Advertisement · 728 × 90
#
Hashtag
#CryptocurrencyTheft
Advertisement · 728 × 90
Preview
Six Month DPRK Campaign Behind $285 Million Drift Cyber Theft   The Drift Protocol, widely considered to be the largest perpetual futures exchange operating on the Solana blockchain, became the focal point of a highly coordinated attack on April 1, 2026, which is rapidly turning into one of the most significant breaches in decentralized finance this year.  In addition to revealing a vulnerability within one platform, this incident highlighted the sophistication of threat actors operating throughout the crypto ecosystem, which has increased over the years. Elliptic estimates that approximately $286 million was siphoned during the attack, with a pattern of transactions, asset movements, and laundering processes that resembled operations previously attributed to North Korean state-linked groups.  The breach would represent the eighth incident of this type recorded during the current year alone, contributing to a cumulative loss of over $300 million, should attribution be formally established. In general, it is indicative of the persistence of a strategic campaign in which upwards of $6.5 billion in cryptoassets have been exfiltrated in recent years activity that has been repeatedly linked to the financing of the country's weapons development programs by U.S. authorities. According to Elliptic's analysis released on Thursday, the $285 million exploitation event has multiple layers of alignment with operational patterns traditionally associated with North Korea's state-sponsored cyber units, making it the largest recorded incident this year.  Not only is the sequence of transactions on the blockchain highlighted in the assessment, but also obfuscation techniques are systematically employed, including staging asset dispersal and laundering pathways that mimic prior state-linked campaigns. As well as telemetry and interaction signatures, network-level interactions strongly suggest that a coordinated, well-resourceful intrusion is more likely than an opportunistic one. In response to the incident, Drift Protocol's native token has declined by more than 40 percent, trading near $0.06. This reflects both immediate liquidity concerns and broader concerns about the platform's security.  Since Drift is the most significant decentralized perpetual futures exchange in the Solana ecosystem, the compromise has implications that go beyond a single protocol, and it raises new concerns about systemic risk, adversarial persistence, and the resilience of decentralized trading infrastructures in the face of sustained, state-aligned threat activities.  A Drift Protocol internal assessment further suggests that the breach was the culmination of a deliberate and six-month intrusion campaign. The activity was attributed with moderate confidence to a North Korea-aligned threat cluster identified as UNC4736.  There are numerous aliases for this actor, including AppleJeus, Citrine Sleet, Golden Chollima and Gleaming Pisces. This group has a long history of financial motivated intrusions within the cryptocurrency threat landscape, as evidenced by its track record of financial motivations. It is noteworthy that the group's past activity has been associated with high-impact incidents such as the X_TRADER and 3CX supply chain compromises of 2023 and the Radiant Capital breach of late 2024, both of which resulted in $53 million losses.  As a consequence of Drift's analysis, transactional continuity and operational continuity can be demonstrated by observing the preparatory fund movements that were associated with the exploit that were traceable to earlier attacks.  Additionally, the social engineering framework demonstrated measurable overlap with previously documented DPRK-linked campaigns in terms of persona construction and engagement tactics. This attribution is supported by independent threat intelligence reports. CrowdStrike's January 2026 assessment identifies Golden Chollima as an offshoot of the DPRK cyber apparatus that performs sustained cryptocurrency theft operations against smaller fintech companies throughout North America, Europe, and parts of Asia as part of its ongoing cyber warfare efforts.  Based on the group's methodology, it appears that the group is pursuing consistent revenue streams through repeated, lower-profile compromises in favor of singular, high-profile events. In line with the regime’s broader strategic imperatives, cyber-enabled financial theft is seen as an effective means of balancing economic constraints and supporting long-term military and technological objectives.  