iTnews
  • Home
  • News
  • Technology
  • Security

North Korea laundered US$147.5 million in stolen crypto in March

By Michelle Nichols
May 15 2024 2:03PM

According to confidential work by United Nations sanctions monitors.

North Korea laundered US$147.5 million in stolen crypto in March
North Korea laundered US$147.5 million ($220.4 million) through virtual currency platform Tornado Cash in March after stealing it last year from a cryptocurrency exchange, according to confidential work by United Nations sanctions monitors seen by Reuters. The monitors told a UN Security Council ...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now

Already have an account? Log in to read this article.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright Reuters
© 2019 Thomson Reuters. Click for Restrictions.
Tags:
cryptocurrencysecurity

Related Articles

  • AI is a force multiplier in the fight against cybercriminals AI is a force multiplier in the fight against cybercriminals
  • Nissan A/NZ's outsourced cyber incident call centre breached Nissan A/NZ's outsourced cyber incident call centre breached
  • Western Sydney Uni discloses January "IT network" breach Western Sydney Uni discloses January "IT network" breach
  • Macquarie's banking CISO headed to Endeavour Group Macquarie's banking CISO headed to Endeavour Group

Partner Content

Endpoint solutions are critical for mitigating the risk of data leakage and theft
Partner Content Endpoint solutions are critical for mitigating the risk of data leakage and theft
Going digital to turn contact centres into customer experience centres
Partner Content Going digital to turn contact centres into customer experience centres
Why you should use the cloud to secure your cloud
Partner Content Why you should use the cloud to secure your cloud
Visibility and prioritisation are the key to effective network and infrastructure security
Partner Content Visibility and prioritisation are the key to effective network and infrastructure security

Sponsored Whitepapers

Gain an independent witness with body-worn cameras
Gain an independent witness with body-worn cameras
Gain an independent witness with body-worn cameras
Gain an independent witness with body-worn cameras
Trust Imperative 4.0
Trust Imperative 4.0
Centralized Remote Connectivity for State & Local Government
Centralized Remote Connectivity for State & Local Government
Global Employee Experience Trends Report
Global Employee Experience Trends Report
Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Macquarie Uni to spend up to $700m on 10-year digital transformation

Macquarie Uni to spend up to $700m on 10-year digital transformation

Nissan A/NZ's outsourced cyber incident call centre breached

Nissan A/NZ's outsourced cyber incident call centre breached

Digital ID bill passes parliament

Digital ID bill passes parliament

Macquarie's banking CISO headed to Endeavour Group

Macquarie's banking CISO headed to Endeavour Group

Digital Nation

More than half of loyalty members concerned about their data
More than half of loyalty members concerned about their data
State of Security 2023
State of Security 2023
COVER STORY: What AI regulation might look like in Australia
COVER STORY: What AI regulation might look like in Australia
How eBay uses interaction analytics to improve CX
How eBay uses interaction analytics to improve CX
Health tech startup Kismet raises $4m in pre-seed funding
Health tech startup Kismet raises $4m in pre-seed funding
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.