North Korea Hackers Crossed $6B in Crypto Theft — 76% of 2026 Losses From Two Bridge Attacks: TRM

TRM Labs put North Korea's cumulative crypto theft above $6 billion since 2017 — with two April incidents at KelpDAO ($292M) and Drift Protocol ($285M) accounting for 76% of 2026 losses across just 3% of incidents.

Abstract red-amber alert beacon over cracked digital chain links, conveying coordinated state-level crypto theft.
Pyongyang's share of crypto-hack losses has climbed every year since 2020 — 2026 is on a different curve.

TRM Labs published its April 2026 hack accounting on April 30, and the headline number is the kind that resets industry assumptions: cumulative crypto theft attributable to North Korea-linked groups has crossed $6 billion since 2017, and Pyongyang now accounts for 76% of all 2026 hack losses through April — across just 3% of total incidents. Two April attacks did the work: a $292 million exploit of KelpDAO and a $285 million theft from Drift Protocol, totaling $577 million in a single month.

What actually happened — KelpDAO and Drift

The two attacks share a state-actor profile but used very different vectors. KelpDAO was hit through a single-verifier design in a LayerZero bridge: attackers compromised RPC infrastructure and manipulated cross-chain validation logic to mint or release funds against forged messages. The laundering phase was unusually fast, with stolen ETH cross-chain-swapped to BTC via THORChain and the Bitcoin layer handed off to Chinese intermediaries — a pattern TRM has been mapping for months. Drift Protocol, by contrast, was a social-engineering long-game: TRM analysts described months of in-person meetings between North Korean proxies and Drift employees, a tactic the firm called potentially unprecedented in DPRK's lengthy crypto-hacking campaign. The Drift exploit relied on operationally placed insiders rather than a code-level bug, which makes it a much harder class of attack to defend against with audits.

The trend line is what matters

North Korea's share of total annual crypto-hack losses has climbed in a near-straight line: under 10% in 2020 and 2021, 22% in 2022, 37% in 2023, 39% in 2024, 64% in 2025, and 76% through April 2026. The 2026 figure is the highest sustained share TRM has ever recorded. The mechanism for the climb is twofold: DPRK groups have invested in operational tradecraft (Lazarus, APT38, the broader cluster) at a level no other state or criminal group matches, and the rest of the industry has gotten meaningfully better at preventing run-of-the-mill exploits — meaning when a major theft does occur, the actor behind it is increasingly likely to be Pyongyang. The cumulative $6B figure includes Ronin ($625M, 2022), Atomic Wallet ($100M, 2023), DMM Bitcoin ($305M, 2024), Bybit ($1.46B, 2025), and now KelpDAO + Drift.

The defensive surface that has to change

Three concrete shifts are implied by this report. First, bridge architecture: single-verifier or low-quorum designs (LayerZero in some configurations, but also any unmonitored multi-sig) need to be retired in favor of zero-knowledge or higher-quorum proofs; KelpDAO is the seventh bridge-class incident in two years. Second, insider screening: the Drift in-person model means traditional KYC and remote-employee verification are no longer sufficient; protocols handling more than $100M in TVL should treat key technical hires the way intelligence agencies treat cleared roles, including in-person identity confirmation and anomaly monitoring. Third, laundering response: the Bitcoin/THORChain off-ramp window is now consistently 24–72 hours; on-chain investigators need pre-built deconfliction with mining pools, OFAC sanctions partners and exchange compliance teams to interdict at scale. The current state of all three is not adequate.

The historical climb in DPRK's share of crypto theft

The numbers tell a clean story when laid out year by year. 2020 and 2021: under 10% of total crypto-hack losses attributable to North Korea. 2022: 22%, the year of the Ronin bridge ($625M) and Harmony bridge ($100M) attacks. 2023: 37%, with multiple Atomic Wallet, CoinEx and Stake.com incidents. 2024: 39%, including the DMM Bitcoin theft ($305M). 2025: 64%, anchored by the Bybit hack ($1.46B), the largest single crypto theft on record. 2026 through April: 76%, on KelpDAO ($292M) and Drift Protocol ($285M).

What the curve does not capture is the operational asymmetry. The same TRM data set shows non-DPRK actors are responsible for roughly 97% of incidents but only 24% of dollar losses in 2026 — meaning ordinary attackers continue to ply low-yield DeFi exploits while a single state actor is responsible for nearly every catastrophic-scale event. The implication for defenders is structural: incident-response capability needs to be calibrated for state-grade adversaries, not for the long tail of opportunistic exploits. Most protocol security budgets are still calibrated for the latter; the gap is widening, and the market has not yet repriced.

What to Watch

Three indicators over the next 60 days. OFAC/Treasury action: a public sanctions update naming addresses or intermediaries from KelpDAO/Drift would signal U.S. willingness to escalate beyond past designations. Insurance repricing: DeFi protocol insurance premiums (Nexus Mutual, Sherlock) are the cleanest market signal; another 20–30% premium hike is the implied response. Bridge migrations: announcements from Ethereum L2s and Solana ecosystem teams to deprecate single-verifier bridges in favor of ZK or multi-prover designs. Watch trmlabs.com/insights and OFAC SDN updates for confirmation.

North Korea Stole 76% of All Crypto Hack Value in 2026 — With Just Two Attacks
TRM Labs' own breakdown of the KelpDAO and Drift Protocol attacks, the laundering pathway, and the historical share trend.
North Korea Linked To More Than Three Quarters Of All Crypto Losses In 2026; Two Hacks Drain $577M
IBTimes contextualizes the $577M April losses and the year-over-year share increase from 64% to 76%.

Daily Web3 × AI intel, straight to your inbox. Subscribe to BlockAI News.

How we report: This article cites primary sources, regulatory filings, and on-chain data where available. BlockAI News uses AI tools to assist with research and first-draft generation; every article is reviewed and edited by a human editor before publication. Read our full How We Report page, Editorial Policy, AI Use Policy, and Corrections Policy.

Keep Reading

SWEAT Loses Control of 65% of Supply for 30 Seconds — and Wins It All Back Within Hours

SWEAT Loses Control of 65% of Supply for 30 Seconds — and Wins It All Back Within Hours

An attacker exploited a vulnerability in the SWEAT token contract on the Near Protocol at approximately 13:36 UTC on April 30, 2026, draining funds from the top 100 SWEAT holder accounts in a coordinated 30-second window. At the peak of the attack, the exploiter controlled roughly 13.71 billion SWEAT — about 65% of total supply, worth approximately $3.5 million at the time. By end of day, the SWEAT team had reversed virtually all damage. The post-incident outcome was the rare case in DeFi

Read full story →

Stay Ahead of the Market

Daily AI & crypto briefings — straight to your inbox, your phone, and your timeline.