As observed, UNC4736 engages in social engineering with precision, as well as post-compromise technical depth. A documented case from late 2024 illustrates how the group utilized a fabricated recruitment campaign to distribute malicious Python packages, establishing a foothold in a fintech environment within Europe. A lateral movement into cloud infrastructure enabled access to identity and access management configurations, which enabled diversion of digital assets to adversary-controlled wallets as a result of this access. It is becoming increasingly apparent, within this context, that the Drift incident is not merely an isolated exploit, but rather an intelligent intelligence operation that was conducted with patience and strategic intent.  In collaboration with law enforcement agencies and forensic specialists, the platform is reconstructing the intrusion timeline, and initial indications suggest an organized progression from reconnaissance and access acquisition to staged execution and asset extraction.  An examination of the larger operational ecosystem underpinning such campaigns reveals a highly structured, multinational workforce model designed to sustain long-term access and revenue generation. A distributed network of technical proficient individuals is employed by the program, many of whom operate in jurisdictions such as China and Russia.  Through company-issued systems hosted in geographically dispersed laptop farms, including within the United States, employees are remote interacting with corporate environments. It is supported by an intermediary layer of facilitators who coordinate logistical tasks, which include handling devices, processing payroll, and establishing identity credentials, which are often orchestrated through shell entities aimed at obscuring attribution and bypassing regulatory scrutiny.  In itself, the recruitment and placement pipeline exhibits a degree of operational maturity which is commonly associated with legitimate global hiring ecosystems. As part of the initial recruitment process, dedicated recruiters identify potential candidates, followed by a structured onboarding process in which curated identities are assigned and refined.  Facilitators are responsible for managing professional profiles, directing summary development, and conducting targeted interview coaching, ensuring alignment with Western employers' expectations. The use of enhanced verification mechanisms involves the introduction of additional collaborators in order to satisfy compliance checks, thereby effectively bridging the gap between fabricated personas and real-world hiring requirements. This model relies on cryptocurrency for the financial backbone, allowing wages to be systematically repatriated while minimizing exposure to international sanctions.  Furthermore, threat intelligence reports indicate that this workforce is deliberately transient by design. Employees frequently change roles, identities, and digital accounts, maintaining a fluid presence that complicates detection and attribution.  By reducing exposure risk for a long period, constant churn enables continuous infiltration across multiple organizations simultaneously and reduces the risk of long-term exposure. A recent study indicates that the recruitment base has been expanded beyond traditional boundaries, with individuals from Iran, Syria, Lebanon, and Saudi Arabia actively participating in the program.  A number of documented examples demonstrate the effectiveness of the model in advancing candidates from these regions through employment processes with U.S.-based employers. Within this framework, there has been an important development in the use of legitimate professional networking platforms to recruit auxiliary participants individuals who are responsible for performing real-time interactions such as technical interviews in under assumed identities.  The participants, often trained and evaluated through recording sessions, serve as proxies for obtaining employment positions based upon fabricated Western personas. Such access can be used for a variety of intelligence purposes once embedded, as well as financial extraction.  While monetary gains remain the primary motivation, the intentional targeting of sectors such as the defense contracting industry, financial services, and cryptocurrency infrastructure suggests a convergence of economic and strategic objectives. In the aggregate, these developments reveal a highly sophisticated, multi-layered strategy that extends far beyond conventional cybercrime, blurring the distinction between the infiltration of workers, espionage activities, and financial operations carried out by the state.  