By Josh Smith
SEOUL, Jan 14 (Reuters) - North Korea launched at least seven attacks on cryptocurrency platforms that extracted nearly $400 million worth of digital assets last year, one of its most successful years on record, blockchain analysis firm Chainalysis said in a new report.
"From 2020 to 2021, the number of North Korean-linked hacks jumped from four to seven, and the value extracted from these hacks grew by 40%," said the report, which was released on Thursday.
"Once North Korea gained custody of the funds, they began a careful laundering process to cover up and cash out," the report added.
A United Nations panel of experts that monitors sanctions on North Korea has accused https://www.reuters.com/article/us-northkorea-sanctions-cyber-idUSKBN2AA00Q Pyongyang of using stolen funds to support its nuclear and ballistic missile programs to circumvent sanctions.
North Korea does not respond to media inquiries, but has previously released statements denying allegations of hacking.
Last year the United States charged https://www.reuters.com/article/us-northkorea-cyber-idUSKBN2AH2B5 three North Korean computer programmers working for the country's intelligence service with a massive, years-long hacking spree aimed at stealing more than $1.3 billion in money and cryptocurrency, affecting companies from banks to Hollywood movie studios.
Chainalysis did not identify all the targets of the hacks, but said they were primarily investment firms and centralized exchanges, including Liquid.com, which announced in August that an unauthorized user had gained access to some of the cryptocurrency wallets it managed.
The attackers used phishing lures, code exploits, malware, and advanced social engineering to siphon funds out of these organizations' internet-connected 'hot' wallets into North Korea-controlled addresses, the report said.
Many of last year's attacks were likely carried out by the Lazarus Group, a hacking group sanctioned https://www.reuters.com/article/uk-northkorea-usa-sanctions-idUKKCN1VY1RM by the United States, which says it is controlled by the Reconnaissance General Bureau, North Korea's primary intelligence bureau.
The group has been accused of involvement in the "WannaCry" ransomware attacks, hacking of international banks and customer accounts, and the 2014 cyber-attacks on Sony Pictures Entertainment.
North Korea also appeared to step up efforts to launder stolen cryptocurrency, significantly increasing its use of mixers, or software tools that pool and scramble cryptocurrencies from thousands of addresses, Chainalysis said.
The report said researchers had identified $170 million in old, unlaundered cryptocurrency holdings from 49 separate hacks spanning from 2017 to 2021.
The report said it is unclear why the hackers would still be sitting on these funds, but said they could be hoping to outwit law enforcement interest before cashing out.
"Whatever the reason may be, the length of time that (North Korea) is willing to hold on to these funds is illuminating, because it suggests a careful plan, not a desperate and hasty one," Chainalysis concluded. (Reporting by Josh Smith Editing by Shri Navaratnam)
Our Standards: The Thomson Reuters Trust Principles.