
North Korean Hackers Use AI for Crypto Theft, KISA Reports
- Lyla Velez
- June 27, 2025
- News
- 0 Comments
- North Korean hackers employ AI in cryptocurrency theft.
- KISA leads the investigation in Seoul.
- AI automation enhances hacking sophistication.
North Korea’s state-sponsored hacking groups, Kimsuky and Andariel, are using AI models such as ChatGPT to automate cryptocurrency theft, according to Lee Seul-gi of South Korea’s Internet & Security Agency, revealed at a Seoul security conference in June 2025.
The use of AI tools by North Korean hackers elevates the sophistication of cryptocurrency thefts, posing increased risks to digital assets and prompting reassessment of global cybersecurity measures.
North Korean state-sponsored hackers are increasingly employing AI models to automate cryptocurrency theft. Notably, the hacking groups Kimsuky and Andariel have incorporated technologies like ChatGPT, boosting their cyberattacks’ efficiency and automation. This trend has been identified and led by Lee Seul-gi at KISA.
During the Seoul security conference, Lee Seul-gi highlighted the strategic shift by these North Korean groups in automating cyber espionage activities. Kimsuky and Andariel are both recognized for their past roles in cyberattacks aimed at cryptocurrency platforms and defense-related targets.
The impact of this development is significant, affecting the global crypto market and potentially destabilizing victim exchanges. With automation, hackers can quickly convert stolen assets like Bitcoin and Ethereum into other cryptocurrencies through cross-chain platforms. As Lee Seul-gi, Lead Researcher at KISA, stated:
“North Korea’s state-sponsored hacking groups are automating cryptocurrency theft with the help of AI tools like ChatGPT…”
Financially, the integration of AI by hackers could lead to more frequent successful breaches. On the political front, South Korea and its allies might need to strengthen cyber defenses and monitor cross-border financial flows closely.
Experts suggest that AI-driven automation could further complicate the detection and prevention of cyberattacks. Regulatory and technological measures are necessary to counteract these sophisticated threats, ensuring digital asset security.
Disclaimer: The content on nftenex.com is provided for informational purposes only and should not be considered financial or investment advice. Cryptocurrency investments carry inherent risks. Please consult a qualified financial advisor before making any investment decisions. |