{"id":90333,"date":"2025-10-27T17:55:00","date_gmt":"2025-10-27T15:55:00","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=90333"},"modified":"2025-10-27T16:55:59","modified_gmt":"2025-10-27T14:55:59","slug":"mysten-labs-ai-in-north-korean-hackers-hands-is-more-dangerous-than-quantum-computing","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/mysten-labs-ai-in-north-korean-hackers-hands-is-more-dangerous-than-quantum-computing\/","title":{"rendered":"Mysten Labs: AI in North Korean hackers\u2019 hands is more dangerous than quantum computing"},"content":{"rendered":"<p>North Korean hackers are weaving artificial intelligence into every stage of cyberattacks \u2014 from phishing to laundering. AI has become a more serious threat to cryptocurrencies than quantum computing, Mysten Labs cryptographer Kostas Chalkias told <a href=\"https:\/\/www.coindesk.com\/business\/2025\/10\/25\/north-korea-s-ai-powered-hackers-are-redefining-crypto-crime\">CoinDesk<\/a>.\u00a0<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201cNeural networks are the best tool I have ever had as a white-hat hacker. And you can imagine what happens when it falls into the wrong hands,\u201d he said.\u00a0<\/em><\/p>\n<\/blockquote>\n<p>According to him, groups such as <a href=\"https:\/\/forklog.com\/en\/news\/lazarus-group-what-we-know-about-the-outfit-suspected-of-the-bybit-hack\">Lazarus<\/a> use <span data-descr=\"large language model\" class=\"old_tooltip\">LLM<\/span> to automatically scan thousands of <a href=\"https:\/\/forklog.com\/en\/news\/what-is-a-smart-contract\">smart contracts<\/a>.\u00a0<\/p>\n<p>AI can combine data on past breaches and find the same vulnerability elsewhere in minutes. That turns a small cadre of state hackers into something akin to a digital military\u2011industrial complex, able to scale attacks with a single prompt, Chalkias noted.\u00a0<\/p>\n<h2 class=\"wp-block-heading\">More serious than quantum computing\u00a0<\/h2>\n<p>The cryptographer argues that the real danger comes from AI, not from quantum computing:\u00a0<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201cThere is no evidence that any computer today can break modern cryptography. That is at least 10 years away.\u201d\u00a0<\/em><\/p>\n<\/blockquote>\n<p>A combination of the two technologies could accelerate the emergence of threats to the digital\u2011asset industry. <a href=\"https:\/\/forklog.com\/en\/news\/what-is-decentralised-finance-defi\">DeFi<\/a> platforms are especially exposed: open\u2011source code lets LLMs analyse the logic of every line.<\/p>\n<p>Chalkias expects regulators will soon require exchanges and smart contracts to undergo continuous, AI\u2011aware audits.\u00a0<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201cEach new release of GPT or Claude finds different weak spots. If you are not testing your system against them, you are already behind,\u201d he stressed.\u00a0<\/em><\/p>\n<\/blockquote>\n<p>He added that North Korea has also begun experimenting with AI\u2011generated propaganda and fakes. But the most effective weapon remains social engineering, amplified by AI.\u00a0<\/p>\n<p>Asked about the chances of North Korea building a quantum computer, Chalkias was dismissive:\u00a0<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201cThe real race is between the US and China. The DPRK will abuse AI for phishing, deepfakes and deception. That is their strength. They do not need quantum computers to hack crypto \u2014 they need artificial intelligence to make the attacks invisible,\u201d the cryptographer concluded.\u00a0<\/em><\/p>\n<\/blockquote>\n<h2 class=\"wp-block-heading\">UN concern\u00a0<\/h2>\n<p>Since January 2024, North Korean cybercriminals have stolen $2.84 billion in cryptocurrency, according to a <a href=\"https:\/\/msmt.info\/Publications\/detail\/MSMT%20Report\/4221\">report<\/a> by the Multilateral Sanctions Monitoring Team (MSMT), associated with the <span data-descr=\"United Nations\" class=\"old_tooltip\">UN<\/span>.\u00a0<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-4f0fb00cae59a69e-7968339663251180-1024x536.png\" alt=\"image\" class=\"wp-image-268310\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-4f0fb00cae59a69e-7968339663251180-1024x536.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-4f0fb00cae59a69e-7968339663251180-300x157.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-4f0fb00cae59a69e-7968339663251180-768x402.