Skip to main content

About Kim Jong-un - The Crypto Industry's Biggest Threat

Understanding Kim Jong-un and his regime is crucial to comprehending why ban.kim exists and why North Korean hackers pose such a significant threat to the cryptocurrency ecosystem.

πŸ‘‘ Who is Kim Jong-un?​

Kim Jong-un (born January 8, 1984) is the Supreme Leader of North Korea and the world's youngest head of state. He has ruled North Korea since 2011 following the death of his father, Kim Jong-il, continuing a brutal dynastic dictatorship that has oppressed the North Korean people for over 70 years.

Key Facts About Kim Jong-un​

  • Full Name: Kim Jong-un (김정은)
  • Born: January 8, 1984 (age 40)
  • Position: Supreme Leader of North Korea (2011-present)
  • Dynasty: Third generation of the Kim family dictatorship
  • Education: International School of Berne, Switzerland (under false identity)
  • Height: 5'7" (170 cm) - though official North Korean sources claim 5'9"
  • Weight: Estimated 290+ lbs (131+ kg) - severely obese

πŸ›οΈ The Kim Dynasty Dictatorship​

Three Generations of Oppression​

  1. Kim Il-sung (1948-1994): Founder of North Korea, established the cult of personality
  2. Kim Jong-il (1994-2011): Kim Jong-un's father, expanded nuclear program and isolation
  3. Kim Jong-un (2011-present): Current dictator, escalated cyber warfare and crypto theft

The Cult of Personality​

Mandatory Worship: North Koreans are forced to worship the Kim family as gods

  • Required portraits in every home and building
  • Mandatory bowing and reverence rituals
  • Death penalty for disrespecting Kim family imagery
  • Forced participation in mass games and propaganda events

Ideological Control: The Juche ideology demands absolute loyalty

  • No criticism of the regime allowed
  • No access to outside information
  • Mandatory indoctrination from birth
  • Complete thought control and surveillance

πŸ’€ Human Rights Violations​

Crimes Against Humanity​

Political Prison Camps (Kwanliso):

  • 80,000-120,000 political prisoners
  • Entire families imprisoned for one person's "crime"
  • Torture, starvation, and execution are routine
  • Children born in camps, never knowing freedom

Public Executions:

  • Watching foreign movies: Death penalty
  • Attempting to escape: Death penalty
  • Criticizing the regime: Death penalty
  • Possessing foreign currency: Death penalty

Systematic Oppression:

  • No freedom of speech, press, or assembly
  • No freedom of movement within the country
  • No access to internet or international communication
  • Forced labor for all citizens

Starvation and Economic Failure​

The "Arduous March" (1990s Famine):

  • 2-3 million North Koreans died of starvation
  • Kim Jong-un's family lived in luxury while people starved
  • International food aid stolen by the regime
  • Continued malnutrition affects millions today

Current Economic Disaster:

  • GDP per capita: $1,700 (vs South Korea's $31,000)
  • 40% of population undernourished
  • No economic freedom or private enterprise
  • Resources diverted to nuclear weapons and luxury goods for elites

βš›οΈ Nuclear Threats and International Terrorism​

Nuclear Weapons Program​

Under Kim Jong-un's Rule:

  • Conducted 4 nuclear tests (2013, 2016, 2017)
  • Developed intercontinental ballistic missiles (ICBMs)
  • Threatened to nuke the United States, South Korea, and Japan
  • Violated every international treaty and agreement

Weapons vs. People:

  • Spends 25% of GDP on military while people starve
  • Nuclear program costs billions while citizens lack basic healthcare
  • Prioritizes weapons over economic development
  • Uses nuclear threats to extort international aid

International Terrorism​

State-Sponsored Attacks:

  • Sony Pictures hack (2014) - revenge for "The Interview" movie
  • WannaCry ransomware attack (2017) - infected 300,000+ computers globally
  • Bangladesh Bank heist (2016) - attempted $1 billion theft
  • Assassination of Kim Jong-nam (2017) - killed his own brother with chemical weapons

πŸ’° The Crypto Connection: Why Kim Jong-un Targets Cryptocurrency​

Economic Desperation​

Sanctions Evasion:

  • International sanctions have crippled North Korea's economy
  • Traditional banking systems are blocked
  • Cryptocurrency provides a way to bypass financial restrictions
  • Stolen crypto directly funds the regime and nuclear program

Revenue Generation:

  • 50% of North Korea's foreign currency comes from cybercrime
  • Estimated $1.6 billion stolen in crypto in 2025 alone
  • Direct funding for nuclear weapons development
  • Personal luxury goods for Kim Jong-un and elites

The Lazarus Group and State-Sponsored Hacking​

Elite Hacking Units:

