How North Korean Hackers Are Getting Jobs at Crypto Companies — And What the Industry Is Doing About It
The way North Korea steals from crypto has changed. For years, the playbook was to find a bug in a smart contract and drain a protocol in minutes. That still happens. But the latest wave of attacks is different, and in some ways more dangerous. DPRK-linked operatives are applying for legitimate jobs at crypto firms, passing early screening, building relationships over months, and then executing attacks from the inside.
The Drift protocol breach is the clearest recent example. Attackers did not find a vulnerability in the code. They spent months cultivating trust among Drift contributors, slipped malware onto their machines, and walked away with multisig wallet access. By the time funds moved, nothing in the traditional security stack had flagged anything suspicious.
Ripple announced Monday it is sharing exclusive DPRK threat intelligence with Crypto ISAC, the crypto industry's information-sharing and analysis center. The data goes beyond basic domain and wallet lists. Each profile Ripple contributes includes a LinkedIn account, an email address, a phone number, a location, and the connecting signals that tie that individual to a known North Korean campaign. When that profile flows to other Crypto ISAC members, every firm in the network knows immediately who they are looking at.
Coinbase Chief Information Security Officer Jeff Lunglhofer confirmed that the new Crypto ISAC API, which Ripple and Coinbase helped shape as early adopters, preserves full context alongside raw data. That matters because a name alone is not actionable. A full profile with correlated signals is.
Crypto ISAC Executive Director Justine Bone said information sharing is now the gold standard for security, not an optional practice. Ripple's move, she said, is the proof of concept the industry needed.
North Korea-linked actors were behind 76 percent of all crypto hack losses in the first half of 2026, according to reporting by CryptoTimes. The Bybit theft alone reached $1.5 billion. The Kelp bridge exploit hit between $290 million and $292 million. These numbers show the scale of what the industry is up against.
Smaller exchanges, particularly those operating in Africa and emerging markets without large in-house security teams, are among the most exposed. A shared intelligence network is one of the few practical tools available to them.
For a full breakdown of how Ripple and Crypto ISAC are building this collective defense, read the complete story at CryptoNewsLive.org.
Comments
Post a Comment