Crypto Criminals Are Abandoning Mixers: DeFi and Bridges Are Now the Top Money Laundering Tools

Crypto Criminals Are Abandoning Mixers: DeFi and Bridges Are Now the Top Money Laundering Tools


Key Takeaways

  • North Korean hackers are shifting from crypto mixers to DeFi platforms for laundering funds.
  • Experts say they rely on high-volume transactions to evade detection.
  • The move highlights a decline in dependence on traditional crypto mixers.

For years, cybercriminals relied on crypto mixers to cover the origins of stolen funds.

These privacy-enhancing tools allowed them to break the link between sender and receiver, making it easier to cash out illicit gains.

However, as regulatory scrutiny around mixers intensifies, hackers are now turning to an alternative, decentralized finance (DeFi).

The recent $1.5 billion Bybit hack, attributed to North Korea’s Lazarus Group, has exposed how hackers are adapting their tactics.

Not only have they refined their methods for stealing funds, but they have also drastically altered their laundering strategies.

DeFi Bridges and DEXs Replace Crypto Mixers

Historically, the Lazarus Group used popular crypto mixers like Tornado Cash to launder funds. However, as governments crack down on these services, moving large sums through them has become increasingly difficult.

A recent report from blockchain intelligence firm TRM suggests that the sheer scale of Lazarus’ stolen funds—over $1.5 billion—has rendered mixers ineffective.

Instead, the group is using a web of DeFi protocols, including decentralized exchanges (DEXs) and cross-chain bridges, to obfuscate transactions.

One of the key platforms involved is ThorChain, a decentralized cross-chain exchange.

The Bybit hackers have already bridged at least $6.2 million of stolen Ethereum (ETH) to Bitcoin (BTC) through ThorChain. They are also swapping ETH for DAI using OKX’s Web3 Swap.

The influx of illicit funds has driven ThorChain’s trading volume to an all-time high, surpassing $1 billion in daily transactions.

ThorChain metrics. Source: ThorChain explorer.

Meanwhile, another non-KYC DEX, eXch, has processed nearly $30 million in trading volume since the stolen funds began moving on Feb. 23.

Bybit suspects eXch has facilitated the laundering of over $90 million but says the platform has refused to block transactions tied to the hack.

Tracking Stolen Funds Becomes More Difficult

As hackers become more sophisticated, tracking stolen crypto has become a game of cat and mouse. The Lazarus Group is using thousands of intermediary addresses, layering transactions across multiple blockchains to break transaction trails.

According to Nick Carlsen, a former FBI analyst and TRM’s North Korea expert, the Bybit exploit is a clear example of North Korea doubling down on its “flood the zone” strategy.

By moving funds in rapid succession across different platforms, hackers aim to overwhelm blockchain analytics firms, compliance teams, and law enforcement. This high-volume, high-frequency tactic makes it significantly harder to trace the flow of stolen crypto.

While some stolen assets remain in transit, a sizable portion appears to be sitting idle—likely awaiting liquidation through over-the-counter (OTC) networks.

North Korea’s shift toward DeFi and high-volume laundering techniques underscores how rapidly crypto criminals are evolving, leaving authorities racing to keep up.


Was this Article helpful?



Yes



No


Source link

Oh hi there 👋
It’s nice to meet you.

Sign up to receive awesome content in your inbox, every week.

We don’t spam! Read our privacy policy for more info.

More From Author

Rodri returns to Man City training after ACL injury

Rodri returns to Man City training after ACL injury

What kids took with them when they fled the L.A. wildfires

What kids took with them when they fled the L.A. wildfires

Leave a Reply

Your email address will not be published. Required fields are marked *