The post Amanda Wick: Nation-state actors are escalating cyber threats, North Korea’s hacking is a major revenue source, and crypto companies must rethink securityThe post Amanda Wick: Nation-state actors are escalating cyber threats, North Korea’s hacking is a major revenue source, and crypto companies must rethink security

Amanda Wick: Nation-state actors are escalating cyber threats, North Korea’s hacking is a major revenue source, and crypto companies must rethink security protocols

For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com


Nation-state cyber attacks are escalating, with North Korea exploiting crypto vulnerabilities for financial gain.

Key Takeaways

  • Nation-state actors are increasingly involved in cyber attacks on crypto companies.
  • The intensity of cyber attacks on the crypto industry is on the rise.
  • Many crypto companies are not adequately addressing their security risks.
  • North Korea is a prolific actor in the crypto space, using hacking as a revenue source.
  • Security measures must account for the possibility of trusted individuals being compromised.
  • Companies need to rethink their security protocols and access permissions.
  • Hiring practices can inadvertently create security vulnerabilities.
  • The open-source nature of crypto projects can expose them to sophisticated attacks.
  • The Drift hack was likely orchestrated by a nation-state actor.
  • Enhanced security measures are necessary due to the growing risk environment.
  • There is a significant shift towards nation-state-sponsored activities in the crypto sector.
  • The involvement of individuals with DPRK in the crypto industry can vary widely.
  • Security protocols should be tight and possibly air-gapped for sensitive operations.
  • Companies should be vigilant about the security risks of hiring external personnel.
  • The open-source development model of crypto projects poses unique security challenges.

Guest intro

Amanda Wick is Founder and Chief Executive Officer of the Association for Women in Cryptocurrency. She previously served as Chief of Legal Affairs at Chainalysis after nearly a decade as a federal prosecutor at the US Department of Justice, specializing in crypto money laundering. She is also a Principal with Incite Consulting, advising crypto businesses on risk and compliance strategy.

The rising threat of nation-state actors in crypto

  • — Amanda Wick

  • Nation-state actors use proxies and in-person communications to disguise their origins.
  • The involvement of nation-state actors highlights the advanced nature of threats in the crypto industry.
  • — Amanda Wick

  • There is a growing risk environment for crypto firms, necessitating enhanced security measures.
  • — Amanda Wick

  • The shift towards nation-state-sponsored activities requires heightened awareness and security.
  • North Korea stands out as a particularly prolific actor in the crypto space.

Security gaps in the crypto industry

  • Many companies in the crypto sector are not adequately addressing their security risks.
  • — Amanda Wick

  • Some companies remain lax about the security of their operations despite financial stakes.
  • The lack of security awareness could have serious consequences for the industry.
  • — Amanda Wick

  • Hiring practices can inadvertently create security vulnerabilities.
  • Companies should be vigilant about the security risks of hiring external personnel.
  • Security protocols should be tight and possibly air-gapped for sensitive operations.

North Korea’s role in crypto hacking

  • North Korea uses hacking as a significant source of revenue in the crypto space.
  • — Amanda Wick

  • The involvement of North Korea emphasizes the significance of nation-state actors in cybercrime.
  • The state’s motivations in the crypto space are primarily financial.
  • The specific involvement of North Korea highlights the need for enhanced security measures.
  • Understanding the role of nation-state actors is crucial for addressing cyber threats.
  • The prominence of North Korea in crypto hacking underscores the need for vigilance.
  • The state’s activities in the crypto space are a critical concern for security professionals.

The complexity of interactions in the crypto industry

  • The involvement of individuals with DPRK could range from unaware to fully aware.
  • — Amanda Wick

  • The nuanced risks associated with interactions in the crypto industry require vigilance.
  • Security measures must account for the possibility of trusted individuals being compromised.
  • The complexities of interactions highlight the need for comprehensive security protocols.
  • Understanding the risks of interactions is crucial for safeguarding sensitive information.
  • The potential for compromised individuals underscores the importance of security awareness.
  • Vigilance is necessary to navigate the complexities of the crypto industry’s interactions.

The impact of hiring practices on security

  • Hiring attractive individuals to draw in attendees can create security vulnerabilities.
  • — Amanda Wick

  • Promotional tactics may compromise sensitive information if not properly managed.
  • The connection between marketing strategies and security risks requires careful consideration.
  • Companies should assess the security implications of their hiring practices.
  • The potential for security vulnerabilities highlights the need for comprehensive protocols.
  • Understanding the risks of hiring practices is crucial for maintaining security.
  • Security measures should address the potential vulnerabilities created by promotional tactics.

