Crypto Times Logo Black
Google News Follow Banner
  • News
    • Market
    • Bitcoin
    • Ethereum
    • Altcoins
    • Regulations & Policies
    • DeFi News
    • Blockchain News
    • Industry
  • Exclusive
  • Opinion
  • Learn
    • Explained
    • How To
    • Insights
  • Podcasts
  • More
    • About Us
    • Our Authors
    • Contact Us
    • Editorial Policy
The Crypto TimesThe Crypto Times
  • All News
  • Market
  • Bitcoin
  • Ethereum
  • Altcoins
  • Regulations & Policies
  • Blockchain
  • DeFi
  • Industry
  • Exclusive
  • Opinion
Search
  • News
    • Market
    • Bitcoin
    • Ethereum
    • Altcoins
    • Regulations & Policies
    • Blockchain
    • DeFi
    • Industry
    • Exclusive
    • Opinion
  • Learn
    • Explained
    • How To
    • Insights
  • Quick Links
    • About Us
    • Our Authors
    • Contact Us
    • Editorial Policy
    • AI Policy
    • Sponsored & Advertorial Policy
  • Podcasts
Follow US
© 2026 By Crypto Times. All Rights Reserved.
Exclusive

KelpDAO, Bybit, Ronin: Lazarus Group’s Crypto Hacks Behind a $7.3B Heist Empire

Analysis shows Lazarus drives many top-tier crypto heists, but not all, as attribution gaps and industry failures complicate the narrative.

Written By:
Shubham Soni

Last updated: 1 hour ago
Published 2 hours ago
Share
Last updated: 1 hour ago
Published 2 hours ago
KelpDAO, Bybit, Ronin Lazarus Group’s Crypto Hacks Behind a $7.3B Heist Empire
Show AI Summary
Lazarus Group is a highly organized state-sponsored entity operating under North Korea’s Reconnaissance General Bureau.
The group shifted focus toward cryptocurrency around 2018 to circumvent international sanctions and fund regime programs.
Lazarus is responsible for a significant share of large crypto heists, but not all, according to FBI and DOJ indictments and on-chain data.

Every time a major crypto exchange, bridge, or DeFi protocol is drained of millions, the PR playbook is almost depressingly predictable. Within 48 hours, a somber X thread appears: “We were targeted by a highly sophisticated, state-sponsored cyberattack.” The unspoken translation? “It was the Lazarus Group.”

For years, blaming North Korea has quietly become the ultimate “get out of jail free” card in crypto. Admitting that an intern left private keys in a public GitHub repo is a career-ending humiliation. Getting outsmarted by a military-grade cyber army, however, buys sympathy, time, and cover with investors.

So which is it? Is Lazarus actually behind most of the billion-dollar heists the industry has suffered, or has the name become a convenient scapegoat for an industry that still cannot keep its own house in order?

After reviewing FBI and DOJ indictments, the 2026 Chainalysis Crypto Crime Report, Elliptic and TRM Labs forensics, victim post-mortems from LayerZero and Drift, and on-chain data, the conclusion is sharper than most think. Lazarus is real. Lazarus is North Korean. And Lazarus is responsible for a significant share of the largest heists in crypto history. Just not all of them.

Who actually is the Lazarus Group?

Lazarus (also tracked as APT38, TraderTraitor, and UNC4736) is not a loose collective of hackers. It is a highly organized, state-sponsored group operating under North Korea’s Reconnaissance General Bureau, with ties to a unit known as Bureau 121.

The group gained global attention with the 2014 Sony Pictures hack and the 2017 WannaCry ransomware outbreak. Around 2018, it shifted focus toward cryptocurrency. The reasoning wasn’t subtle. North Korea faces heavy international sanctions, and crypto offers something traditional finance no longer could: a borderless, hard-to-freeze way to move billions of dollars into a regime whose nuclear and ballistic missile programs need constant funding.

U.S. indictments, malware analysis, IP tracing, and intelligence reports link Lazarus to Pyongyang. North Korea denies involvement, but the blockchain evidence points consistently in the same direction.

The Scoreboard: $7.3 billion and counting

The group’s financial footprint is substantial.