As a whole, the incident illustrates a convergence in advanced intrusion capabilities and increasingly institutionalized support architecture that goes beyond conventional definitions of cybercrime. A well-crafted exploit is not the only thing that emerged from the Drift breach, but a deeply embedded operational system that integrates financial theft with identity theft and worker infiltration.  Considering how large the assets were exfiltrated, along with the precision with which transactions were staged and laundered, one can conclude that these campaigns were neither isolated nor opportunistic, but rather were part of an ongoing and adaptive model operating across jurisdictions, platforms, and regulatory environments. As a result of the attribution indicators viewed together with historical activity, a continuity of intent and methodology has been identified that is consistent with long-observed DPRK-linked activity. In light of the interplay between on-chain movement patterns, infrastructure reuse, and human manipulation, a hybrid threat approach is being developed, which combines technical compromise with social engineering and operational deception.  Through this dual-layered methodology, threat actors can not only amp up the effectiveness of individual attacks, but also enhance their persistence, making it possible for them to reconstitute revenue streams and access after partial disruptions. This instance highlights the inherent tension between innovation and security within rapidly evolving financial architectures, as well as its systemic implications for the broader digital asset ecosystem.  As a result, critical questions emerge regarding trust assumptions within decentralized environments, the effectiveness of monitoring mechanisms for complex transaction flows, and the readiness of platforms to counter adversaries who operate both strategically and with state-level resources. In the coming months and years, the Drift incident is likely to be viewed less as a single breach and more as an example of state-administered cyber-financial operations maturing.  Throughout the digital domain, economic objectives, geopolitical strategies, and technical execution are increasingly converged. This is creating a threat landscape that challenges traditional defensive models and requires both industry and government stakeholders to respond more intelligently and integrated.  Accordingly, the Drift incident illustrates the emergence of highly sophisticated intrusion capabilities and an increasingly formalized operational ecosystem that is well beyond the traditional frameworks used by cybercriminals. In addition to the exploitation of a technically complex exploit, the breach reveals the existence of a larger, deeply embedded apparatus that, in its unified and scalable form, systematically combine financial extraction, identity manipulation, and workforce infiltration. With such a large amount of asset exfiltration combined with calculated sequencing of fund movements and obfuscation, it is evident that such operations are deliberate, repeatable, and designed to operate across diverse regulatory and technological environments. Upon contextualization with prior activity, the attribution signals suggest a consistent alignment of intent and execution, consistent with long-documented DPRK-linked campaigns.  As a consequence of the correlation between on-chain behavioral patterns, reuse of operational infrastructure, and coordinated human-centric tactics, it is apparent that a hybrid threat model is being developed in which technical compromise and controlled deception are inseparable.  As a result of this layered approach, operational success rates are increased as well as resilience is achieved, enabling threat actors to re-establish footholds and maintain financial output even in the event of partial exposure or disruption. This has material implications for the wider ecosystem of digital assets.  A prominent decentralized derivatives platform has been compromised, bringing into sharp relief the inherent trade-off between rapid innovation in financial markets and robust security measures. As a result, decentralized systems are once again in the spotlight, causing us to examine the role trust plays within them, the effectiveness of existing transaction monitoring frameworks, and the overall readiness of platforms to combat adversaries who have strategic foresight and state backing.  In time, as investigations progress and details of attribution become clearer, the breach may serve as a useful historical reference point for understanding how state-aligned cyber-financial operations have changed over time.  Economic imperatives, geopolitical objectives, and technical sophistication are now convergent within the cyber domain, which is redefining threat paradigms and reinforcing the need for coordinated, intelligence-driven defense strategies both within the public and private sectors.

