In partnership with

CYBER SYRUP
Delivering the sweetest insights on cybersecurity.

The Future of Shopping? AI + Actual Humans.

AI has changed how consumers shop by speeding up research. But one thing hasn’t changed: shoppers still trust people more than AI.

Levanta’s new Affiliate 3.0 Consumer Report reveals a major shift in how shoppers blend AI tools with human influence. Consumers use AI to explore options, but when it comes time to buy, they still turn to creators, communities, and real experiences to validate their decisions.

The data shows:

  • Only 10% of shoppers buy through AI-recommended links

  • 87% discover products through creators, blogs, or communities they trust

  • Human sources like reviews and creators rank higher in trust than AI recommendations

The most effective brands are combining AI discovery with authentic human influence to drive measurable conversions.

Affiliate marketing isn’t being replaced by AI, it’s being amplified by it.

North Korea’s Digital Revenue Machine: Crypto Theft and Fake IT Workers at Scale

North Korea has significantly expanded its cyber-enabled revenue operations in 2025, combining large-scale cryptocurrency theft with widespread employment fraud targeting global technology companies.

New findings from Chainalysis and Amazon show that North Korean threat actors stole more than $2 billion in cryptocurrency this year while simultaneously deploying thousands of fake IT workers to infiltrate Western organizations.

Together, these activities illustrate a coordinated strategy to bypass international sanctions by monetizing access, trust, and digital infrastructure at scale.

Context

North Korea has long relied on cyber operations to generate hard currency, but recent data suggests a marked shift toward fewer, higher-impact attacks paired with persistent insider access.

International sanctions continue to restrict traditional revenue streams, making cybercrime a central pillar of the regime’s financial strategy.

In 2025, this model increasingly blended direct theft, insider access, and social engineering rather than relying solely on external hacking campaigns.

What Happened

According to Chainalysis, North Korean hackers stole approximately $2.02 billion in cryptocurrency during 2025, accounting for roughly 76% of all service-related crypto compromises this year.

The total amount of cryptocurrency stolen globally in 2025 reached $3.41 billion, slightly higher than 2024, with the $1.5 billion Bybit breach representing the single largest incident.

At the same time, Amazon reported blocking more than 1,800 suspected North Korean IT workers who attempted to obtain remote technical roles using stolen or fabricated identities.

Technical Breakdown

Chainalysis found that North Korean cyber operations increasingly rely on insider access rather than high-frequency external attacks.

Threat actors place operatives inside cryptocurrency exchanges, custodians, and Web3 firms, enabling credential theft, source code access, and transaction manipulation.

They also impersonate recruiters, investors, or acquisition teams to harvest credentials and proprietary information during fake hiring or due-diligence processes.

Amazon’s security teams detected these IT workers using stolen identities, compromised LinkedIn accounts, and U.S.-based accomplices who host company-issued laptops to simulate domestic employment.

Impact Analysis

The financial impact is substantial. North Korea’s cumulative cryptocurrency theft now totals approximately $6.75 billion.

Beyond direct losses, affected organizations face long-term risks, including intellectual property exposure, regulatory scrutiny, and erosion of trust in remote hiring pipelines.

The growing focus on AI-related roles further increases risk, as these positions often provide access to sensitive models, datasets, and infrastructure.

Why It Matters

This campaign demonstrates how nation-state actors are weaponizing legitimate business processes rather than merely exploiting software vulnerabilities.

Remote work, decentralized finance, and global hiring platforms have become attack surfaces themselves.

The convergence of financial crime, insider threat, and identity fraud signals a structural shift in how sanctioned states generate revenue through cyber operations.

Expert Commentary

“This marks the most severe year on record for DPRK crypto theft in terms of value stolen,” Chainalysis noted, emphasizing the concentration of attacks rather than their frequency.

Amazon CSO Stephen Schmidt highlighted subtle indicators of fraud, such as inconsistent education histories and formatting anomalies in phone numbers, stressing that “small details often reveal large risks.”

Key Takeaways

  • North Korea stole over $2 billion in cryptocurrency in 2025

  • DPRK actors accounted for roughly 76% of crypto service compromises

  • Fake IT workers are now a core component of revenue generation

  • Insider access is replacing high-volume external attacks

  • AI-related roles are increasingly targeted

  • Remote hiring pipelines are a growing security risk

  • Identity verification and behavioral analysis are critical defenses

Keep Reading

No posts found