  • Lazarus Group: Most notorious North Korean hacking unit
  • APT38: Financial crime specialists
  • Kimsuky: Intelligence gathering and social engineering
  • Andariel: Infrastructure attacks and ransomware

Training and Resources:

  • Elite hackers trained from childhood
  • State-of-the-art equipment and resources
  • Protection from international law enforcement
  • Direct orders from Kim Jong-un's regime

🎯 Major Cryptocurrency Hacks Ordered by Kim Jong-un​

Recent Major Attacks (2023-2025)​

Bybit Exchange Hack (February 2025):

  • Amount Stolen: $1.5 billion
  • Method: Social engineering and insider access
  • Attribution: Lazarus Group
  • Impact: Largest crypto theft in history

Drift Protocol Exploit (2024):

  • Amount Stolen: $400 million
  • Method: Smart contract vulnerability exploitation
  • Attribution: APT38
  • Funds: Traced to North Korean wallets

Cross-Chain Bridge Attacks (2024):

  • Multiple bridges targeted simultaneously
  • Total losses: $800+ million
  • Coordinated by multiple North Korean units
  • Funds laundered through privacy coins

Historical Major Hacks​

Ronin Network (2022):

  • Amount: $625 million
  • Method: Validator key compromise
  • Game: Axie Infinity
  • Recovery: Partial funds recovered

Harmony Bridge (2022):

  • Amount: $100 million
  • Method: Private key compromise
  • Laundering: Through Tornado Cash
  • Status: Funds never recovered

KuCoin Exchange (2020):

  • Amount: $280 million
  • Method: Hot wallet compromise
  • Recovery: Majority of funds recovered
  • Arrests: Several money launderers caught

πŸ•΅οΈ How North Korean Hackers Operate​

Social Engineering Tactics​

Fake Identities:

  • Create elaborate fake personas on LinkedIn and GitHub
  • Pose as cryptocurrency developers and researchers
  • Build relationships over months before attacking
  • Use stolen or AI-generated profile photos

Job Application Scams:

  • Apply for remote cryptocurrency jobs
  • Request access to company systems for "testing"
  • Install malware during the interview process
  • Steal private keys and sensitive information

Romance Scams:

  • Target lonely cryptocurrency investors
  • Build emotional relationships over time
  • Request access to crypto wallets for "investment opportunities"
  • Disappear with stolen funds

Technical Attack Methods​

Supply Chain Attacks:

  • Compromise popular cryptocurrency libraries and tools
  • Insert malicious code into legitimate software
  • Target developer dependencies and build systems
  • Distribute malware through trusted channels

Smart Contract Exploits:

  • Analyze DeFi protocols for vulnerabilities
  • Exploit reentrancy and flash loan attacks
  • Manipulate oracle price feeds
  • Drain liquidity pools and yield farms

Exchange Infiltration:

  • Target exchange employees with spear-phishing
  • Compromise hot wallet private keys
  • Exploit withdrawal system vulnerabilities
  • Use insider threats and social engineering

🚨 Why Kim Jong-un's Hackers Are So Dangerous​

State Resources and Protection​

Unlimited Resources:

  • Best equipment and training available
  • No budget constraints for operations
  • Access to zero-day exploits and advanced tools
  • Protection from international law enforcement

Ideological Motivation:

  • Hackers believe they're serving their "god-leader"
  • No moral qualms about stealing from "enemies"
  • Willing to take extreme risks for the regime
  • Trained from childhood to hate the outside world

Sophisticated Operations​

Long-term Planning:

  • Operations planned months or years in advance
  • Patient reconnaissance and relationship building
  • Multiple backup plans and escape routes
  • Coordination between different hacking units

Advanced Techniques:

  • Custom malware and zero-day exploits
  • AI-powered social engineering
  • Deepfake technology for video calls
  • Advanced money laundering through multiple chains

πŸ›‘οΈ Why ban.kim Works Against Kim Jong-un​

Psychological Warfare​

Ideological Impossibility:

  • North Korean hackers cannot denounce their "god-leader"
  • Cultural programming prevents authentic criticism
  • Fear of execution for anti-regime statements
  • Inability to fake genuine emotion against Kim Jong-un

Cultural Isolation:

  • No knowledge of banned cultural references
  • Cannot demonstrate familiarity with free internet culture
  • Lack understanding of democratic values and concepts
  • Cannot engage authentically with global communities

Technical Barriers​

Voice Analysis:

  • Accent patterns reveal North Korean origin
  • Stress indicators show coercion or reluctance
  • Emotional authenticity cannot be faked
  • Deepfake detection prevents AI-generated responses

Behavioral Analysis:

  • Writing patterns reveal ideological constraints
  • Cultural knowledge gaps expose North Korean education
  • Social interaction patterns differ from free societies
  • Long-term behavior inconsistencies emerge over time

