North Korea doesn’t need to mine Bitcoin. It steals it. And then it turns that digital theft into real cash-dollars, euros, yuan-to fund missiles, nukes, and military drills. Between 2017 and 2025, state-backed hackers have ripped off over $3 billion in cryptocurrency. That’s not small-time hacking. That’s a full-scale, high-tech financial warfare operation. And it’s working.
The Theft Is Just Step One
Getting the crypto is the easy part. North Korean groups like Lazarus and Kimsuky don’t break into vaults. They phish employees, exploit software bugs, and hijack smart contracts. In February 2025, they pulled off the biggest crypto heist in history: $1.5 billion from Bybit. They didn’t vanish with the money. They moved it-fast. Within 72 hours, 87% of the stolen Ethereum was converted to Bitcoin. Why? Because Bitcoin is the most liquid, hardest-to-trace digital asset out there. It’s the Swiss bank account of crypto. Once it’s in Bitcoin, the real work begins: turning it into cash you can hold in your hand.The Laundering Machine: Cross-Chain Chaos
North Korea doesn’t use old-school mixers like Tornado Cash anymore. Those got shut down in 2022 after being used for over $1.2 billion in stolen funds. Now, they use something smarter: cross-chain bridges. They take stolen ETH, send it through Avalanche Bridge, then Ren Bridge, then wrap it into Solana tokens. Each transfer changes the blockchain trail. By the time the money hits Bitcoin again, it’s passed through three or four networks. A 2025 CSIS report found that 73% of North Korean-linked crypto flows through at least three blockchains before cash-out. It’s like shuffling a deck of cards while the cops are watching-except they’re shuffling 500 times a day. This flood-the-zone tactic overwhelms analysts. Blockchain forensics tools can track one transaction. But when you’re dealing with 400+ rapid-fire moves per day, the system starts to glitch. Even the best tools can’t catch everything.Bitcoin: The Middleman
Bitcoin isn’t the final goal. It’s the bridge. Why? Because it’s the most accepted digital asset globally. Exchanges everywhere know Bitcoin. Few know obscure tokens. So North Korea converts everything into BTC first. Then, they break it into tiny pieces. After the Atomic Wallet hack in June 2023, hackers moved $100 million through 1,842 separate transactions-all under $10,000. That’s no accident. In most countries, banks must report cash transactions over $10,000. By staying under that limit, they avoid red flags. They turn one big theft into thousands of tiny, clean-looking deposits.
The Final Step: Cambodia and Crypto Cafes
All this tech means nothing without a place to turn crypto into cash. That’s where Cambodia comes in. Sihanoukville, a coastal city once known for beaches and backpackers, is now a crypto laundering hub. As of March 2025, the U.S. Treasury confirmed 14 North Korean-run “crypto cafes” operating there. No ID needed. No questions asked. You walk in with a wallet address. They give you cash. That’s it. One of these cafes processes up to $2 million a month. The money comes from hackers halfway across the world. The cash goes to North Korean military accounts. The operators? Often IT workers sent abroad under fake Vietnamese or Indian passports. They’re not criminals-they’re soldiers. Trained in computer science, deployed like spies. China and Macau still play roles too. Chinese banks with weak oversight have processed over $250 million in stolen crypto since 2021. Macau casinos accept crypto deposits with only 5% identity checks-compared to 95% at regulated exchanges. That’s a gaping hole.The Human Network: IT Workers as Frontlines
North Korea doesn’t just hack. It hires. The UN estimates the regime has over 5,000 IT workers living abroad, mostly in China, Russia, and Southeast Asia. They work remotely for fake tech companies. They’re programmers, customer support reps, even blockchain auditors. But they’re not really working for those companies. They’re planting backdoors. In 2024, CSIS documented 27 cases where North Korean employees at Chinese exchanges created hidden pathways to move stolen crypto directly to bank accounts-with only 12 hours of warning before the transfer. Standard fraud systems take 72 hours to trigger. By then, the money’s gone. These workers use VPNs to make it look like they’re in the U.S. or Germany. Their laptops are clean. Their identities are forged. They’re the human layer that makes the digital theft possible.
I'm a blockchain analyst and crypto educator who builds research-backed content for traders and newcomers. I publish deep dives on emerging coins, dissect exchange mechanics, and curate legitimate airdrop opportunities. Previously I led token economics at a fintech startup and now consult for Web3 projects. I turn complex on-chain data into clear, actionable insights.