Six Month DPRK Campaign Behind $285 Million Drift Cyber Theft #BlockchainExploit #CryptoLaundering #cryptocurrencytheft

0 0 0 0
Preview
North Korean Hackers Hijack Axios Library in Sophisticated Supply Chain Attack Targeting Cryptocurrency Millions of Developers Exposed as Attackers Poison Popular Code RepositorySuspected North Korean hackers have executed one of the most operationally...

North Korean Hackers Hijack Axios Library in Sophisticated Supply Chain Attack Targeting Cryptocurrency #NorthKorea #AxiosLibrary #CryptocurrencyTheft

0 0 0 0
Preview
Forensic Accountants: Tracing Stolen Crypto Assets Unmasking the Ghost in the Machine: How Forensic Accounting Traces Stolen Crypto Assets You've heard the horror stories. A major exchange gets hacked, and millions vanish into the digital ether.…

Forensic Accountants: Tracing Stolen Crypto Assets #cryptocurrencyinvestigation #digitalassetrecovery #walletclustering #cryptotracingtools #cryptocurrencytheft #CFTcrypto #cryptofraud #blockchainanalysis #digitalforensics #onchainanalysis

0 0 0 0
Preview
Crypto Thefts Hit Record $2.7 Billion in 2025  Hackers stole more than $2.7 billion in cryptocurrency in 2025, setting a new annual record for crypto-related thefts, according to data from multiple blockchain monitoring firms.  The losses were driven by dozens of attacks on cryptocurrency exchanges and decentralized finance projects during the year. The largest incident was a breach at Dubai-based exchange Bybit, where attackers made off with about $1.4 billion worth of digital assets.  Blockchain analysis firms and the FBI have attributed the attack to North Korean state-backed hackers, who have become the most prolific crypto thieves in recent years.  The Bybit breach was the biggest known cryptocurrency theft to date and ranks among the largest financial heists on record. Previous major crypto hacks include the 2022 attacks on Ronin Network and Poly Network, which resulted in losses of $624 million and $611 million, respectively.  Blockchain analytics firms Chainalysis and TRM Labs both estimated total crypto thefts at around $2.7 billion in 2025. Chainalysis said it also tracked an additional $700,000 stolen from individual crypto wallets.  Web3 security firm De.Fi, which maintains the REKT database of crypto exploits, reported a similar total. North Korean hackers accounted for the majority of losses, stealing at least $2 billion during the year, according to Chainalysis and Elliptic.  Elliptic estimates that North Korean-linked groups have stolen roughly $6 billion in cryptocurrency since 2017, funds that analysts say are used to support the country’s sanctioned nuclear weapons program.  Other significant incidents in 2025 included a $223 million hack of decentralized exchange Cetus, a $128 million breach at Ethereum-based protocol Balancer, and a theft of more than $73 million from crypto exchange Phemex.  Crypto-related cybercrime has continued to rise in recent years. Hackers stole about $2.2 billion in digital assets in 2024 and roughly $2 billion in 2023, underscoring persistent security challenges across the cryptocurrency ecosystem.

Crypto Thefts Hit Record $2.7 Billion in 2025 #cryptotheft2025 #cryptocurrencytheft #cyberattack

0 0 0 0
Preview
North Korean Hackers Steal Billions Through Crypto Heists and Fake Remote Jobs to Fund Nuclear Program, Report Reveals   North Korean hackers have siphoned off billions of dollars by breaching cryptocurrency exchanges and using false identities to secure remote tech jobs abroad, according to a new international assessment of the country’s cyber operations. The 138-page report, released by the Multilateral Sanctions Monitoring Team—a coalition including the U.S. and 10 allied nations—found that Pyongyang’s government directs these covert schemes to bankroll its nuclear weapons research and development. The group was established last year to track North Korea’s adherence to U.N. sanctions. The findings reveal that North Korea has leveraged cryptocurrencies to launder illicit funds and procure military equipment, effectively evading global restrictions tied to its nuclear ambitions. Investigators noted that hackers linked to Pyongyang routinely deploy malware against international corporations and institutions, aiming to disrupt systems and exfiltrate sensitive data. Despite its isolation and limited economic power, North Korea has made substantial investments in offensive cyber warfare, achieving a level of sophistication that rivals China and Russia, the report concluded. Unlike other major cyber actors such as China, Russia, and Iran, North Korea primarily uses its hacking operations as a financial lifeline—employing cyberattacks and fake employees to generate state revenue. The report further stated that, aided by actors in Russia and China, North Korea’s cyber campaigns have “been directly linked to the destruction of physical computer equipment, endangerment of human lives, private citizens’ loss of assets and property, and funding for the DPRK’s unlawful weapons of mass destruction and ballistic missile programs.” The monitoring team—comprising the U.S., Australia, Canada, France, Germany, Italy, Japan, the Netherlands, New Zealand, South Korea, and the United Kingdom—was created after Russia vetoed a U.N. Security Council resolution that previously empowered a panel of experts to oversee North Korea’s sanctions compliance. Its initial report in May examined North Korea’s military aid to Russia. Earlier this year, hackers tied to North Korea executed one of the largest cryptocurrency thefts in history, stealing $1.5 billion in Ethereum from the exchange Bybit. The FBI later attributed the theft to a hacker collective operating under North Korea’s intelligence agency. U.S. authorities have also alleged that thousands of North Korean IT professionals are secretly employed by American companies using stolen or fabricated identities. These workers allegedly infiltrate internal systems and redirect their earnings back to the North Korean regime—sometimes juggling multiple remote jobs simultaneously. A request for comment sent to North Korea’s mission to the U.N. on Wednesday went unanswered.

