Nation-state cyber attacks are escalating, with North Korea exploiting crypto vulnerabilities for financial gain.
Key Takeaways
- Nation-state actors are increasingly involved in cyber attacks on crypto companies.
- The intensity of cyber attacks on the crypto industry is on the rise.
- Many crypto companies are not adequately addressing their security risks.
- North Korea is a prolific actor in the crypto space, using hacking as a revenue source.
- Security measures must account for the possibility of trusted individuals being compromised.
- Companies need to rethink their security protocols and access permissions.
- Hiring practices can inadvertently create security vulnerabilities.
- The open-source nature of crypto projects can expose them to sophisticated attacks.
- The Drift hack was likely orchestrated by a nation-state actor.
- Enhanced security measures are necessary due to the growing risk environment.
- There is a significant shift towards nation-state-sponsored activities in the crypto sector.
- The involvement of individuals with DPRK in the crypto industry can vary widely.
- Security protocols should be tight and possibly air-gapped for sensitive operations.
- Companies should be vigilant about the security risks of hiring external personnel.
- The open-source development model of crypto projects poses unique security challenges.
Guest intro
Amanda Wick is Founder and Chief Executive Officer of the Association for Women in Cryptocurrency. She previously served as Chief of Legal Affairs at Chainalysis after nearly a decade as a federal prosecutor at the US Department of Justice, specializing in crypto money laundering. She is also a Principal with Incite Consulting, advising crypto businesses on risk and compliance strategy.
The rising threat of nation-state actors in crypto
-
— Amanda Wick
- Nation-state actors use proxies and in-person communications to disguise their origins.
- The involvement of nation-state actors highlights the advanced nature of threats in the crypto industry.
-
— Amanda Wick
- There is a growing risk environment for crypto firms, necessitating enhanced security measures.
-
— Amanda Wick
- The shift towards nation-state-sponsored activities requires heightened awareness and security.
- North Korea stands out as a particularly prolific actor in the crypto space.
Security gaps in the crypto industry
- Many companies in the crypto sector are not adequately addressing their security risks.
-
— Amanda Wick
- Some companies remain lax about the security of their operations despite financial stakes.
- The lack of security awareness could have serious consequences for the industry.
-
— Amanda Wick
- Hiring practices can inadvertently create security vulnerabilities.
- Companies should be vigilant about the security risks of hiring external personnel.
- Security protocols should be tight and possibly air-gapped for sensitive operations.
North Korea’s role in crypto hacking
- North Korea uses hacking as a significant source of revenue in the crypto space.
-
— Amanda Wick
- The involvement of North Korea emphasizes the significance of nation-state actors in cybercrime.
- The state’s motivations in the crypto space are primarily financial.
- The specific involvement of North Korea highlights the need for enhanced security measures.
- Understanding the role of nation-state actors is crucial for addressing cyber threats.
- The prominence of North Korea in crypto hacking underscores the need for vigilance.
- The state’s activities in the crypto space are a critical concern for security professionals.
The complexity of interactions in the crypto industry
- The involvement of individuals with DPRK could range from unaware to fully aware.
-
— Amanda Wick
- The nuanced risks associated with interactions in the crypto industry require vigilance.
- Security measures must account for the possibility of trusted individuals being compromised.
- The complexities of interactions highlight the need for comprehensive security protocols.
- Understanding the risks of interactions is crucial for safeguarding sensitive information.
- The potential for compromised individuals underscores the importance of security awareness.
- Vigilance is necessary to navigate the complexities of the crypto industry’s interactions.
The impact of hiring practices on security
- Hiring attractive individuals to draw in attendees can create security vulnerabilities.
-
— Amanda Wick
- Promotional tactics may compromise sensitive information if not properly managed.
- The connection between marketing strategies and security risks requires careful consideration.
- Companies should assess the security implications of their hiring practices.
- The potential for security vulnerabilities highlights the need for comprehensive protocols.
- Understanding the risks of hiring practices is crucial for maintaining security.
- Security measures should address the potential vulnerabilities created by promotional tactics.
The vulnerability of open-source crypto projects
- Crypto projects can be vulnerable to sophisticated attacks due to their open-source nature.
-
— Amanda Wick
- The open-source development model poses unique security challenges for crypto projects.
- Malicious actors may exploit open-source contributions to gather intelligence.
- The risks associated with open-source projects require enhanced security measures.
- Understanding the vulnerabilities of open-source projects is crucial for safeguarding operations.
- The potential for sophisticated attacks highlights the need for comprehensive security protocols.
- Security measures should address the unique challenges posed by open-source development.
Nation-state cyber attacks are escalating, with North Korea exploiting crypto vulnerabilities for financial gain.
Key Takeaways
- Nation-state actors are increasingly involved in cyber attacks on crypto companies.
