Close Menu
FSNN | Free Speech News NetworkFSNN | Free Speech News Network
  • Home
  • News
    • Politics
    • Legal & Courts
    • Tech & Big Tech
    • Campus & Education
    • Media & Culture
    • Global Free Speech
  • Opinions
    • Debates
  • Video/Live
  • Community
  • Freedom Index
  • About
    • Mission
    • Contact
    • Support
Trending

Iran war, debanking drive commodity traders toward stablecoins, says Haycen CEO

7 minutes ago

Today in Supreme Court History: April 12, 1945

49 minutes ago

Trump token sees whale accumulation ahead of Mar-a-Lago gala; senators raise questions over event

1 hour ago
Facebook X (Twitter) Instagram
Facebook X (Twitter) Discord Telegram
FSNN | Free Speech News NetworkFSNN | Free Speech News Network
Market Data Newsletter
Sunday, April 12
  • Home
  • News
    • Politics
    • Legal & Courts
    • Tech & Big Tech
    • Campus & Education
    • Media & Culture
    • Global Free Speech
  • Opinions
    • Debates
  • Video/Live
  • Community
  • Freedom Index
  • About
    • Mission
    • Contact
    • Support
FSNN | Free Speech News NetworkFSNN | Free Speech News Network
Home»Cryptocurrency & Free Speech Finance»Why North Korea hacks crypto instead of evading sanctions like Russia and Iran
Cryptocurrency & Free Speech Finance

Why North Korea hacks crypto instead of evading sanctions like Russia and Iran

News RoomBy News Room2 hours agoNo Comments4 Mins Read1,166 Views
Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email VKontakte Telegram
Why North Korea hacks crypto instead of evading sanctions like Russia and Iran
Share
Facebook Twitter Pinterest Email Copy Link

Listen to the article

0:00
0:00

Key Takeaways

Playback Speed

Select a Voice

North Korea’s six-month infiltration campaign at Drift rattled a crypto industry already reeling from billion-dollar exploits.

But as the news settled, a bigger question came into focus: why does North Korea keep coming back to crypto in the first place, and why does its approach look so different from every other state-backed hacking operation on the planet?

The short answer, according to security experts, is that crypto helps give the regime a revenue stream and keep them afloat.

“North Korea doesn’t have the luxury of patience,” said Dave Schwed, chief operating officer at SVRN and the founder of the cybersecurity masters program at Yeshiva University. “They’re under comprehensive international sanctions and they need hard currency to fund weapons programs. The UN and multiple intelligence agencies have confirmed that crypto theft is a primary funding mechanism for their nuclear and ballistic missile development.”

That urgency explains a dynamic that has long puzzled investigators: why North Korean hackers carry out large-scale, traceable heists on public blockchains instead of quietly using crypto to evade sanctions the way other state actors do.

The answer, Schwed argues, is structural. Russia still has an economy: oil, gas, commodity exports, and trading partners willing to use workarounds. It needs crypto as a payment rail, but not for much else. Iran, too, has goods to move — sanctioned oil, proxy financing networks, willing intermediaries across the Middle East. North Korea has almost nothing left to sell.

“Their exports are almost entirely sanctioned. They don’t have a functioning economy that needs a payment rail. They need direct revenue,” Schwed said. “Crypto theft gives them immediate access to liquid value, globally, without needing a counterparty willing to do business with them.”

That distinction — crypto as infrastructure versus crypto as a target — is what separates North Korea not just from Russia, but from Iran as well. While Russia routes money through crypto to work around sanctions, and Iran uses it to fund proxy networks across the Middle East, North Korea is running something closer to a state-sponsored heist operation.

“Their targets are exchanges, wallet providers, DeFi protocols and the individual engineers and founders who have signing authority or infrastructure access,” said Alexander Urbelis, chief information security officer at ENS Labs and a professor of cybersecurity at King’s College London. “The victim is whoever holds the keys or access to the infrastructure that holds the keys.”

Russia and Iran, by comparison, treat crypto as incidental, a means to broader geopolitical ends.

“Russia targets elections, energy infrastructure and government systems. Iran goes after dissidents and regional adversaries,” Urbelis said. “When either of them touches crypto, it’s to move money, not to steal it from the ecosystem.”

That singular focus has pushed North Korean operatives to adopt tactics more commonly associated with intelligence agencies than criminal hackers: months-long relationship building, fabricated identities and supply chain infiltration.

The Drift campaign is only the most recent example.

“You’re not defending against a phishing email from a random scammer,” Urbelis said. “You’re defending against someone who spent six months building a relationship specifically to compromise one person who has the access you need to protect.”

Crypto’s own architecture makes it a uniquely attractive hunting ground. In traditional finance, even successful hacks run into friction in the form of compliance checks, correspondent bank checks, settlement delays and the possibility of reversing fraudulent transfers. When North Korea’s hackers pulled off the Bangladesh Bank robbery in 2016, the heist took days to process and most of the funds were eventually recovered or blocked. In crypto, none of those safeguards exist at the protocol level.

