North Korean hackers have lost more than $700,000 in trading on Hyperliquid. Are they preparing to hack the platform?

_Marked addresses linked to North Korean hackers have reportedly engaged in trading activities on Hyperliquid, resulting in losses of more than $700,000. The trading activities have stirred concerns within the crypto community, with some speculating that these actions may signal North Korean hackers testing Hyperliquid’s systems for vulnerabilities.

As reported by Chinese correspondent Colin Wu, Tayvano, a crypto enthusiast on X, has warned the Hyperliquid team of an imminent threat, saying the Democratic People’s Republic of Korea (DPRK) “does not trade; it tests.”

Hyperliquid (HYPE) recently hit the $11 billion trading volume mark, fueled by its recent airdrop event. Analysts are optimistic the token will surge past its recent highs of $35.02. However, recent activities from DPRK hackers have the community a little worried.

Expert offers to help Hyperliquid ‘mitigate imminent threat’

Just two weeks ago, crypto KOL Tayvano reached out to Hyperliquid, offering insights and assistance to counter the perceived risks. In a letter to the crypto project, Tayvano highlighted the dangers posed by the familiarity North Korean hackers have with Hyperliquid’s platform.

North Korean hackers have lost more than $700,000 in trading on Hyperliquid. Are they preparing to hack the platform?
Source: X

“I would like to walk you through some of the measures that your team can and should take to mitigate risk of a sophisticated attack,” Tayvano wrote. The letter further emphasized the evolving tactics of DPRK hackers, describing them as “creative, persistent, and highly sophisticated,” with access to zero-day vulnerabilities, such as those recently patched by Chrome.

Tayvano proposed an open communication channel between Hyperliquid and security experts to share updates and countermeasures effectively, aiming to prevent the platform from becoming a high-profile target.

DPRK hacks dominate 2024 crypto theft

According to a Chainalysis report, North Korean state-sponsored hackers stole an estimated $1.34 billion in cryptocurrency in 2024 alone, accounting for more than half of all crypto-related thefts this year. The frequency and scale of the attacks have intensified, with the hackers targeting a wider range of organizations.

Notably, DPRK-linked exploits yielding profits of $50 to $100 million—or more—occurred significantly more often this year compared to 2023. Chainalysis attributes this trend to the hackers’ growing expertise in executing massive exploits.

In addition to large-scale thefts, DPRK hackers have also conducted smaller attacks, pulling in as little as $10,000. These activities showcase their ability to target both high-value entities and smaller-scale opportunities.

The rise in DPRK cyber activities has also been linked to North Korean IT workers infiltrating crypto and Web3 companies. Using sophisticated tactics such as false identities, third-party hiring intermediaries, and exploiting remote work opportunities, these individuals have compromised networks and stolen proprietary information.

One notable case involved the U.S. Department of Justice (DOJ) indicting 14 North Korean nationals accused of posing as remote IT workers at U.S. companies. These individuals reportedly stole more than $88 million through extortion and data theft.

Sanctions and blacklists: Something for the pain?

As international efforts to disrupt North Korea’s illicit activities continue, countries are now joining hands to break the chain of attacks the DPRK is executing. A collaboration between the US and the United Arab Emirates (UAE) recently led to the disruption of a DPRK money-laundering network. 

According to the US Treasury’s Office of Foreign Assets Control (OFAC), two Chinese nationals and their UAE-based shell company, Green Alpine Trading LLC, were sanctioned for laundering millions of dollars in cryptocurrency for North Korea.

The duo reportedly funneled funds for Sim Hyon-Sop, a sanctioned representative of the Korea Kwangson Banking Corporation (KKBC), who is wanted by the FBI. Sop is known for establishing complex financial pipelines to support North Korea’s weapons programs.

OFAC’s sanctions freeze all US owned assets linked to the Chinese nationals and Green Alpine Trading LLC, effectively blacklisting them from global financial systems. The agency warns that financial institutions interacting with these entities may face additional penalties.

The sanctions are part of broader efforts to curb North Korea’s ability to finance its weapons of mass destruction (WMD) and ballistic missile programs through illicit means, including crypto theft and money laundering operations.

A Step-By-Step System To Launching Your Web3 Career and Landing High-Paying Crypto Jobs in 90 Days.

Source: https://www.cryptopolitan.com/north-korean-hackers-lose-700k-hyperliquid/