- The intensity of cyber attacks on the crypto industry is on the rise.
- Many crypto companies are not adequately addressing their security risks.
- North Korea is a prolific actor in the crypto space, using hacking as a revenue source.
- Security measures must account for the possibility of trusted individuals being compromised.
- Companies need to rethink their security protocols and access permissions.
- Hiring practices can inadvertently create security vulnerabilities.
- The open-source nature of crypto projects can expose them to sophisticated attacks.
- The Drift hack was likely orchestrated by a nation-state actor.
- Enhanced security measures are necessary due to the growing risk environment.
- There is a significant shift towards nation-state-sponsored activities in the crypto sector.
- The involvement of individuals with DPRK in the crypto industry can vary widely.
- Security protocols should be tight and possibly air-gapped for sensitive operations.
- Companies should be vigilant about the security risks of hiring external personnel.
- The open-source development model of crypto projects poses unique security challenges.
Guest intro
Amanda Wick is Founder and Chief Executive Officer of the Association for Women in Cryptocurrency. She previously served as Chief of Legal Affairs at Chainalysis after nearly a decade as a federal prosecutor at the US Department of Justice, specializing in crypto money laundering. She is also a Principal with Incite Consulting, advising crypto businesses on risk and compliance strategy.
The rising threat of nation-state actors in crypto
-
— Amanda Wick
- Nation-state actors use proxies and in-person communications to disguise their origins.
- The involvement of nation-state actors highlights the advanced nature of threats in the crypto industry.
-
— Amanda Wick
- There is a growing risk environment for crypto firms, necessitating enhanced security measures.
-
— Amanda Wick
- The shift towards nation-state-sponsored activities requires heightened awareness and security.
- North Korea stands out as a particularly prolific actor in the crypto space.
Security gaps in the crypto industry
- Many companies in the crypto sector are not adequately addressing their security risks.
-
— Amanda Wick
- Some companies remain lax about the security of their operations despite financial stakes.
- The lack of security awareness could have serious consequences for the industry.
-
— Amanda Wick
- Hiring practices can inadvertently create security vulnerabilities.
- Companies should be vigilant about the security risks of hiring external personnel.
- Security protocols should be tight and possibly air-gapped for sensitive operations.
North Korea’s role in crypto hacking
- North Korea uses hacking as a significant source of revenue in the crypto space.
-
— Amanda Wick
- The involvement of North Korea emphasizes the significance of nation-state actors in cybercrime.
- The state’s motivations in the crypto space are primarily financial.
- The specific involvement of North Korea highlights the need for enhanced security measures.
- Understanding the role of nation-state actors is crucial for addressing cyber threats.
- The prominence of North Korea in crypto hacking underscores the need for vigilance.
- The state’s activities in the crypto space are a critical concern for security professionals.
The complexity of interactions in the crypto industry
- The involvement of individuals with DPRK could range from unaware to fully aware.
-
— Amanda Wick
- The nuanced risks associated with interactions in the crypto industry require vigilance.
- Security measures must account for the possibility of trusted individuals being compromised.
- The complexities of interactions highlight the need for comprehensive security protocols.
- Understanding the risks of interactions is crucial for safeguarding sensitive information.
- The potential for compromised individuals underscores the importance of security awareness.
- Vigilance is necessary to navigate the complexities of the crypto industry’s interactions.
The impact of hiring practices on security
- Hiring attractive individuals to draw in attendees can create security vulnerabilities.
-
— Amanda Wick
- Promotional tactics may compromise sensitive information if not properly managed.
- The connection between marketing strategies and security risks requires careful consideration.
- Companies should assess the security implications of their hiring practices.
- The potential for security vulnerabilities highlights the need for comprehensive protocols.
- Understanding the risks of hiring practices is crucial for maintaining security.
- Security measures should address the potential vulnerabilities created by promotional tactics.
The vulnerability of open-source crypto projects
- Crypto projects can be vulnerable to sophisticated attacks due to their open-source nature.
-
— Amanda Wick
- The open-source development model poses unique security challenges for crypto projects.
- Malicious actors may exploit open-source contributions to gather intelligence.
- The risks associated with open-source projects require enhanced security measures.
- Understanding the vulnerabilities of open-source projects is crucial for safeguarding operations.
- The potential for sophisticated attacks highlights the need for comprehensive security protocols.
- Security measures should address the unique challenges posed by open-source development.