According to Chainalysis’s 2026 data, DPRK-linked actors stole $2.02 billion in 2025 alone, a 51% jump year-over-year, accounting for roughly 76% of all service-related crypto thefts during that period. This pushed their cumulative total to $6.75 billion by the end of last year.

Then April 2026 happened. The KelpDAO breach and the Drift Protocol exploit added roughly $575 million within 17 days. The total now exceeds $7.3 billion, making Lazarus one of the most prolific cyber-theft operations on record. 

A clear trend has emerged: fewer attacks, but significantly higher value per incident.

The big heists: A verified table

Here’s a breakdown of major crypto thefts tied to Lazarus, cross-checked against FBI and DOJ statements, Chainalysis, Elliptic, and TRM Labs forensics, victim post-mortems, and primary blockchain analysis.

RankTargetDateAmountMethod
1Bybit ExchangeFeb 2025$1.5BSafe{Wallet} supply chain compromise and social engineering
2Ronin Bridge (Axie Infinity)Mar 2022$620 to $625MValidator key theft via fake-job spear phishing
3DMM BitcoinMay 2024~$308MHot wallet compromise
4KelpDAO (rsETH)Apr 18, 2026$290 to $292MRPC node poisoning and DDoS on LayerZero DVNs
5Drift ProtocolApr 1, 2026$285MSix-month social engineering of Security Council multisig
6KuCoin ExchangeSep 2020~$275MHot wallet breach
7WazirXJul 2024~$235MWallet compromise
8Harmony Horizon BridgeJun 2022$100MPrivate key theft
9Atomic WalletJun 2023~$100MMalware and supply chain attack
10AlphapoJul 2023$60MPayment platform breach

Smaller incidents, like the Stake.com breach ($41M in 2023) and the Upbit hit ($36 to $37M in 2025), show similar patterns but fall outside the top ten. Worth noting that the Poly Network hack ($600M in August 2021) is sometimes grouped with Lazarus activity in broader media coverage, though its attribution remains less conclusive than the cases above.

One signature runs through virtually every confirmed entry on this list, and almost nobody in crypto media has connected the dots publicly: the 45-day laundering playbook. Clustered wallet movements, mixer rotations, and small-tranche off-ramps through Asian OTC networks. It’s a fingerprint, and it shows up on heist after heist.

Why “Lazarus = every hack” feels overblown

Not all crypto exploits are linked to Lazarus. Many smaller incidents are carried out by independent actors. Attribution is complex, and false flags are possible. However, major attributions typically rely on multiple data points, including blockchain analysis, malware signatures, and intelligence sources.

The April 2026 incidents involving Drift Protocol and KelpDAO, supported by forensic analysis and project disclosures, strongly align with known Lazarus tactics.

How investigators attribute attacks to Lazarus

So how do forensic analysts separate real Lazarus work from convenient finger-pointing? It comes down to TTPs. Tactics, techniques, and procedures. Digital fingerprints rather than guesswork.

Malware signatures: Lazarus reuses custom-built malware across campaigns. AppleJeus, the famous fake crypto-trading application from earlier years, is one well-documented example. Code reuse across operations becomes its own form of evidence.

Highly specific laundering behavior: The group doesn’t just move stolen funds. It moves them in patterns that repeat. Historically, they routed hundreds of millions through Tornado Cash. Once Tornado was sanctioned, they systematically pivoted to privacy protocols like Railgun and began routing more volume through Bitcoin and specific Asian OTC brokers. This evolution is itself traceable, and it shows continuity of operators rather than imitators.

The embedded employee tactic: This one is genuinely unsettling. In recent years, Lazarus has increasingly skipped the complex exploit entirely and just gotten hired. Fake identities, fake resumes, and fake credentials get planted inside DeFi teams and crypto service providers as remote IT workers. Then they wait, gain internal access, and drain from the inside. Several 2024 and 2025 incidents have exposed this playbook explicitly.

Infrastructure overlap: Shared IP ranges, shared hosting providers, shared wallet clustering patterns, shared bridge pathways. The forensic case is rarely based on any single data point. It’s always multi-vector.

No major Lazarus attribution has been credibly debunked in years. This is worth sitting with for a moment.

