North Korea’s $308M Crypto Heist: A Comedy of Errors in Cybersecurity
North Korean hackers, under the alias TraderTraitor, pulled off a $308m cryptocurrency heist from Japan’s DMM using a sneaky social engineering scheme. Masquerading as a recruiter on LinkedIn, they tricked an employee into compromising their own security. North Korea’s crypto thefts are now funding the regime’s lavish… ramen noodle parties?

Hot Take:
Who knew a little Python script could slither its way into $308 million worth of cryptocurrency? North Korean hackers are back at it again, proving that while they might not be able to code a peaceful resolution to global tensions, they sure can code a mean crypto heist. Talk about a “slow Pisces” with lightning-fast fingers!
Key Points:
- North Korean threat group TraderTraitor was behind a $308 million cryptocurrency heist from Japan-based DMM.
- The attack was a result of a social engineering campaign initiated on LinkedIn in March 2024.
- The hackers used a malicious Python script to compromise a Ginco employee’s GitHub page.
- TraderTraitor capitalized on session cookie information to access and manipulate transactions.
- North Korea stole $1.34 billion in cryptocurrency across 47 incidents in 2024, comprising 61% of all crypto thefts that year.
Already a member? Log in here