A hacker associated with the Democratic Republic of Korea (DPRK) reportedly lost 46,300 XRP worth around $121,000 after committing a dollar tissue error while trading cryptocurrency. The incident, which took place around 14:04 UTC on February 4, 2025, was identified by Crypto Security Sleuth ZachxBT on his telegram channel.
According to ZachxBT, accounts linked to DPRK exploits are Try it Deposited stolen XRP on OKX Crypto Exchange, but could not include a critical component: destination tag.
Destination tags, primarily called user IDs, help with crypto exchanges identify recipients of cryptocurrency transactions, especially those that handle large amounts of transfers. Without this identifier, the exchange cannot determine which account the funds should be deposited into. In this case, DPRK sent XRP to OKX without including the destination tag.
DPRK loses thousands of XRP
The lost XRP is believed to have been stolen in a previous hack, part of DPRK’s strategy to fund businesses using cyberattacks. Blockchain Transactions data The address shows 13:43 UTC, where funds were received early today. Two hours before the error occurred, the exploiter had successfully completed 18 transactions, all of which had over 40,000 XRP.
On the XRP Explorer transaction details page, OKX admitted that it received the funds but was not assigned to a particular user. Without the tag, the crypto trading platform had no way of knowing which account 46,363.3 XRP belonged to and asked the “sender” to contact customer care to resolve the issue.
North Korea has long been accused of adjusting cryptocurrency robberies to bypass international sanctions and funding its administration. Over the years, hacking groups in countries such as the infamous Lazarus Group have accumulated billions of stolen digital assets, targeting exchanges, wallets and decentralized finance (DEFI) platforms.
DPRK continues its crypto hacking trend
According to the 2024 Chain Melting Report Quote According to Bloomberg, North Korea-related digital criminals were responsible for more than half of the $2.2 billion stolen from cryptocurrency platforms this year. Over 47 incidents, these groups have spent $1.34 billion, more than doubled the $660.5 million stolen in 20 incidents throughout 2023.
As ZachxBT revealed, one of the tactics these hackers are employing includes remote work opportunities. Spoofing IT experts, these cybercriminals access sensitive data and their own systems within major companies, use their time at the company to leak data to accomplices, and ultimately prepare the company. will be abolished.
1/A team recently reached out to me after $1.3 million was stolen from the Treasury after a malicious code was pushed.
Without the team knowing, they hired multiple DPRK IT workers as developers using fake identities.
Next, I discovered over 25 crypto projects on pic.twitter.com/w7sgy97rd8
– Zachxbt (@zachxbt) August 15, 2024
Additionally, hackers linked to North Korean reconnaissance generals have created fake employment websites to capture unsuspecting users. These sites collect confidential information from downloaded malicious software and expand the Lazarus Group’s criminal reach.
On December 12, the US Department of Justice indicted 14 North Korean citizens for fraud and money laundering. Prosecutors allege that these citizens posed to employ IT workers remotely in American companies. Ultimately, they won over $88 million through data theft and fearful tor schemes.
Cryptopolitan Academy: Are you making mistakes in these Web3 resumes? – Please see here
Discover more from Earlybirds Invest
Subscribe to get the latest posts sent to your email.