The limits of the scapegoat theory

Here’s where the nuance matters. Lazarus is absolutely real, but they aren’t omnipresent. Plenty of platforms quietly use “nation-state actor” framing to shield themselves from harder conversations.

The incentive structures are obvious once you look at them:

Deflecting investor panic: A nation-state attack sounds like an unforeseeable act of war. This framing softens the blow for furious investors and venture backers far more than “we got phished.”

Masking inside jobs: In an unregulated environment, exit scams and insider threats happen more often than anyone wants to admit. Blaming North Korea is a tidy way to cover that up when the dust settles.

Hiding basic incompetence: Many hacks still happen through phishing emails or sloppy multisig management. “An employee clicked a fake recruiter link” is a hard line to include in a Series B announcement.

Do the math. Of the roughly $3.4 billion stolen across the crypto industry in 2025, about $1.38 billion was stolen by non-DPRK actors. Script kiddies, Russian syndicates, Chinese money-laundering networks, disgruntled insiders, and plain old opportunistic criminals. So when a protocol reflexively blames Lazarus for every incident, the statistics simply don’t back it up.

The correct posture is somewhere in the middle. Lazarus dominates the nine and ten-figure heists. They don’t dominate the small-wallet drains, the random oracle exploits, the insider rug pulls, or the code-logic bugs that make up the majority of DeFi’s incident count. Those belong to independents, opportunists, and in some cases, the teams themselves.

April 2026: Two textbook Lazarus attacks

The two April mega-hits are almost perfect case studies of how Lazarus operates in 2026.

Drift Protocol was drained of $285 million on April 1 following a six-month social engineering campaign targeting its Security Council. There was no code exploit or smart contract vulnerability—just a patient, coordinated operation that compromised individuals with administrative access. Elliptic, TRM Labs, and Chainalysis independently identified DPRK-linked indicators within days.

KelpDAO was exploited on April 18 for another $290–$292 million through an attack on LayerZero’s Decentralized Verifier Networks. The exploit combined RPC node poisoning with DDoS pressure on the DVNs, enabling forged cross-chain messages to drain rsETH. LayerZero attributed the attack to TraderTraitor, a known Lazarus subgroup.

Both attacks highlight what the group has evolved into. It has moved past pure code exploitation into operational warfare. Human weak points, infrastructure manipulation, and patient multi-month campaigns. This is a completely different threat profile from what the DeFi industry was built to defend against.

What it means going forward

North Korea treats crypto as an industrial-scale revenue stream for a sanctioned regime. This framing matters because it means Lazarus is not slowing down. If anything, the April 2026 escalation suggests the opposite.

For protocols, the defensive playbook has to shift. Multi-DVN verification. Hardware-isolated multisig setups. Mandatory social engineering drills for anyone with admin access. Red-team simulations that assume a state actor is already inside the building, because increasingly they are. Ignoring warning signs on fake recruiters or suspicious internal PRs has now cost the industry more than $575 million in a single month.

For users, the advice is blunter. Hardware wallets are not optional anymore. Every approval needs to be verified. Every job offer in the crypto space deserves a second look, especially for developers with access to production keys.

For the industry, the recovery side is improving slightly. Faster analytics, faster sanctions, faster bounty coordination, and growing public pressure from on-chain investigators are occasionally clawing funds back. But speed is everything, and most protocols still respond to Lazarus hits like they’re responding to a conventional DeFi exploit. This gap is where billions are still bleeding.

Bottom line

The Lazarus Group is neither a myth nor a universal excuse. It’s a documented, prolific, state-backed cyber army responsible for dozens of confirmed major crypto thefts and a verified trail of more than $7.3 billion. The table above, the April 2026 attacks, and the consistent laundering patterns remove most of the reasonable doubt.

But the next time a crypto platform gets drained and immediately points the finger at North Korea, demand the forensic proof. Look for statements independently verified by Chainalysis, Elliptic, or TRM Labs. Look for FBI or DOJ confirmation. If those aren’t in the post-mortem, the attribution probably isn’t earning its press release.

