
- Lazarus Group targets Lykke causing financial turmoil.
- £17 million in crypto stolen.
- Lykke forced into liquidation.

Lazarus Group, a North Korean hacking syndicate, stole approximately £17 million in cryptocurrency from Lykke, leading to its 2025 liquidation. This attack involved Bitcoin and Ethereum, with funds laundered through unregulated platforms, confirmed by the UK’s OFSI and Whitestream.
Lykke’s closure underscores ongoing vulnerabilities in centralized platforms despite regulatory frameworks, sparking calls for heightened security measures.
Details of the Heist
Lazarus Group, a North Korean state-backed hacking syndicate, executed a major crypto theft from Lykke, which led to the platform’s bankruptcy. This event highlights significant cyber risks facing centralized cryptocurrency exchanges.
Key Figures and Reactions
Primary actors involved include Richard Olsen, Lykke’s founder, facing legal scrutiny, and the UK’s OFSI, attributing the theft to Lazarus. The hack resulted in suspending trading and withdrawal operations, profoundly impacting Lykke’s stability.
“The attack has been attributed to malicious Democratic People’s Republic of Korea cyberactors, who stole funds on both the Bitcoin and Ethereum networks.” — UK Treasury, Office of Financial Sanctions Implementation, Government of the UK
Aftermath of the Incident
The sudden financial loss forced Lykke into court-ordered liquidation. Investors are left grappling with the aftermath of an unprecedented crypto heist, as regulatory bodies examine further implications.
Market Reactions and Future Implications
As crypto markets react, the event renews urgency for enhanced cybersecurity protocols and cross-border cooperation to curb illicit activities. Potential regulatory changes are anticipated due to cascading effects on investor confidence.
Historical patterns of Lazarus Group’s activities suggest persistent threats to digital financial systems, emphasizing the need for resilient infrastructure. Ongoing legal investigations and theft attribution efforts continue while affected sectors reassess cybersecurity strategies.
Be the first to leave a comment