Pencurian Cryptocurrency oleh Aktor Negara sebagai Strategi Hybrid Warfare

(Studi Kasus Kelompok Lazarus)

Authors

  • Muhammad Asnul Husadi Universitas Hasanuddin
  • Nur Isdah Idris Universitas Hasanuddin

DOI:

https://doi.org/10.62383/komunikasi.v2i2.281

Keywords:

Lazarus Group, North Korea, cryptocurrency theft, hybrid warfare, cybercrime, digital geopolitics

Abstract

This study analyzes state-sponsored cryptocurrency theft, focusing on the Lazarus Group affiliated with North Korea, within the framework of contemporary hybrid warfare strategy. Employing a qualitative case study approach, the article explains how systematic and large-scale crypto asset theft conducted by Lazarus Group serves not only financial motives but also functions as a strategic tool to evade international sanctions and fund North Korea’s nuclear programs. The research finds that such cybercrimes reflect high-ambiguity, non-conventional tactics key features of hybrid warfare. This study expands the traditional concept of hybrid warfare by incorporating digital financial crimes as instruments of state geopolitical strategy. It further highlights the importance of international collaboration and strengthened cybersecurity policy to address increasingly complex digital-era threats.

Downloads

Download data is not yet available.

References

Azizah, A. S. N., & Irfan. (2020). Fenomena cryptocurrency dalam perspektif hukum Islam. Shautuna: Jurnal Ilmiah Mahasiswa Perbandingan Mazhab, 1(1), 63.

Baxter, P., & Jack, S. (2008). Qualitative case study methodology: Study design and implementation for novice researchers. The Qualitative Report, 13(4), 544–559.

Borger, J. (2025, February 27). North Korea behind Bybit crypto exchange hack, FBI says. The Guardian. https://www.theguardian.com/world/2025/feb/27/north-korea-bybit-crypto-exchange-hack-fbi

Chainalysis. (2025). The 2025 crypto crime report [Report]. https://www.chainalysis.com

Cointelegraph. (2025). How the Bybit hack happened. https://cointelegraph.com/learn/articles/how-the-bybit-hack-happened

Dougherty, J. (2018, January 26). The mouse clicks of August: Hybrid warfare, nation-state actors, and the future of cybersecurity. Small Wars Journal. https://archive.smallwarsjournal.com/index.php/jrnl/art/mouse-clicks-august-hybrid-warfare-nation-state-actors-and-future-cybersecurity

Elliptic. (2022, June 30). FBI confirms North Korea’s Lazarus Group as hackers behind $100 million Harmony Horizon Bridge theft. https://www.elliptic.co/blog/analysis/fbi-confirms-north-korea-s-lazarus-group-as-hackers-behind-100-million-harmony-horizon-bridge-theft

Federal Bureau of Investigation. (2022, April 14). FBI statement on attribution of malicious cyber activity posed by the Democratic People's Republic of Korea [Press release]. https://www.fbi.gov/news/press-releases/fbi-statement-on-attribution-of-malicious-cyber-activity-posed-by-the-democratic-peoples-republic-of-korea

Federal Bureau of Investigation. (2023, January 23). FBI confirms Lazarus Group cyber actors responsible for Harmony’s Horizon Bridge currency theft [Press release]. https://www.fbi.gov/news/press-releases/fbi-confirms-lazarus-group-cyber-actors-responsible-for-harmonys-horizon-bridge-currency-theft

Federal Bureau of Investigation. (2023, May 31). FBI, DC3, and NPA identification of North Korean cyber actors tracked as TraderTraitor responsible for theft of $308 million from bitcoin.dmm.com [Press release]. https://www.fbi.gov/news/press-releases/fbi-dc3-and-npa-identification-of-north-korean-cyber-actors-tracked-as-tradertraitor-responsible-for-theft-of-308-million-from-bitcoindmmcom

Federal Bureau of Investigation. (2023, September 7). FBI identifies Lazarus Group cyber actors as responsible for theft of $41 million from Stake.com [Press release]. https://www.fbi.gov/news/press-releases/fbi-identifies-lazarus-group-cyber-actors-as-responsible-for-theft-of-41-million-from-stakecom

Hybrid CoE. (2021). Cyber conflict in a hybrid threat environment: Death by a thousand cuts (Hybrid CoE Paper 10). https://www.hybridcoe.fi/wp-content/uploads/2021/11/Hybrid_CoE_Paper_10_Cyber_conflict_in_a_hybrid_threat_environment_WEB.pdf

Marrelli, A. F. (2007). The performance technologist’s toolbox: Case studies. Performance Improvement, 46(7), 39–44.

Mumford, A., & Carlucci, P. (2023). Hybrid warfare: The continuation of ambiguity by other means. European Journal of International Security, 8, 192–206.

Perdana, A., Aminanto, M. E., & Anggorojati, B. (2024). Hack, heist, and havoc: The Lazarus Group’s triple threat to global cybersecurity. Journal of Information Technology Teaching Cases, 14(1), 1–10.

Reddy, E., & Minnaar, A. (2018). Cryptocurrency: A tool and target for cybercrime. Acta Criminologica: Southern African Journal of Criminology, 31(3), 71–87.

Times of India. (2024, July 6). Japan, US, and South Korea issue joint statement on $235 million hacking of India’s Bitcoin exchange WazirX. https://timesofindia.indiatimes.com/technology/tech-news/japan-us-and-south-korea-issue-joint-statement-on-235-million-hacking-of-india-ka-bitcoin-exchange-wazirx/articleshow/117270475.cms

United Nations Security Council. (2023). Final report of the Panel of Experts submitted pursuant to resolution 2627 (2022) (S/2023/171, para. 137, p. 69). https://undocs.org/S/2023/171

Zellers, K. (2024). Hacked! North Korea’s billion-dollar crypto heisting scheme. Penn State Journal of Law & International Affairs, 12(2), 261–302.

Downloads

Published

2025-04-30

How to Cite

Muhammad Asnul Husadi, & Nur Isdah Idris. (2025). Pencurian Cryptocurrency oleh Aktor Negara sebagai Strategi Hybrid Warfare: (Studi Kasus Kelompok Lazarus). Jurnal Ilmu Komunikasi, Administrasi Publik Dan Kebijakan Negara, 2(2), 143–159. https://doi.org/10.62383/komunikasi.v2i2.281

Similar Articles

1 2 3 4 5 > >> 

You may also start an advanced similarity search for this article.