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-4f0fb00cae59a69e-7968339663251180-1536x803.png 1536w, https:\/\/forklog.com\/wp-content\/uploads\/img-4f0fb00cae59a69e-7968339663251180.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">In 2025 alone, DPRK hackers stole $2 billion in cryptoassets. Source: <a href=\"https:\/\/www.elliptic.co\/blog\/north-korea-linked-hackers-have-already-stolen-over-2-billion-in-2025\">Elliptic<\/a>.\u00a0\u00a0<\/figcaption><\/figure>\n<p>A significant share of the haul stemmed from <a href=\"https:\/\/forklog.com\/en\/news\/bybit-exchange-suffers-1-46-billion-loss-in-hack\">the attack on Bybit<\/a> in February.\u00a0<\/p>\n<p>Beyond heists, hackers are increasingly using remote\u2011job schemes in the IT and crypto industry. In May, a team at the Kraken exchange <a href=\"https:\/\/forklog.com\/en\/news\/kraken-uncovers-north-korean-spy-among-job-applicants\">identified<\/a> a DPRK spy among candidates for an engineering role.\u00a0<\/p>\n<p>This directly violates UN Security Council Resolutions 2375 and 2397, which prohibit hiring North Korean applicants.\u00a0<\/p>\n<p>Nevertheless, Pyongyang continues to place its specialists in at least eight countries: China, Russia, Laos, Cambodia, Equatorial Guinea, Guinea, Nigeria and Tanzania.<\/p>\n<p>According to the document, between 1,000 and 1,500 such workers were based in China. As of early 2025, 150 to 300 were working in Russia. As part of a broader plan, Pyongyang intended to send more than 40,000 workers to Russia, including several IT delegations.\u00a0<\/p>\n<p>To legalise the activity, the parties planned to use student visas.\u00a0<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201cFor example, as reported by one of the MSMT member states, the Russian educational company <span data-descr=\"Autonomous non-profit organization\" class=\"old_tooltip\">ANO<\/span> \u2018HDK Cooperation\u2019 in 2024 arranged student visas for hundreds of DPRK citizens. This allowed them to enter Russia and work in various sectors, including IT,\u201d the report says.\u00a0<\/em><\/p>\n<\/blockquote>\n<p>According to specialists, the stolen funds mainly finance military programmes. Pyongyang buys a full spectrum of weaponry with the proceeds \u2014 from armoured vehicles to missile systems.\u00a0<\/p>\n<p>Cyber\u2011espionage is aimed chiefly at critical industries, including semiconductor manufacturing, uranium processing and more.\u00a0<\/p>\n<p>However, the report\u2019s authors pointed to growing effectiveness by Western countries in countering DPRK hackers.\u00a0<\/p>\n<p>Andrew Fierman, head of national security intelligence at Chainalysis, <a href=\"https:\/\/decrypt.co\/346010\/north-korea-stolen-billions-crypto-ability-fight-back-growing-chainalysis\">noted<\/a> to Decrypt that \u201cthe capabilities of law enforcement, intelligence and the private sector to identify and neutralize risks have expanded significantly.\u201d\u00a0<\/p>\n<p>In August, an unknown user <a href=\"https:\/\/forklog.com\/en\/news\/user-hacks-north-korean-hacker\">hacked<\/a> the account of a North Korean IT specialist who belonged to a small hacking group linked to a $680,000 theft.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Artificial intelligence is a more serious threat to cryptocurrencies than quantum computing, said Mysten Labs cryptographer Kostas Chalkias.<\/p>\n","protected":false},"author":1,"featured_media":90334,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"Mysten Labs\u2019 Chalkias: AI now eclipses the quantum threat to crypto.","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1125,1202,1138,1360],"class_list":["post-90333","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-lazarus","tag-north-korea-dprk","tag-opinions","tag-quantum-computing"],"aioseo_notices":[],"amp_enabled":true,"views":"239","promo_type":"1","layout_type":"1","short_excerpt":"Mysten Labs\u2019 Chalkias: AI now eclipses the quantum threat to crypto.","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/90333","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=90333"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/90333\/revisions"}],"predecessor-version":[{"id":90335,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/90333\/revisions\/90335"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/90334"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=90333"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=90333"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=90333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}