North Korea makes a perfect villain. But sloppy code, reckless operational security, and the occasional inside job are still the crypto industry’s real everyday enemies. Recognizing both realities at once is the only honest way forward.

Data cross-verified against the 2026 Chainalysis Crypto Crime Report, FBI and DOJ releases, LayerZero and Drift Protocol statements, Elliptic and TRM Labs forensics, and primary blockchain sources. All figures current as of April 21, 2026.

Also Read: KelpDAO’s Vulnerability Was Flagged 15 Months Ago — DeFi Failed to Act

Disclaimer: The information researched and reported by The Crypto Times is for informational purposes only and is not a substitute for professional financial advice. Investing in crypto assets involves significant risk due to market volatility. Always Do Your Own Research (DYOR) and consult with a qualified Financial Advisor before making any investment decisions.

Follow The Crypto Times on Google News to Stay Updated!      Google News
Google News Banner

TAGGED:Crypto Hack
Share This Article
Whatsapp Whatsapp LinkedIn Telegram Copy Link
Shubham Soni Crypto Content Editor
By Shubham Soni
Follow:
Shubham Soni is a veteran content editor and journalist with over three years of experience leading digital editorial strategies across the U.S. and Indian markets. With a background in high-pressure newsrooms, Shubham specializes in the rigorous fact-checking, structural editing, and narrative development of complex news and explainers. Throughout his career at prominent digital publications like Sportskeeda and Opoyi, he has managed fast-paced desks covering global politics, sports, and entertainment. His expertise lies in transforming technical information into accessible, high-impact reporting while maintaining strict adherence to editorial ethics and accuracy. At The Crypto Times, Shubham oversees the editorial workflow, mentoring writers to ensure all cryptocurrency research and analysis meets the highest standards of clarity and journalistic integrity.

Join Our Newsletter

Subscribe to get latest crypto news!

    ​

    Built with Kit

    Latest News

    Coinbase Share Rally to $220 Stalls as CLARITY Act Hits April Roadblock
    Coinbase Share Rally to $220 Stalls as CLARITY Act Hits April Roadblock
    Coinbase Paper Maps Quantum Threats to Blockchain Security
    Coinbase Paper Maps Quantum Threats to Blockchain Security
    Coinbase Strengthens India Presence With USDC-INR Launch
    Coinbase Strengthens India Presence With USDC-INR Launch
    New York AG Files Lawsuit Against Coinbase, Gemini Over Betting Claims
    New York AG Files Lawsuit Against Coinbase, Gemini Over Betting Claims
    UK Eyes Unified Framework for Stablecoins and Tokenized Deposits
    UK Eyes Unified Framework for Stablecoins and Tokenized Deposits

    Find Us on Socials

    Ad image

    You may also like

    Ledger CTO: Arbitrum Freeze Exposes L2 Control After KelpDAO Hack

    Ledger CTO: Arbitrum Freeze Exposes L2 Control After KelpDAO Hack

    A $292 Million Wake-Up Call: Inside KelpDAO Hack That Exposed DeFi’s Fragility

    A $292 Million Wake-Up Call: Inside KelpDAO Hack That Exposed DeFi’s Fragility

    Arbitrum Freezes KelpDAO Hacker’s $71M But Sparks Debate on Centralization

    Arbitrum Freezes KelpDAO Hacker’s $71M But Sparks Debate on Centralization 

    Ice Open Network Breach Exposes User Data in Third-Party Hack

    Ice Open Network Breach Exposes User Data in Third-Party Hack

    The Crypto Times Logo PNG

    Providing real-time, accurate Crypto reporting. Your trusted source for Crypto News and Research.

    Stay Updated

    All News
    Exclusive
    Opinions
    Learn
    Podcasts

    Company

    About Us
    Our Authors
    Editorial Policy
    AI Policy
    Advertorial Policy

    Get In Touch

    Contact Us
    Career

    Find Us on Socials

    X-twitter Linkedin Telegram Youtube Instagram

    © 2026 The Crypto Times | A BITROCK TECHNOLOGIES L.L.C. Company.

    DMCA.com Protection Status
    • Terms and Conditions
    • Disclaimer
    • Privacy Policy
    • Cookie policy
    Do Not Sell or Share My Personal Information