The vulnerability of open-source crypto projects

  • Crypto projects can be vulnerable to sophisticated attacks due to their open-source nature.
  • — Amanda Wick

  • The open-source development model poses unique security challenges for crypto projects.
  • Malicious actors may exploit open-source contributions to gather intelligence.
  • The risks associated with open-source projects require enhanced security measures.
  • Understanding the vulnerabilities of open-source projects is crucial for safeguarding operations.
  • The potential for sophisticated attacks highlights the need for comprehensive security protocols.
  • Security measures should address the unique challenges posed by open-source development.
Disclosure: This article was edited by Editorial Team. For more information on how we create and review content, see our Editorial Policy.

Nation-state cyber attacks are escalating, with North Korea exploiting crypto vulnerabilities for financial gain.

Key Takeaways

  • Nation-state actors are increasingly involved in cyber attacks on crypto companies.
  • The intensity of cyber attacks on the crypto industry is on the rise.
  • Many crypto companies are not adequately addressing their security risks.
  • North Korea is a prolific actor in the crypto space, using hacking as a revenue source.
  • Security measures must account for the possibility of trusted individuals being compromised.
  • Companies need to rethink their security protocols and access permissions.
  • Hiring practices can inadvertently create security vulnerabilities.
  • The open-source nature of crypto projects can expose them to sophisticated attacks.
  • The Drift hack was likely orchestrated by a nation-state actor.
  • Enhanced security measures are necessary due to the growing risk environment.
  • There is a significant shift towards nation-state-sponsored activities in the crypto sector.
  • The involvement of individuals with DPRK in the crypto industry can vary widely.
  • Security protocols should be tight and possibly air-gapped for sensitive operations.
  • Companies should be vigilant about the security risks of hiring external personnel.
  • The open-source development model of crypto projects poses unique security challenges.

Guest intro

Amanda Wick is Founder and Chief Executive Officer of the Association for Women in Cryptocurrency. She previously served as Chief of Legal Affairs at Chainalysis after nearly a decade as a federal prosecutor at the US Department of Justice, specializing in crypto money laundering. She is also a Principal with Incite Consulting, advising crypto businesses on risk and compliance strategy.

The rising threat of nation-state actors in crypto

  • — Amanda Wick

  • Nation-state actors use proxies and in-person communications to disguise their origins.
  • The involvement of nation-state actors highlights the advanced nature of threats in the crypto industry.
  • — Amanda Wick

  • There is a growing risk environment for crypto firms, necessitating enhanced security measures.
  • — Amanda Wick

  • The shift towards nation-state-sponsored activities requires heightened awareness and security.
  • North Korea stands out as a particularly prolific actor in the crypto space.

Security gaps in the crypto industry

  • Many companies in the crypto sector are not adequately addressing their security risks.
  • — Amanda Wick

  • Some companies remain lax about the security of their operations despite financial stakes.
  • The lack of security awareness could have serious consequences for the industry.
  • — Amanda Wick

  • Hiring practices can inadvertently create security vulnerabilities.
  • Companies should be vigilant about the security risks of hiring external personnel.
  • Security protocols should be tight and possibly air-gapped for sensitive operations.

North Korea’s role in crypto hacking

  • North Korea uses hacking as a significant source of revenue in the crypto space.
  • — Amanda Wick

  • The involvement of North Korea emphasizes the significance of nation-state actors in cybercrime.
  • The state’s motivations in the crypto space are primarily financial.
  • The specific involvement of North Korea highlights the need for enhanced security measures.
  • Understanding the role of nation-state actors is crucial for addressing cyber threats.
  • The prominence of North Korea in crypto hacking underscores the need for vigilance.
  • The state’s activities in the crypto space are a critical concern for security professionals.

The complexity of interactions in the crypto industry

  • The involvement of individuals with DPRK could range from unaware to fully aware.
  • — Amanda Wick

  • The nuanced risks associated with interactions in the crypto industry require vigilance.
  • Security measures must account for the possibility of trusted individuals being compromised.
  • The complexities of interactions highlight the need for comprehensive security protocols.
  • Understanding the risks of interactions is crucial for safeguarding sensitive information.
  • The potential for compromised individuals underscores the importance of security awareness.
  • Vigilance is necessary to navigate the complexities of the crypto industry’s interactions.

The impact of hiring practices on security

  • Hiring attractive individuals to draw in attendees can create security vulnerabilities.
  • — Amanda Wick

  • Promotional tactics may compromise sensitive information if not properly managed.
  • The connection between marketing strategies and security risks requires careful consideration.
  • Companies should assess the security implications of their hiring practices.
  • The potential for security vulnerabilities highlights the need for comprehensive protocols.
  • Understanding the risks of hiring practices is crucial for maintaining security.
  • Security measures should address the potential vulnerabilities created by promotional tactics.

