Where's My Crypto, Dude? The Ultimate Guide to Crypto Money Laundering
This talk demonstrates techniques used by North Korean threat actors to launder stolen cryptocurrency, specifically focusing on the Bybit exchange breach. It details the multi-stage laundering process, including immediate asset conversion, money dispersing, cross-chain bridging, and the use of non-KYC exchanges and mixers. The speaker introduces an AI-powered autonomous agent designed to automate the tracking of these complex, multi-hop transaction flows. The presentation concludes with a demonstration of this agent generating a financial intelligence report by correlating blockchain data and identifying suspicious patterns.
Tracking $1.46 Billion: How North Korean Actors Automate Money Laundering
TLDR: North Korean threat actors are using sophisticated supply chain attacks to compromise crypto-wallets and automate the laundering of billions through complex, multi-hop transaction chains. This research demonstrates how to use AI-powered autonomous agents to map these laundering flows in real-time by correlating blockchain data with known threat intelligence. Security researchers and investigators can leverage these techniques to identify suspicious patterns that traditional manual analysis would miss.
Financial crime on the blockchain has evolved from simple "send-and-forget" transfers to highly orchestrated, automated operations. The recent $1.46 billion theft from the Bybit exchange serves as a masterclass in how modern threat actors operate. They no longer just steal funds; they execute a multi-stage, cross-chain laundering process designed to exhaust the resources of any human investigator.
The Anatomy of the Bybit Heist
The attack began not with a direct exploit of the exchange's core infrastructure, but with a supply chain compromise. An attacker gained access to a developer's environment, specifically targeting a Gnosis Safe (now Safe) deployment. By injecting malicious code into the web interface, the attackers manipulated the transaction logic.
When the exchange attempted a routine transfer from their cold wallet, the injected code triggered a delegatecall to an attacker-controlled contract. This contract executed two specific functions: sweepETH and sweepERC20. These functions drained the wallet entirely, moving 400,000 ETH and associated stETH to an attacker-controlled address. The speed of this operation—occurring in roughly one minute—highlights the danger of automated, contract-based theft.
Automating the Investigation
Tracking these funds manually is a losing game. The attackers immediately dispersed the stolen assets across thousands of wallets, a technique known as "peeling" or "money dispersing." To counter this, researchers are turning to autonomous AI agents that can reason through transaction graphs.
The core of this approach involves the Model Context Protocol (MCP), which allows an LLM to interact with external tools in a structured way. By building an agent that can query Etherscan for transaction data, cross-reference it with blockchain intelligence feeds, and store the results in a Neo4j graph database, we can automate the discovery of laundering patterns.
The following logic demonstrates how an agent might query for suspicious transaction volume:
# Example of an agent tool call to identify high-value transfers
def get_top_transactions(wallet_address, limit=10):
transactions = etherscan_api.get_tx_list(wallet_address)
sorted_txs = sorted(transactions, key=lambda x: x['value'], reverse=True)
return sorted_txs[:limit]
By feeding these results into a graph database, the agent can visualize the "money trail." When the agent identifies a wallet that interacts with a known mixer like Tornado Cash, it can automatically flag the entire cluster as high-risk. This removes the need for a human to manually inspect every hop in the transaction chain.
The Laundering Playbook
Attackers rely on six primary techniques to obfuscate their tracks:
- Immediate Asset Conversion: Swapping stolen tokens for more liquid assets like ETH or USDT on decentralized exchanges (DEXs) to break the initial transaction trail.
- Money Dispersing: Using automated scripts to split funds into thousands of smaller wallets.
- Cross-Chain Bridges: Moving assets from Ethereum to Bitcoin or other chains to evade network-specific monitoring.
- No-KYC Exchanges: Utilizing platforms that do not require identity verification to swap assets.
- Mixers and CoinJoin: Pooling funds with other users to make individual transaction inputs and outputs indistinguishable.
- OTC Cash-Out: Converting the final "cleaned" crypto into fiat currency through small, local brokers in jurisdictions with weak regulatory oversight.
Defensive Realities
Defending against this requires a shift from static monitoring to behavioral analysis. If your organization manages high-value wallets, you must treat your CI/CD pipeline and developer workstations as critical infrastructure. A single compromised Docker container can lead to the total loss of your cold storage assets.
For investigators, the challenge is data volume. The sheer number of transactions involved in a $1.46 billion heist makes it impossible to track without automated tools. Focus on identifying "convergence points"—wallets that receive funds from multiple sources before moving them to a mixer or an OTC broker. These are the nodes where the attacker's automation is most vulnerable to detection.
The future of blockchain forensics isn't just better block explorers; it is the ability to deploy autonomous agents that can "follow the money" faster than the attacker can move it. If you are building or testing these systems, start by mapping the transaction flows of known exploits. The patterns are often repetitive, and once you have the graph, the anomalies become obvious.
Vulnerability Classes
Tools Used
Target Technologies
Attack Techniques
Up Next From This Conference

DisguiseDelimit: Exploiting Synology NAS with Delimiters and Novel Tricks

Browser Extension Clickjacking: One Click and Your Credit Card Is Stolen

Can't Stop the ROP: Automating Universal ASLR Bypasses for Windows
Similar Talks

Inside the FBI's Secret Encrypted Phone Company 'Anom'

Kill List: Hacking an Assassination Site on the Dark Web

