks the DPRK is executing. A collaboration between the US and the United Arab Emirates (UAE) recently led to the disruption of a DPRK money-laundering network. 

According to the US Treasury’s Office of Foreign Assets Control (OFAC), two Chinese nationals and their UAE-based shell company, Green Alpine Trading LLC, were sanctioned for laundering millions of dollars in cryptocurrency for North Korea.

The duo reportedly funneled funds for Sim Hyon-Sop, a sanctioned representative of the Korea Kwangson Banking Corporation (KKBC), who is wanted by the FBI. Sop is known for establishing complex financial pipelines to support North Korea’s weapons programs.

OFAC’s sanctions freeze all US owned assets linked to the Chinese nationals and Green Alpine Trading LLC, effectively blacklisting them from global financial systems. The agency warns that financial institutions interacting with these entities may face additional penalties.

The sanctions are part of broader efforts to curb North Korea’s ability to finance its weapons of mass destruction (WMD) and ballistic missile programs through illicit means, including crypto theft and money laundering operations.

Land a High-Paying Web3 Job in 90 Days: The Ultimate Roadmap

Share link:

Disclaimer. The information provided is not trading advice. Cryptopolitan.com holds no liability for any investments made based on the information provided on this page. We strongly recommend independent research and/or consultation with a qualified professional before making any investment decisions.

Most read

Loading Most Read articles...

Stay on top of crypto news, get daily updates in your inbox

Editor's choice

Loading Editor's Choice articles...
Subscribe to CryptoPolitan