Open Research

Research & Analysis

In-depth technical analysis of nation-state cryptocurrency threats, incident investigations, and research methodologies. All research is published for public benefit.

RSS Feed Subscribe for real-time threat alerts

Featured Research

Incident Analysis 🇰🇵 12 min read

Technical Analysis: Bybit Cold Wallet Hack ($1.46B)

Deep dive into the largest cryptocurrency theft in history. How Lazarus Group exploited multisig UI vulnerabilities to drain 401,346 ETH from Bybit's cold storage.

OS

Osman Sonmez

2025-02-22

Read More
Research 🇰🇵 15 min read

Lazarus Group Laundering Patterns: 2024-2025 Evolution

Analysis of evolving money laundering techniques used by North Korean threat actors, including the shift from Tornado Cash to THORChain and emerging mixers.

OS

Osman Sonmez

2025-02-18

Read More

All Research

Incident Analysis 🇰🇵 2025-02-22

Technical Analysis: Bybit Cold Wallet Hack ($1.46B)

Deep dive into the largest cryptocurrency theft in history. How Lazarus Group exploited multisig UI vulnerabilities to drain 401,346 ETH from Bybit's cold storage.

12 min Read
#Lazarus #Bybit #Multisig #Cold Wallet #UI Manipulation
Research 🇰🇵 2025-02-18

Lazarus Group Laundering Patterns: 2024-2025 Evolution

Analysis of evolving money laundering techniques used by North Korean threat actors, including the shift from Tornado Cash to THORChain and emerging mixers.

15 min Read
#Lazarus #Money Laundering #Mixers #THORChain #Chain Hopping
Research 🇮🇷 2025-02-10

Iranian State-Sponsored Bitcoin Mining: Sanctions Evasion at Scale

How Iran leverages its subsidized electricity to mine Bitcoin for sanctions evasion, generating an estimated $1B annually in untraceable cryptocurrency.

10 min Read
#Iran #IRGC #Mining #Sanctions Evasion #Bitcoin
Research 🇷🇺 2025-02-05

The Garantex-Cryptex Ecosystem: Russia's Crypto Laundering Infrastructure

Mapping the Russian cryptocurrency exchange network that has processed over $12 billion in illicit transactions, including ransomware payments and sanctions evasion.

14 min Read
#Russia #Garantex #Cryptex #Ransomware #OFAC
Methodology 2025-01-28

Wallet Clustering Methodology: Identifying Nation-State Actors on Blockchain

Technical overview of clustering techniques used to link cryptocurrency wallets to nation-state threat actors, including common-spend analysis and timing correlation.

18 min Read
#Methodology #Clustering #Blockchain Analysis #Attribution
Research 🇰🇵 2025-01-15

Cross-Chain Bridge Vulnerabilities: Lessons from Ronin, Harmony, and Orbit

Analysis of bridge exploits favored by Lazarus Group, examining common security failures and the $800M+ stolen through bridge attacks.

16 min Read
#Bridges #Ronin #Harmony #Orbit #DeFi Security

Citing This Research

This research is published for public benefit. Academic citations are encouraged.

Sonmez, O. (2025). "NSCTIP: Nation-State Crypto Threat Intelligence Platform." https://threats.osmansonmez.com/research

All content licensed under CC BY-NC 4.0 for non-commercial use.

NSCTIP Whitepaper

Comprehensive technical documentation on methodology, data sources, and analysis techniques used in nation-state cryptocurrency threat intelligence.

Download Whitepaper (PDF)

Coming Soon

For Research & Public Interest

Free access for researchers, journalists, academics & compliance professionals