Close Menu
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On

Toby Fox Is Releasing Deltarune Chapters 1-4 Slightly Earlier Than Expected

9 May 2025

Five Nights at Freddy’s Dead by Daylight crossover lets you play as Springtrap for the first time

9 May 2025

Buy Now or Pay More Later? ‘Macroeconomic Uncertainty’ Has Shoppers Anxious

9 May 2025
Facebook X (Twitter) Instagram
Just In
  • Toby Fox Is Releasing Deltarune Chapters 1-4 Slightly Earlier Than Expected
  • Five Nights at Freddy’s Dead by Daylight crossover lets you play as Springtrap for the first time
  • Buy Now or Pay More Later? ‘Macroeconomic Uncertainty’ Has Shoppers Anxious
  • Samsung’s Tri-Fold Phone Tipped to Use Silicon-Carbon Battery; Could Share Features With Galaxy Z Fold 7
  • How long is Doom: The Dark Ages
  • The Best Mac Accessories to Amplify Your Workstation
  • Hubble observes a rogue black hole devouring a star
  • Review: Therm-a-Rest NeoLoft Sleeping Pad
Facebook X (Twitter) Instagram Pinterest Vimeo
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release
Subscribe
Best in TechnologyBest in Technology
Home » TraderTraitor: The Kings of the Crypto Heist
News

TraderTraitor: The Kings of the Crypto Heist

News RoomBy News Room14 April 20253 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email

On February 21, the largest crypto heist ever started to unfold. Hackers gained control of a crypto wallet belonging to the world’s second-largest cryptocurrency exchange, Bybit, and stole almost $1.5 billion of digital tokens. They quickly shunted the money between dozens of cryptocurrency wallets and services to try and obscure the activity, before starting to cash the stolen funds out.

The eye-popping digital raid had all the hallmarks of being conducted by one of North Korea’s elite subgroups of hackers. While Bybit remained solvent by borrowing cryptocurrency and launched a bounty scheme to track down the stolen funds, the FBI quickly pinned the blame on the North Korean hackers known as TraderTraitor.

Before the Bybit heist, TraderTraitor had already been linked to other high-profile cryptocurrency thefts and compromises of supply chain software.

“We were waiting for the next big thing,” says Michael Barnhart, a longtime cybersecurity researcher focused on North Korea and investigator at security firm DTEX Systems. “They didn’t go away. They didn’t try to stop. They were clearly plotting and planning—and they’re doing that now,” he says.

North Korea’s hackers—alongside those from China, Russia, and Iran—are consistently considered to be one of the most sophisticated and most dangerous cyber threats to Western democracies. While all of these countries engage in espionage and theft of sensitive data, North Korea’s cyber operations come with their own set of distinct goals: helping to fund the hermit kingdom’s nuclear programs. Increasingly, that means stealing cryptocurrency.

Over at least the past five years, the totalitarian regime of Kim Jong-un has deployed technically skilled IT workers to infiltrate companies around the world and earn wages that can be sent back to the motherland. In some cases, after being fired, those workers extort their former employers by threatening to release sensitive data. At the same time, North Korean hackers, as part of the broad umbrella Lazarus Group, have stolen billions in cryptocurrency from exchanges and companies around the world. TraderTraitor makes up one part of the wider Lazarus group, which is run out of the Reconnaissance General Bureau, the North Korean intelligence agency.

TraderTraitor—which is also referred to as Jade Sleet, Slow Pisces, and UNC4899 by security companies—is primarily interested in cryptocurrency.

“They use a variety of creative techniques to get into blockchain, cryptocurrency, anything that has to do with platforms, trading forums, all of those different things that are around cryptocurrency and decentralized finance,” says Sherrod DeGrippo, the director of threat intelligence strategy at Microsoft. “The Jade Sleet group [TraderTraitor] is one of the most sophisticated groups within that echelon,” she says.

TraderTraitor first emerged around the start of 2022, multiple cybersecurity researchers say, and is likely an offshoot of the North Korean APT38 group that hacked the SWIFT financial system and attempted to steal $1 billion from the Central Bank of Bangladesh at the start of 2016. “They walked off with very little money,” says DTEX Systems’s Barnhart. “In that moment you had a real, significant shift.”

Barnhart says North Korea realized that relying on other people—such as money mules—could make their operations less effective. Instead, they could steal cryptocurrency. Two groups emerged from that tactical shift, Barnhart says, CryptoCore and TraderTraitor. “TraderTraitor is the most sophisticated of all,” he says. “And why? Because APT38 was the A team.”

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleXiaomi 16 Said to Launch by the End of This Year; Tipped to Pack Larger Battery Than Xiaomi 15
Next Article New poster, tickets on sale for Star Wars: Revenge of the Sith 20th anniversary

Related Articles

News

Five Nights at Freddy’s Dead by Daylight crossover lets you play as Springtrap for the first time

9 May 2025
News

Buy Now or Pay More Later? ‘Macroeconomic Uncertainty’ Has Shoppers Anxious

9 May 2025
News

How long is Doom: The Dark Ages

9 May 2025
News

The Best Mac Accessories to Amplify Your Workstation

9 May 2025
News

Hubble observes a rogue black hole devouring a star

9 May 2025
News

Review: Therm-a-Rest NeoLoft Sleeping Pad

9 May 2025
Demo
Top Articles

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202493 Views

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 202482 Views

5 laptops to buy instead of the M4 MacBook Pro

17 November 202457 Views

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Latest News
News

The Best Mac Accessories to Amplify Your Workstation

News Room9 May 2025
News

Hubble observes a rogue black hole devouring a star

News Room9 May 2025
News

Review: Therm-a-Rest NeoLoft Sleeping Pad

News Room9 May 2025
Most Popular

The Spectacular Burnout of a Solar Panel Salesman

13 January 2025118 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202493 Views

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 202482 Views
Our Picks

Samsung’s Tri-Fold Phone Tipped to Use Silicon-Carbon Battery; Could Share Features With Galaxy Z Fold 7

9 May 2025

How long is Doom: The Dark Ages

9 May 2025

The Best Mac Accessories to Amplify Your Workstation

9 May 2025

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Facebook X (Twitter) Instagram Pinterest
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2025 Best in Technology. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.