North Korean Hackers Steal Billions Through Crypto Heists and Fake Remote Jobs to Fund Nuclear Program, Report Reveals #Bybitcryptohack #cryptocurrencytheft #CyberAttacks

0 0 0 0
Post image

North Korean hackers are infiltrating NPM packages to steal cryptocurrency and sensitive data. Developers, stay vigilant! #CyberSecurity #NPM #Malware #CryptocurrencyTheft Link: thedailytechfeed.com/north-korean...

0 0 0 0
Post image

Bangalore engineer arrested for $44M CoinDCX crypto theft. Highlights need for robust cybersecurity in digital asset platforms. #CoinDCX #CryptoSecurity #CyberAttack #CryptocurrencyTheft Link: thedailytechfeed.com/bangalore-en...

0 0 0 0
Preview
T-Mobile Coughed Up $33 Million in SIM Swap Lawsuit T-Mobile paid $33 million in a private arbitration process over a SIM swap attack leading to cryptocurrency theft.

T-Mobile has paid $33 million in arbitration over a SIM swap attack that led to the theft of over 1,500 Bitcoin and 60,000 Bitcoin Cash, valued at $38 million. #CyberSecurity #SIMSwap #CryptocurrencyTheft​ www.securityweek.com/t-mobile-cou...

1 0 0 0
Preview
Understanding StilachiRAT: A New Cyber Threat Targeting Cryptocurrency | The DefendOps Diaries Explore StilachiRAT, a new cyber threat targeting cryptocurrency with advanced techniques and stealth capabilities.

Understanding StilachiRAT: A New Cyber Threat Targeting Cryptocurrency

#stilachirat
#cryptocurrencytheft
#cyberthreats
#malwareanalysis
#infosec

0 0 0 0
Preview
MassJacker Malware: A Sophisticated Threat to Cryptocurrency Security | The DefendOps Diaries Explore MassJacker malware's sophisticated techniques in cryptocurrency theft and its impact on digital security.

MassJacker Malware: A Sophisticated Threat to Cryptocurrency Security

#massjacker
#cryptocurrencytheft
#malwareanalysis
#cybersecurity
#clipboardhijacking

0 0 0 0
Preview
'Worst hack in history' as $1.5bn in cryptocurrency stolen The Dubai-based Bybit exchange said an attacker gained control of an Ethereum wallet and transferred its holdings to an unidentified address.

Now I'm not saying that they're connected,... But isn't it funny how Musk and his doges have gained access to tons of data, and then something like this happens.

news.sky.com/story/worst-...

#elon #musk #crypto #cryptocurrencytheft
#heist #justsaying #trump #theft

1 0 0 0
Preview
Crazy Evil Gang Strikes Crypto Sector with StealC, AMOS, and Angel Drainer Malware   A Russian-speaking cybercrime syndicate, Crazy Evil, has been tied to more than 10 active social media scams, employing diverse tactics to trick victims into installing malicious software such as StealC, Atomic macOS Stealer (AMOS), and Angel Drainer.…

Crazy Evil Gang Strikes Crypto Sector with StealC, AMOS, and Angel Drainer Malware #cryptocurrencytheft #cybercrimesyndicate #informationstealers

0 0 0 0
Preview
Suspects behind $230 million cryptocurrency theft arrested in Miami Two suspects were arrested in Miami this week and charged with conspiracy to steal and launder over $230 million in cryptocurrency using crypto exchanges and mixing services.

Suspects behind $230 million cryptocurrency theft arrested in Miami
www.bleepingcomputer.com/news/securit...
#Infosec #Security #Cybersecurity #CeptBiro #CryptocurrencyTheft #Miami

0 0 0 0
Preview
Hospitality Worker Guilty of $2.5B Bitcoin Money Laundering Hospitality Worker Guilty of $2.5B Bitcoin Money Laundering A court in the United Kingdom specializing in massive fraud cases found a hospitality worker guilty of money laundering. A court in the United Kingdom specializing in massive fraud cases found…

Hospitality Worker Guilty of $2.5B Bitcoin Money Laundering


A court in the United Kingdom specializing in massive fraud cases found a hospitality worker guilty of money laundering. A court in the United Kingdom specializing in massive fraud cases found an… #Bitcoin #Cryptocurrencytheft #Fraud

0 0 0 0