North Korea Hackers Likely Exploit Cloud Mining to Launder Stolen Crypto, Research Shows
The APT43 group steals crypto to fund operations and launders it through cloud mining services.
North Korean hacker group APT43 probably uses cloud mining services to launder stolen crypto, according to research by Google-owned cybersecurity firm Mandiant.
Cloud mining services own and operate infrastructure and rent out hashrate to users. Hashrate is a measure of the total amount of computer processing power to secure a cryptocurrency. APT43 uses stolen cryptocurrency to pay for these services and receives crypto not associated with the crime to wallets of its choice, according to the report released on Tuesday.
The group is "moderately sophisticated" and supports the strategic and nuclear objectives of the North Korean regime, according to Mandiant. It uses the proceeds from cybercrime to fund its operations, which target South Korean and U.S. government organizations, academics and think tanks focused on the geopolitics of the Korean peninsula, the report said.
To acquire the crypto, APT43 steals credentials, often by phishing attacks. That is, it creates legitimate-looking websites – for example, a site masquerading as a crypto exchange – and persuades unsuspecting users to reveal personal information.
North Korean hackers have been increasingly including crypto in their operations, often in high-profile digital heists like the $100 million Horizon Bridge theft, according to the FBI. Authorities around the world, particularly in the U.S. and South Korea, are trying to combat the threat.
Mandiant was acquired by Google and integrated into its cloud service in September 2022.
Read more: FBI: North Korean Hackers Behind $100M Horizon Bridge Theft
More For You
Accelerating Convergence Between Traditional and On-Chain Finance in 2026?
More For You
AI-powered agents dominate the EasyA x Consensus Hong Kong hackathon

Winning projects like FoundrAI demonstrate how generative AI is allowing developers to build market-ready products in just 48 hours.
What to know:
- At the EasyA x Consensus Hong Kong 2026 hackathon, nearly 1,000 developers shifted focus from back-end infrastructure to user-facing applications, underscoring what organizers called the "Year of the Application Layer."
- Winning projects emphasized automation, security and risk management, with tools like FoundrAI's autonomous "startup in a box," SentinelFi's real-time scam detection and PumpStop's non-custodial, risk-focused trading layer.
- The hackathon's growing prominence on the main show floor and the emphasis on seamless UX, including passkey logins, reflect a broader industry push to attract the next wave of retail users despite a weak macro environment.












