• Economy & Markets
  • Investigations

Lazarus Group Hits Again in Sophisticated $3.2M Solana Theft

6/30/2025
3min read
Denislav Manolov's Image
by Denislav Manolov
Crypto Expert at Airdrops.com
6/30/2025
3min read
Denislav Manolov's Image
by Denislav Manolov
Crypto Expert

Solana to Ethereum: The Trail of a High-Stakes Crypto Theft

The notorious Lazarus Group, linked to North Korea’s regime, has struck once again—this time pulling off a $3.2 million digital asset heist that started on May 16 and has sent ripples through the crypto community.

On-chain sleuth ZachXBT was first to connect the dots, revealing that the hackers targeted a user’s Solana wallet, converted the stolen funds into Ethereum, and funneled 800 ETH into Tornado Cash, the infamous crypto mixer used to obscure digital trails. At present, about $1.25 million remains unlaundered, sitting in an Ethereum wallet holding both DAI and ETH.

The method was surgical: quick conversions, privacy protocol usage, and sophisticated laundering. But this is only one part of a much bigger campaign Lazarus has been executing. 

Lazarus Group Hits Again in Sophisticated $3.2M Solana Theft Article Image

Lazarus Transactions Map | Source: ZachXBT

NFT Exploits and Targeted Dev Infiltration 

Just two days before the Solana theft was revealed, ZachXBT uncovered another major breach involving multiple NFT projects, including those linked to Pepe creator Matt Furie, as well as ChainSaw and Favrr.

That attack began June 18, when Lazarus hackers gained control of several NFT contracts, proceeded to mint and dump tokens, and made off with another $1 million. The attackers shuffled the funds through three Ethereum wallets, converted some into stablecoins, and moved the assets to MEXC, a centralized crypto exchange.

ZachXBT noted that a specific MEXC deposit address reappeared across several incidents, pointing to repeat laundering behavior and connections to multiple scam projects. This isn’t just a hit-and-run - it’s a coordinated digital crime spree with layers of obfuscation and complex operational structure. 

Fake Developer Profiles and North Korean Footprints 

Perhaps the most chilling part of the Lazarus strategy is their infiltration tactics. ZachXBT discovered GitHub accounts with Korean language settings, VPN usage logs pointing to Astral VPN, and Asia/Russia time zones - all in developers who claimed to be based in the U.S. One example stood out: 

“Why would a developer who claims to be living in the US have a Korean language setting, Astral VPN usage, and have an Asia/Russia time zone?” — ZachXBT 

In one especially alarming case, Alex Hong, listed as the CTO of Favrr, is now believed to be a North Korean IT worker posing under a false identity. His LinkedIn profile has been deleted, and no verifiable work history remains, suggesting deliberate obfuscation and possible recruitment into Lazarus’s crypto subversion network. 

Lazarus Expands Its Crypto Warfront

These attacks are not isolated. They're part of an ongoing, state-sponsored cyber warfare campaign. According to TRM Labs, North Korea-linked actors, including Lazarus, are responsible for stealing nearly $1.6 billion in crypto this year alone - 70% of all stolen assets in 2025.

The shift in tactics is clear: phishing is no longer the only weapon. Now it’s developer impersonation, GitHub account manipulation, and social engineering - executed with military-grade precision.

The end goal? Funding North Korea’s regime while destabilizing global crypto markets and exposing systemic vulnerabilities in blockchain infrastructure. 

Urgent Calls for Industry Action

With Lazarus’s fingerprints on multi-million dollar hacks, industry analysts are warning crypto platforms to enhance their developer vetting, monitor unusual wallet behavior, and bolster on-chain analytics. The rise in developer infiltration and contract compromise poses a major threat - not just to investors, but to the integrity of decentralized ecosystems.

As the line between cybercrime and geopolitics blurs, one thing is certain: crypto security isn’t just a tech issue anymore - it’s national defense

Share with your friends on social media:

Join the community and don't miss a crypto giveaway.

Subscribe for updates by e-mail with the latest research reviews, airdrop news, reward programs, event updates about upcoming airdrops.

By entering your email address you are accepting our Terms & Conditions and Privacy & Cookie Policy.