Loading more articles…
You’ve reached the end
Add us on Google
`;
}
function createMobileArticle(article) {
const displayDate = getDisplayDate(article);
const editorSlug = article.editor ? article.editor.toLowerCase().replace(/\s+/g, ‘-‘) : ”;
const captionHtml = article.imageCaption ? `
${article.imageCaption}
` : ”;
const authorHtml = article.isPressRelease ? ” : `
`;
return `
${captionHtml}
${article.subheadline ? `
${article.subheadline}
` : ”}
${createSocialShare()}
${authorHtml}
${displayDate}
${article.content}
${article.isPressRelease ? ” : article.isSponsored ? `
` : `
`}
`;
}
function createDesktopArticle(article, sidebarAdHtml) {
const editorSlug = article.editor ? article.editor.toLowerCase().replace(/\s+/g, ‘-‘) : ”;
const displayDate = getDisplayDate(article);
const captionHtml = article.imageCaption ? `
${article.imageCaption}
` : ”;
const categoriesHtml = article.categories.map((cat, i) => {
const separator = i < article.categories.length – 1 ? ‘|‘ : ”;
return `${cat}${separator}`;
}).join(”);
const desktopAuthorHtml = article.isPressRelease ? ” : `
`;
return `
${categoriesHtml}
${article.subheadline}
` : ”}
${desktopAuthorHtml}
${displayDate}
${createSocialShare()}
${captionHtml}
${article.isPressRelease ? ” : article.isSponsored ? `
` : `
`}
`;
}
function loadMoreArticles() {
if (isLoading || !hasMore) return;
isLoading = true;
loadingText.classList.remove(‘hidden’);
// Build form data for AJAX request
const formData = new FormData();
formData.append(‘action’, ‘cb_lovable_load_more’);
formData.append(‘current_post_id’, lastLoadedPostId);
formData.append(‘primary_cat_id’, primaryCatId);
formData.append(‘before_date’, lastLoadedDate);
formData.append(‘loaded_ids’, loadedPostIds.join(‘,’));
fetch(ajaxUrl, {
method: ‘POST’,
body: formData
})
.then(response => response.json())
.then(data => {
isLoading = false;
loadingText.classList.add(‘hidden’);
if (data.success && data.has_more && data.article) {
const article = data.article;
const sidebarAdHtml = data.sidebar_ad_html || ”;
// Check for duplicates
if (loadedPostIds.includes(article.id)) {
console.log(‘Duplicate article detected, skipping:’, article.id);
// Update pagination vars and try again
lastLoadedDate = article.publishDate;
loadMoreArticles();
return;
}
// Add to mobile container
mobileContainer.insertAdjacentHTML(‘beforeend’, createMobileArticle(article));
// Add to desktop container with fresh ad HTML
desktopContainer.insertAdjacentHTML(‘beforeend’, createDesktopArticle(article, sidebarAdHtml));
// Update tracking variables
loadedPostIds.push(article.id);
lastLoadedPostId = article.id;
lastLoadedDate = article.publishDate;
// Execute any inline scripts in the new content (for ads)
const newArticle = desktopContainer.querySelector(`article[data-article-id=”${article.id}”]`);
if (newArticle) {
const scripts = newArticle.querySelectorAll(‘script’);
scripts.forEach(script => {
const newScript = document.createElement(‘script’);
if (script.src) {
newScript.src = script.src;
} else {
newScript.textContent = script.textContent;
}
document.body.appendChild(newScript);
});
}
// Trigger Ad Inserter if available
if (typeof ai_check_and_insert_block === ‘function’) {
ai_check_and_insert_block();
}
// Trigger Google Publisher Tag refresh if available
if (typeof googletag !== ‘undefined’ && googletag.pubads) {
googletag.cmd.push(function() {
googletag.pubads().refresh();
});
}
} else if (data.success && !data.has_more) {
hasMore = false;
endText.classList.remove(‘hidden’);
} else if (!data.success) {
console.error(‘AJAX error:’, data.error);
hasMore = false;
endText.textContent=”Error loading more articles”;
endText.classList.remove(‘hidden’);
}
})
.catch(error => {
console.error(‘Fetch error:’, error);
isLoading = false;
loadingText.classList.add(‘hidden’);
hasMore = false;
endText.textContent=”Error loading more articles”;
endText.classList.remove(‘hidden’);
});
}
// Set up IntersectionObserver
const observer = new IntersectionObserver(function(entries) {
if (entries[0].isIntersecting) {
loadMoreArticles();
}
}, { threshold: 0.1 });
observer.observe(loadingTrigger);
})();
© Decentral Media and Crypto Briefing® 2026.
Source: https://cryptobriefing.com/amanda-wick-nation-state-actors-are-escalating-cyber-threats-north-koreas-hacking-is-a-major-revenue-source-and-crypto-companies-must-rethink-security-protocols-unchained/




![[OPINYON] Hindi lang salamin ng lipunan ang panitikan](https://www.rappler.com/tachyon/2026/04/Matagal-nang-di-lang-salamin-ng-lipunan-ang-panitikan.jpg)