“Once a transaction is signed and confirmed, it’s final,” Urbelis said. The Bybit exploit earlier last year moved $1.5 billion in roughly 30 minutes, a pace and scale that would be nearly impossible in the traditional banking system.

That finality fundamentally changes the security calculus. In banking, a reasonable defense can be built across prevention, detection and response, because there’s always a window to freeze funds or reverse a wire. In crypto, that window barely exists, which means stopping an attack before it happens isn’t just preferable — it’s essentially the only option.

And while banks operate under decades of regulatory guidance and audit requirements, many crypto projects are still improvising — often prioritizing speed and innovation over governance and controls.

That gap creates an environment where even sophisticated teams can be vulnerable, particularly to the kind of long-term infiltration tactics North Korea has been refining.

“This is the hardest operational security problem in crypto right now,” Urbelis said of the challenge of vetting against sophisticated fake identities and third-party intermediaries. “I don’t think the industry has solved it.”

Read more: How North Korea’s 6-month long secret espionage program has crypto community rethinking security

Read the full article here

Fact Checker

Verify the accuracy of this article using AI-powered analysis and real-time sources.

Get Your Fact Check Report

Enter your email to receive detailed fact-checking analysis

5 free reports remaining

Continue with Full Access

You've used your 5 free reports. Sign up for unlimited access!

Already have an account? Sign in here

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Telegram Copy Link
News Room
  • Website
  • Facebook
  • X (Twitter)
  • Instagram
  • LinkedIn

The FSNN News Room is the voice of our in-house journalists, editors, and researchers. We deliver timely, unbiased reporting at the crossroads of finance, cryptocurrency, and global politics, providing clear, fact-driven analysis free from agendas.

Related Articles

Cryptocurrency & Free Speech Finance

Iran war, debanking drive commodity traders toward stablecoins, says Haycen CEO

7 minutes ago
Cryptocurrency & Free Speech Finance

Trump token sees whale accumulation ahead of Mar-a-Lago gala; senators raise questions over event

1 hour ago
Cryptocurrency & Free Speech Finance

Polymarket Briefly Appears in Google News Before Being Removed

1 hour ago
Cryptocurrency & Free Speech Finance

US Down To ‘Last Chance’ To Pass Clarity Act Before 2030: Lummis

2 hours ago
Cryptocurrency & Free Speech Finance

Ether Machine Abandons Public Debut as Dynamix Merger is Terminated

4 hours ago
Cryptocurrency & Free Speech Finance

What next for Ripple-linked token amid bitcoin (BTC) weakness

6 hours ago
Add A Comment
Leave A Reply Cancel Reply

Editors Picks

Today in Supreme Court History: April 12, 1945

49 minutes ago

Trump token sees whale accumulation ahead of Mar-a-Lago gala; senators raise questions over event

1 hour ago

Polymarket Briefly Appears in Google News Before Being Removed

1 hour ago

Keonne Rodriguez on Bitcoin, Privacy, and Going to Prison

2 hours ago
Latest Posts

Why North Korea hacks crypto instead of evading sanctions like Russia and Iran

2 hours ago

US Down To ‘Last Chance’ To Pass Clarity Act Before 2030: Lummis

2 hours ago

Germany’s Hidden Debt Crisis

4 hours ago

Subscribe to News

Get the latest news and updates directly to your inbox.

At FSNN – Free Speech News Network, we deliver unfiltered reporting and in-depth analysis on the stories that matter most. From breaking headlines to global perspectives, our mission is to keep you informed, empowered, and connected.

FSNN.net is owned and operated by GlobalBoost Media
, an independent media organization dedicated to advancing transparency, free expression, and factual journalism across the digital landscape.

Facebook X (Twitter) Discord Telegram
Latest News

Iran war, debanking drive commodity traders toward stablecoins, says Haycen CEO

7 minutes ago

Today in Supreme Court History: April 12, 1945

49 minutes ago

Trump token sees whale accumulation ahead of Mar-a-Lago gala; senators raise questions over event

1 hour ago

Subscribe to Updates

Get the latest news and updates directly to your inbox.

© 2026 GlobalBoost Media. All Rights Reserved.
  • Privacy Policy
  • Terms of Service
  • Our Authors
  • Contact

Type above and press Enter to search. Press Esc to cancel.

🍪

Cookies

We and our selected partners wish to use cookies to collect information about you for functional purposes and statistical marketing. You may not give us your consent for certain purposes by selecting an option and you can withdraw your consent at any time via the cookie icon.

Cookie Preferences

Manage Cookies

Cookies are small text that can be used by websites to make the user experience more efficient. The law states that we may store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies, we need your permission. This site uses various types of cookies. Some cookies are placed by third party services that appear on our pages.

Your permission applies to the following domains:

  • https://fsnn.net
Necessary
Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.
Statistic
Statistic cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.
Preferences
Preference cookies enable a website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in.
Marketing
Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.