The post North Korean hackers infiltrated DeFi teams for years ahead appeared on BitcoinEthereumNews.com. Years of silent work inside major projects are reshapingThe post North Korean hackers infiltrated DeFi teams for years ahead appeared on BitcoinEthereumNews.com. Years of silent work inside major projects are reshaping

North Korean hackers infiltrated DeFi teams for years ahead

For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

Years of silent work inside major projects are reshaping how investigators think about north korean hackers and the decentralized finance ecosystem.

North Korean agents embedded across DeFi since 2020

Security researcher and MetaMask developer Taylor Monahan revealed that North Korean IT operatives have worked inside more than 40 decentralized finance platforms, including some of crypto‘s best-known names. Their presence, she said, stretches back to the industry’s so‑called “DeFi Summer” in 2020, when on‑chain lending, trading, and yield platforms surged in popularity.

According to Monahan, the “seven years of blockchain development experience” often listed on these workers’ resumes is not an exaggeration. Instead, they actually helped design and build the very DeFi protocols now targeted in multimillion‑dollar attacks. Moreover, this long-term embedding suggests an organized strategy rather than a series of opportunistic hires.

A $280 million Drift Protocol exploit tied to a wider network

The recent $280 million Drift Protocol exploit was not an isolated security failure. Rather, it appears to be the latest operation linked to a coordinated network of North Korean agents who have quietly penetrated multiple DeFi teams. However, this case stands out because of the way the perpetrators interacted with the project.

Drift Protocol has said that in‑person meetings related to the exploit were not conducted by North Korean nationals. Instead, the attackers allegedly used third‑party intermediaries who presented convincing fake identities, detailed work histories, and professional networks robust enough to pass due‑diligence checks. That said, this approach highlights how advanced crypto third party proxies have become in the hiring process.

Lazarus Group and billions in stolen crypto assets

The state‑sponsored operation commonly referred to as the Lazarus Group continues to be central to these campaigns. Analysts at creator network R3ACH estimate that North Korea’s cyber apparatus has siphoned approximately $7 billion from the crypto sector since 2017. Moreover, those funds are believed to support the country’s broader economic and strategic goals.

Major incidents attributed to this network include the $625 million Ronin Bridge breach in 2022, the $235 million WazirX hack in 2024, and the massive $1.4 billion Bybit theft in 2025. Together, these heists show how north korea crypto thefts have escalated in size and sophistication, moving from single‑protocol hits to ecosystem‑wide operations.

Inside the hiring playbook: basic but relentless tactics

Blockchain investigator ZachXBT has cautioned that the industry often overcomplicates how it talks about these incursions. In his view, not all cyber operations demand advanced exploit research or custom malware. Recruitment‑driven infiltrations, which rely on job postings, LinkedIn outreach, and Zoom interviews, sit at the opposite end of the spectrum.

He described these efforts as fundamentally low‑tech and persistence‑based. Attackers repeatedly apply to roles, refine their fabricated histories, and exploit the volume and speed of Web3 hiring cycles. “If you or your team still falls for them in 2026, you’re very likely negligent,” ZachXBT wrote, underscoring that due diligence, not cutting‑edge security tooling, often determines outcomes.

In this context, companies that fail to adapt their processes risk onboarding hostile developers directly into core protocol work. The dynamic turns conventional perimeter security models on their head. Instead of breaching from the outside, actors resembling north korean hackers are hired into trusted, code‑pushing roles.

Screening tools and sanctions checks for crypto companies

For teams aiming to counter defi developer infiltration, traditional compliance resources remain a critical line of defense. The US Office of Foreign Assets Control, known as OFAC, maintains a public database that crypto businesses can search to identify sanctioned individuals, entities, and wallets. Moreover, repeated patterns in applications or payment routes can signal involvement in blockchain recruiter fraud.

By integrating ofac sanctions crypto checks into hiring and vendor onboarding, firms can better detect red flags before granting access to code repositories, infrastructure, or treasury systems. That said, OFAC data alone is not enough; internal security teams must correlate identity documents, employment history, and on‑chain behavior to uncover anomalies.

Meanwhile, Bitcoin continues to trade actively, with its price currently around $69,379. This backdrop of rising valuations keeps incentives high for organized actors seeking vulnerabilities, whether through protocol exploits or long‑term infiltration of development teams.

DeFi security after a decade of covert operations

The emerging picture is one of patient, methodical campaigns rather than quick smash‑and‑grab hacks. From the Ronin Bridge breach in 2022 to the Bybit theft in 2025 and the latest Drift Protocol case, investigators now see a continuum of activity shaped by Lazarus Group playbooks.

As more details surface, the role of stealth employment schemes becomes harder to ignore. For DeFi projects handling hundreds of millions of dollars, tightening recruitment practices, enforcing sanctions screening, and scrutinizing remote contributors is becoming as important as smart‑contract audits. In the coming years, the line between HR risk and protocol security is likely to disappear entirely.

In summary, a decade of covert work inside crypto teams, capped by the $280 million Drift Protocol exploit, has forced the industry to confront how deeply hostile networks have embedded themselves, and how urgently defenses must evolve.

Source: https://en.cryptonomist.ch/2026/04/07/north-korean-hackers-defi-security/

Market Opportunity
DeFi Logo
DeFi Price(DEFI)
$0.000294
$0.000294$0.000294
-8.12%
USD
DeFi (DEFI) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

$30,000 in PRL + 15,000 USDT

$30,000 in PRL + 15,000 USDT$30,000 in PRL + 15,000 USDT

Deposit & trade PRL to boost your rewards!