Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

TON Price Prediction: $1.50 Target as Technical Indicators Signal Potential 13% Rally

May 2, 2026

The Cheap Foreign Labor Regime Blocking Agricultural Intelligence

May 2, 2026

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»North Korean IT workers operated within DeFi protocols for years, researcher warns
Security

North Korean IT workers operated within DeFi protocols for years, researcher warns

April 7, 2026No Comments2 Mins Read

North Korean-linked operators have spent years quietly integrating into crypto firms and DeFi teams, raising fresh concerns about insider risk after a string of high-value exploits tied to the country’s cyber apparatus.

Security researcher and MetaMask developer Taylor Monahan said these tactics stretch back to the early days of decentralized finance, with individuals tied to the Democratic People’s Republic of Korea contributing to several widely used protocols.

“Lots of DPRK IT workers built the protocols you know and love, all the way back to DeFi summer,” she said on Sunday, adding that more than 40 platforms, including several well-known projects, have at some point relied on such developers.

However, she noted that the “seven years of blockchain dev experience” listed on their resumes is “not a lie.”

Investigators have long tied North Korea’s cyber operations to the Lazarus Group, a state-backed collective believed to have stolen around $7 billion in digital assets since 2017, according to R3ACH analysts.

The group has been associated with some of the industry’s largest breaches, including the $625 million Ronin Bridge exploit in 2022, the $235 million WazirX hack in 2024, and the $1.4 billion Bybit incident in 2025.

Last week’s $280 million exploit of Drift Protocol has drawn renewed scrutiny. The project said it had “medium-high confidence” that a North Korean state-affiliated group was behind the attack, linking the incident to a wider pattern of infiltration and social engineering.

However, the face-to-face meetings that led up to the breach were not with North Korean nationals, but rather “third party intermediaries” using “fully constructed identities including employment histories, public facing credentials, and professional networks.”

See also  HSBC Approves Quantum-Safe Technology for Tokenized Gold

These profiles included employment histories, public credentials, and active professional networks, allowing them to build trust through in-person interactions before the exploit unfolded.

Independent blockchain investigator ZachXBT has warned in a recent X post that not all threats tied to North Korea operate at the same level of sophistication.

“The main issue is that everyone groups them all together when the complexity of threats is different,” he said.

He described many infiltration attempts as relatively simple, relying on persistence rather than technical complexity. Outreach through job postings, LinkedIn, email, Zoom calls, and interview processes remains common.

“Basic and in no way sophisticated […] the only thing about it is they’re relentless,” he said, adding that teams continuing to fall for such tactics in 2026 risk being seen as negligent.

Source link

DeFi Korean North operated Protocols Researcher Warns Workers years

Related Posts

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026

Wasabi Protocol drained for $4.5 million in apparent admin key compromise

May 2, 2026
Top Posts

HBAR Price Prediction: Targets $0.11 by March as Technical Setup Improves

February 19, 2026

Criminals more reliant on cross-chain bridges than ever after mixer crackdowns

September 22, 2023

Jack Mallers’ Strike denied an email breach that definitely happened

November 2, 2023

Type above and press Enter to search. Press Esc to cancel.