{"id":48376,"date":"2022-09-09T15:12:16","date_gmt":"2022-09-09T15:12:16","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/33822\/Feds-Claw-Back-30-Million-Of-Cryptocurrency-Stolen-By-North-Korean-Hackers.html"},"modified":"2022-09-09T15:12:16","modified_gmt":"2022-09-09T15:12:16","slug":"feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/","title":{"rendered":"Feds Claw Back $30 Million Of Cryptocurrency Stolen By North Korean Hackers"},"content":{"rendered":"<figure class=\"intro-image intro-left\"> <img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/09\/cryptocurrency-heist-800x560.jpg\" alt=\"Feds claw back $30 million of cryptocurrency stolen by North Korean hackers\"><figcaption class=\"caption\">\n<div class=\"caption-credit\">Getty Images<\/div>\n<\/figcaption><\/figure>\n<aside id=\"social-left\" class=\"social-left\" aria-label=\"Read the comments or share this article\"> <a title=\"59 posters participating\" class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/information-technology\/2022\/09\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/?comments=1\"> <\/p>\n<h4 class=\"comment-count-before\">reader comments<\/h4>\n<p> <span class=\"comment-count-number\">73<\/span> <span class=\"visually-hidden\"> with 59 posters participating<\/span> <\/a> <\/p>\n<div class=\"share-links\">\n<h4>Share this story<\/h4>\n<\/p><\/div>\n<\/aside>\n<p> <!-- cache hit 36:single\/related:c484839b2adc7c6a621b3db2d0b53421 --><!-- empty --><\/p>\n<p>Cryptocurrency analytics firm Chainalysis said on Thursday that it helped the US government seize $30 million worth of digital coins that North Korean-backed hackers stole earlier this year from the developer of the non-fungible token-based game <em>Axie Infinite<\/em>.<\/p>\n<p>When accounting for the more than 50 percent fall in cryptocurrency prices since the theft occurred <a href=\"%E2%80%8B%E2%80%8Bhttps:\/\/arstechnica.com\/gaming\/2022\/03\/how-did-a-hacker-steal-over-600-million-from-a-crypto-gaming-blockchain\/\">in March<\/a>, the seizure represents only about 12 percent of the total funds stolen. The people who pulled off the heist transferred 173,600 ethereum worth about $594 million at the time and $25.5 million in USDC stablecoin, making it one of the biggest cryptocurrency thefts ever.<\/p>\n<h2>Harder to hide<\/h2>\n<p>The seizures &#8220;demonstrate that it is becoming more difficult for bad actors to successfully cash out their ill-gotten crypto gains,\u201d Erin Plante, senior director of investigations at&nbsp;Chainalysis, <a href=\"https:\/\/blog.chainalysis.com\/reports\/axie-infinity-ronin-bridge-dprk-hack-seizure\/\">wrote<\/a>. \u201cWe have proven that with the right blockchain analysis tools, world-class investigators and compliance professionals can collaborate to stop even the most sophisticated hackers and launderers.\u201d<\/p>\n<p>The FBI <a href=\"https:\/\/home.treasury.gov\/policy-issues\/financial-sanctions\/recent-actions\/20220414\">attributed<\/a> the theft to Lazarus, the name used to track a hacking group backed by and working on behalf of the North Korean government. According to <em>Axie Infinity<\/em> developer Sky Mavis, the hackers pulled off the transfers after gaining access to five of nine private keys held by transaction validators for the Ronin Networks cross-bridge, a dedicated blockchain for the game.<\/p>\n<p>The hackers then initiated an elaborate laundering process that involved transferring funds to more than 12,000 different currency addresses in an attempt to obfuscate the stolen coins&#8217; movement.<\/p>\n<p>In Thursday\u2019s post, Plante wrote:<\/p>\n<aside class=\"ad_wrapper\" aria-label=\"In Content advertisement\"> <span class=\"ad_notice\">Advertisement <\/span> <\/aside>\n<blockquote>\n<p>North Korea\u2019s typical DeFi laundering technique has roughly five stages:<\/p>\n<ol>\n<li aria-level=\"1\"><span>Stolen Ether sent to intermediary wallets<\/span><\/li>\n<li aria-level=\"1\"><span>Ether mixed in batches using <\/span><a href=\"https:\/\/blog.chainalysis.com\/reports\/tornado-cash-sanctions-challenges\/\"><span>Tornado Cash<\/span><\/a><\/li>\n<li aria-level=\"1\"><span>Ether swapped for bitcoin<\/span><\/li>\n<li aria-level=\"1\"><span>Bitcoin mixed in batches<\/span><\/li>\n<li aria-level=\"1\"><span>Bitcoin deposited to crypto-to-fiat services for cashout<\/span><\/li>\n<\/ol>\n<\/blockquote>\n<figure class=\"image shortcode-img center large\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/09\/ronin-stolen-funds.png\" class=\"enlarge\" data-height=\"1536\" data-width=\"1144\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/09\/ronin-stolen-funds-640x859.png\" width=\"640\" height=\"859\" srcset=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/09\/ronin-stolen-funds.png 2x\"><\/a><figcaption class=\"caption\">\n<div class=\"caption-credit\">Chainalysis<\/div>\n<\/figcaption><\/figure>\n<p>Last month, the US Treasury Department <a href=\"https:\/\/arstechnica.com\/tech-policy\/2022\/08\/us-bans-transactions-on-crypto-system-that-some-used-for-money-laundering\/\">sanctioned<\/a> the virtual currency mixer Tornado Cash after finding it has been used to launder more than $7 billion worth of virtual currency since its creation in 2019. $455 million of that sum was connected to the heist against <em>Axie Infinity<\/em>.<\/p>\n<p>Plante continued:<\/p>\n<blockquote>\n<p>Since then, Lazarus Group has moved away from the popular Ethereum mixer, instead leveraging DeFi services to chain hop, or switch between several different kinds of cryptocurrencies in a single transaction. Bridges serve an important function to move digital assets between chains and most usage of these platforms is completely legitimate. Lazarus appears to be using bridges in an attempt to obscure source of funds. With Chainalysis tools these cross chain funds movements are easily traced.