Ad Code

🔥 Get Your €200 Coupon Pack on Temu!

Unlock 40% OFF instantly or search code in the app.

This Is How Secret North Korean Agents Infiltrated Top Crypto Protocols, Researcher Claims

North Korea‑connected operatives have spent years quietly embedding themselves inside crypto companies and DeFi projects.

A Long-Standing Crypto-Infiltration Saga

News and reports from the Democratic People’s Republic of Korea tend to have a particular conspiracy theory-action movie feel to them. However, they also have the tendency to be true and not over exaggerated at all.

This time, security researcher and MetaMask developer Taylor Monahan said on a Sunday post on the social network X that these methods date back to DeFi’s formative years, with actors linked to the DPRK quietly contributing to several major, widely used protocols.

She claims that North Korean IT workers have quietly worked inside more than 40 DeFi projects over roughly seven years, including protocols that became household names after DeFi summer.

These workers often have “real” on‑chain experience (seven years of blockchain dev) but operate under stolen or synthetic identities, plugging into teams via normal hiring funnels

Her posts reply to tim, a pseudonymous builder and public face of Titan, a Solana‑based DEX aggregator and routing project, claiming that for a previous job they interviewed an extremely qualified candidate that turned out to be a Lazarus operative, the North-Korea affiliated group that has funneled billions of dollars in stolen money through cryptocurrency networks.

Renowned crypto detective ZachXBT also replied to tim’s post, explaining that this is not just “Lazarus” but a network of DPRK units (Lazarus, APT38, AppleJeus, etc.) coordinated by the Reconnaissance General Bureau and optimized for financial cybercrime. Their methods are based on “basic, relentless” outreach via LinkedIn, job boards, interviews, Zoom, plus remote dev roles that teams still grant far too easily.

Recent U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) sanctions and Chainalysis findings signal that DPRK IT networks generated $800 million in 2024 alone and have moved billions in stolen crypto since 2017, feeding weapons of mass destruction (WMD) and missile programs.

New Information On The Crypto-Hack On Drift Protocol

The April 1st $285 million attack on Drift Protocol reignited fears about insider threats from North Korea, especially after the protocol itself confirmed on Saturday that speculation linking the attack to North Korean hacking groups was right.

They attributed the attack “with medium confidence” to UNC4736, a North Korea–aligned, state‑sponsored hacking group.

The protocol claimed the attackers relied on a well elaborated social engineering strategy: fake professional personas, in‑person conference interactions, and booby‑trapped developer tooling to compromise contributors before finally executing the exploit. The attackers posed as a legitimate trading firm, met Drift contributors in person across several countries and used fully constructed identities with work histories and professional networks before triggering the exploit

The attackers weaponized common developer tooling by slipping malicious tasks into VS Code and Cursor configurations, delivering a compromised repository that contributors ran locally without realizing it. All these combined make the incident far more like an insider‑style supply‑chain compromise than a straightforward smart contract.

The day after the attack, Ledger CTO Charles Guillement linked the attack method to Bybit’s $1.4 billion hack, which was attributed to the regime’s cyber units. Then, on Friday, blockchain analytics firm Elliptic released an investigation claiming the on‑chain behavior, laundering methods, and network‑level indicators match the techniques seen in prior DPRK‑linked operations. Bitcoinist covered the story.

Market Implications

This saga crypto-hacking has turned into structural national‑security risk. Regulators and sanctions bodies are already tightening around DPRK IT networks, and more aggressive enforcement is likely to follow.

Large, state‑linked exploits create latent protocol risk: higher insurance premia, potential delistings, governance infighting over restitution, and longer risk‑off periods for DeFi tokens and perp volumes.

Bitcoin, BTC, BTCUSDT

Cover image from Perplexity. BTCUSDT chart from Tradingview.

Source: Bitcoinist.com

Post a Comment

0 Comments