πŸ“Š The Economic Impact of Kim Jong-un's Crypto Crimes​

Direct Losses to the Crypto Industry​

2026 Updates:

  • Drift Protocol (April 2026): $285 million stolen via sophisticated administrative takeover
  • Bitcoin Depot (March 2026): $3.67 million from IT system and wallet compromise
  • Escalating Sophistication: Novel attack methods like "durable nonces" exploitation
  • Enhanced Social Engineering: Targeting protocol administrators and developers

2025 Statistics:

  • Total Stolen: $1.6 billion
  • Number of Attacks: 47 major incidents
  • Exchanges Targeted: 23 different platforms
  • DeFi Protocols Hit: 31 protocols

Historical Totals (2017-2026):

  • Cumulative Theft: $8+ billion (continuously growing)
  • Successful Attacks: 200+ incidents
  • Recovery Rate: Less than 15%
  • Laundered Successfully: 85%+ of stolen funds

Indirect Economic Damage​

Market Impact:

  • Reduced investor confidence
  • Increased security costs for exchanges
  • Higher insurance premiums
  • Regulatory crackdowns and restrictions

Innovation Hindrance:

  • Developers afraid to build new protocols
  • Reduced venture capital investment
  • Brain drain from the crypto industry
  • Slower adoption of blockchain technology

🌐 International Response to Kim Jong-un's Cyber Crimes​

Government Actions​

United States:

  • FBI most wanted list for Lazarus Group members
  • Sanctions on North Korean crypto addresses
  • Rewards for information leading to arrests
  • Coordination with international law enforcement

United Nations:

  • Security Council resolutions condemning cyber attacks
  • Expert panel reports on sanctions evasion
  • Coordination of international response
  • Monitoring of North Korean crypto activities

South Korea:

  • Specialized cyber crime units
  • Intelligence sharing with allies
  • Advanced threat detection systems
  • Public awareness campaigns

Industry Response​

Exchange Security Measures:

  • Enhanced KYC and AML procedures
  • Multi-signature wallet requirements
  • Cold storage for majority of funds
  • Regular security audits and penetration testing

DeFi Protocol Improvements:

  • Formal verification of smart contracts
  • Bug bounty programs for vulnerability disclosure
  • Time delays for large withdrawals
  • Emergency pause mechanisms

πŸ“š Resources for Tracking Kim Jong-un's Crypto Crimes​

Real-Time Monitoring​

Web3 is Going Great: web3isgoinggreat.com

  • Comprehensive database of crypto hacks and scams
  • Real-time updates on new incidents
  • Detailed analysis of attack methods
  • Attribution to known hacking groups

Chainalysis Reports: chainalysis.com

  • Professional blockchain analysis
  • North Korean hacking group tracking
  • Money laundering pattern identification
  • Government and industry partnerships

Elliptic Investigations: elliptic.co

  • Blockchain analytics and compliance
  • Sanctions screening and monitoring
  • Criminal investigation support
  • Real-time threat intelligence

Academic and Research Sources​

Center for Strategic and International Studies (CSIS):

  • North Korea cyber capabilities analysis
  • Policy recommendations and research
  • Expert interviews and briefings
  • Historical context and trends

38 North: 38north.org

  • North Korea analysis and monitoring
  • Satellite imagery and intelligence
  • Expert commentary and research
  • Real-time developments and news

News and Updates​

Follow on X (Twitter):

🎯 How You Can Help Fight Kim Jong-un's Crypto Crimes​

Join the ban.kim Community​

  1. Complete Verification: Prove you're not a North Korean operative
  2. Report Suspicious Activity: Help identify potential threats
  3. Share Intelligence: Contribute to community threat detection
  4. Spread Awareness: Educate others about North Korean crypto threats

Support the Cause​

  • Follow Updates: Stay informed about new threats and tactics
  • Verify Others: Help authenticate community members
  • Contribute Research: Share information about new attack methods
  • Advocate for Security: Promote better security practices in crypto

πŸ”₯ The Bottom Line​

Kim Jong-un is personally responsible for the theft of billions of dollars from the cryptocurrency industry. His regime's systematic cyber attacks fund nuclear weapons development while his people starve. Every successful hack makes Kim Jong-un richer and more dangerous.

ban.kim exists because traditional security measures have failed. Only by targeting the psychological and cultural impossibilities that North Korean operatives face can we create an effective barrier against their infiltration.

This is not just about crypto securityβ€”it's about fighting one of the world's most brutal dictatorships. By participating in ban.kim, you're taking a stand against tyranny and helping protect the future of decentralized finance.


"The only thing necessary for the triumph of evil is for good people to do nothing." - Join the fight against Kim Jong-un's crypto crimes at ban.kim