<\/p>\n<p>We can use Chainalysis Storyline to see an example of how Lazarus Group utilized chain-hopping to launder some of the funds stolen from <em>Axie Infinity<\/em>:<\/p>\n<figure class=\"image shortcode-img center large\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/09\/storyline-axie-image.png\" class=\"enlarge\" data-height=\"390\" data-width=\"1024\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/09\/storyline-axie-image-640x244.png\" width=\"640\" height=\"244\" srcset=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/09\/storyline-axie-image.png 2x\"><\/a><figcaption class=\"caption\">\n<div class=\"caption-credit\">Chainalysis<\/div>\n<\/figcaption><\/figure>\n<p>Above, we see that the hacker bridged ETH from the Ethereum blockchain to the BNB chain and then swapped that ETH for USDD, which was then bridged to the BitTorrent chain. Lazarus Group carried out hundreds of similar transactions across several blockchains to launder the funds they stole from <em>Axie Infinity<\/em>, in addition to the more conventional Tornado Cash-based laundering we covered above.<\/p>\n<\/blockquote>\n<p>On Twitter, Ronin Networks <a href=\"https:\/\/twitter.com\/Ronin_Network\/status\/1567925016465129474\">said<\/a>, \u201cIt will take some time for these funds to be returned to the Treasury.\u201d Plante said that much of the stolen funds remains in wallets under the hackers\u2019 control. \u201cWe look forward to continuing to work with the cryptocurrency ecosystem to prevent them and other illicit actors from cashing out their funds.\u201d<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/33822\/Feds-Claw-Back-30-Million-Of-Cryptocurrency-Stolen-By-North-Korean-Hackers.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":48377,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[10189],"class_list":["post-48376","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinehackergovernmentusacyberwarkoreafbicryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Feds Claw Back $30 Million Of Cryptocurrency Stolen By North Korean Hackers 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Feds Claw Back $30 Million Of Cryptocurrency Stolen By North Korean Hackers 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-09T15:12:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/09\/cryptocurrency-heist-800x560.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Feds Claw Back $30 Million Of Cryptocurrency Stolen By North Korean Hackers\",\"datePublished\":\"2022-09-09T15:12:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/\"},\"wordCount\":582,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/09\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers.jpg\",\"keywords\":[\"headline,hacker,government,usa,cyberwar,korea,fbi,cryptography\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/\",\"name\":\"Feds Claw Back $30 Million Of Cryptocurrency Stolen By North Korean Hackers 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/09\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers.jpg\",\"datePublished\":\"2022-09-09T15:12:16+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/09\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/09\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers.jpg\",\"width\":800,\"height\":560},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,government,usa,cyberwar,korea,fbi,cryptography\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentusacyberwarkoreafbicryptography\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Feds Claw Back $30 Million Of Cryptocurrency Stolen By North Korean Hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Feds Claw Back $30 Million Of Cryptocurrency Stolen By North Korean Hackers 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/","og_locale":"en_US","og_type":"article","og_title":"Feds Claw Back $30 Million Of Cryptocurrency Stolen By North Korean Hackers 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-09-09T15:12:16+00:00","og_image":[{"url":"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/09\/cryptocurrency-heist-800x560.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Feds Claw Back $30 Million Of Cryptocurrency Stolen By North Korean Hackers","datePublished":"2022-09-09T15:12:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/"},"wordCount":582,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/09\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers.jpg","keywords":["headline,hacker,government,usa,cyberwar,korea,fbi,cryptography"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/","url":"https:\/\/www.threatshub.org\/blog\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/","name":"Feds Claw Back $30 Million Of Cryptocurrency Stolen By North Korean Hackers 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/09\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers.jpg","datePublished":"2022-09-09T15:12:16+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/09\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/09\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers.jpg","width":800,"height":560},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/feds-claw-back-30-million-of-cryptocurrency-stolen-by-north-korean-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,government,usa,cyberwar,korea,fbi,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentusacyberwarkoreafbicryptography\/"},{"@type":"ListItem","position":3,"name":"Feds Claw Back $30 Million Of Cryptocurrency Stolen By North Korean Hackers"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48376","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48376"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48376\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/48377"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48376"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48376"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48376"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}