Crypto Heists Hit Record High in H1 2025 as State-Sponsored Attacks Surge

- The first half of 2025 has seen nation-states emerge as leading crypto thieves, according to blockchain intelligence firm TRM Labs.
- H1 2025 was the worst ever start to a year when it comes to crypto theft, largely due to North Korea’s record ByBit hack, which resulted in the theft of US$1.5 billion.
Nation-states have emerged as leading perpetrators of crypto theft in the first half of 2025, according to an analysis by blockchain intelligence firm TRM Labs published on June 26.
So far in 2025, more than US$2.1 billion (AU$3.2 billion) worth of crypto has been stolen in at least 75 notable attacks, over 10% more than the previous H1 record posted in 2022 and almost matching losses accrued throughout the entirety of 2024. TRM Labs said the vast majority of these losses are directly attributable to the actions of nation-states.
H1 2025 marks a pivotal shift in crypto hacking: escalating strategic intent from state actors and other geopolitically motivated groups.

North Korea’s ramping up of its hacking efforts has played a major role. The ByBit hack in February — attributed to the North Korean regime and marking the largest single crypto theft in history at US$1.5 billion (AU$2.2 billion)— signals a new era in nation-state involvement, according to TRM Labs. The firm said it potentially indicated that state actors are now looking to crypto-crime as a means to geopolitical influence, not simply an illicit means of revenue raising.
This staggering figure…indicates a persistent and escalating effort by the Democratic People’s Republic of Korea (DPRK) to leverage illicit cryptocurrency gains, not only to evade sanctions and finance strategic objectives, such as its nuclear weapons program, but also as an integral component of its statecraft.

While North Korea is the largest nation-state player, it certainly isn’t alone. TRM pointed to the June 18 theft from Iran’s largest crypto exchange, Nobitex, reportedly by the Israeli-linked group Gonjeshke Darande (aka Predatory Sparrow) as another example of crypto theft as an emerging tool of statecraft.
“In the Nobitex hack, Gonjeshke Darande claimed to have targeted the exchange due to its central role in helping the Iranian regime circumvent international sanctions and finance illicit activities,” TRM Labs said.
Notably, the attackers transferred stolen funds to deliberately unspendable vanity addresses — addresses known or suspected to lack corresponding private keys — indicating that they have no intent or capability to access these funds, strongly suggesting their motivations were symbolic or political rather than financial.

Related: Iran’s Nobitex Crypto Exchange Hacked for $90M in Sophisticated Vanity Address Attack
Private Key Thefts and Front-End Exploits Remain Biggest Vulnerabilities
TRM Labs said infrastructure attacks, which include private key thefts and front-end exploits, remain far and away the biggest vulnerabilities facing crypto — accounting for 80% of all losses in the first half of 2025. These attacks are, on average, 10 times larger than other types of attacks.
Infrastructure attacks refer to attack techniques that target the technical backbone of the digital asset system to gain unauthorized control, mislead users, or reroute assets.

Protocol attacks, which mainly impact DeFi platforms and include flash loan and re-entrancy attacks, rank second as a threat vector according to TRM Labs, accounting for 12% of losses. These attacks tend to exploit vulnerabilities in smart contract code and highlight that the perennial issue of smart contract security remains a concern for crypto.
Related: ByBit Breach: $1.5 Billion in Funds Stolen as Exchange Vows to Return Customer Assets
TRM Labs said the increasing role of nation-states in crypto thefts means the industry must bolster its security (such as audits, multi-factor authentication) and that global law enforcement must work together more collaboratively.