The vulnerability of open-source crypto projects

  • Crypto projects can be vulnerable to sophisticated attacks due to their open-source nature.
  • — Amanda Wick

  • The open-source development model poses unique security challenges for crypto projects.
  • Malicious actors may exploit open-source contributions to gather intelligence.
  • The risks associated with open-source projects require enhanced security measures.
  • Understanding the vulnerabilities of open-source projects is crucial for safeguarding operations.
  • The potential for sophisticated attacks highlights the need for comprehensive security protocols.
  • Security measures should address the unique challenges posed by open-source development.
Disclosure: This article was edited by Editorial Team. For more information on how we create and review content, see our Editorial Policy.

Loading more articles…

You’ve reached the end


Add us on Google

`;
}

function createMobileArticle(article) {
const displayDate = getDisplayDate(article);
const editorSlug = article.editor ? article.editor.toLowerCase().replace(/\s+/g, ‘-‘) : ”;
const captionHtml = article.imageCaption ? `

${article.imageCaption}

` : ”;
const authorHtml = article.isPressRelease ? ” : `
`;

return `


${captionHtml}

${article.subheadline ? `

${article.subheadline}

` : ”}

${createSocialShare()}

${authorHtml}
${displayDate}

${article.content}

${article.isPressRelease ? ” : article.isSponsored ? `

Disclosure: This is sponsored content. It does not represent Crypto Briefing’s editorial views. For more information, see our Editorial Policy.

` : `

Disclosure: This article was edited by ${article.editor}. For more information on how we create and review content, see our Editorial Policy.

`}

`;
}

function createDesktopArticle(article, sidebarAdHtml) {
const editorSlug = article.editor ? article.editor.toLowerCase().replace(/\s+/g, ‘-‘) : ”;
const displayDate = getDisplayDate(article);
const captionHtml = article.imageCaption ? `

${article.imageCaption}

` : ”;
const categoriesHtml = article.categories.map((cat, i) => {
const separator = i < article.categories.length – 1 ? ‘|‘ : ”;
return `${cat}${separator}`;
}).join(”);
const desktopAuthorHtml = article.isPressRelease ? ” : `
`;

return `

${categoriesHtml}

${article.subheadline ? `

${article.subheadline}

` : ”}

${desktopAuthorHtml}
${displayDate}
${createSocialShare()}

${captionHtml}

${article.content}
${article.isPressRelease ? ” : article.isSponsored ? `
Disclosure: This is sponsored content. It does not represent Crypto Briefing’s editorial views. For more information, see our Editorial Policy.

` : `

Disclosure: This article was edited by ${article.editor}. For more information on how we create and review content, see our Editorial Policy.

`}

`;
}

function loadMoreArticles() {
if (isLoading || !hasMore) return;

isLoading = true;
loadingText.classList.remove(‘hidden’);

// Build form data for AJAX request
const formData = new FormData();
formData.append(‘action’, ‘cb_lovable_load_more’);
formData.append(‘current_post_id’, lastLoadedPostId);
formData.append(‘primary_cat_id’, primaryCatId);
formData.append(‘before_date’, lastLoadedDate);
formData.append(‘loaded_ids’, loadedPostIds.join(‘,’));

fetch(ajaxUrl, {
method: ‘POST’,
body: formData
})
.then(response => response.json())
.then(data => {
isLoading = false;
loadingText.classList.add(‘hidden’);

if (data.success && data.has_more && data.article) {
const article = data.article;
const sidebarAdHtml = data.sidebar_ad_html || ”;

// Check for duplicates
if (loadedPostIds.includes(article.id)) {
console.log(‘Duplicate article detected, skipping:’, article.id);
// Update pagination vars and try again
lastLoadedDate = article.publishDate;
loadMoreArticles();
return;
}

// Add to mobile container
mobileContainer.insertAdjacentHTML(‘beforeend’, createMobileArticle(article));

// Add to desktop container with fresh ad HTML
desktopContainer.insertAdjacentHTML(‘beforeend’, createDesktopArticle(article, sidebarAdHtml));

// Update tracking variables
loadedPostIds.push(article.id);
lastLoadedPostId = article.id;
lastLoadedDate = article.publishDate;

// Execute any inline scripts in the new content (for ads)
const newArticle = desktopContainer.querySelector(`article[data-article-id=”${article.id}”]`);
if (newArticle) {
const scripts = newArticle.querySelectorAll(‘script’);
scripts.forEach(script => {
const newScript = document.createElement(‘script’);
if (script.src) {
newScript.src = script.src;
} else {
newScript.textContent = script.textContent;
}
document.body.appendChild(newScript);
});
}

// Trigger Ad Inserter if available
if (typeof ai_check_and_insert_block === ‘function’) {
ai_check_and_insert_block();
}

// Trigger Google Publisher Tag refresh if available
if (typeof googletag !== ‘undefined’ && googletag.pubads) {
googletag.cmd.push(function() {
googletag.pubads().refresh();
});
}

} else if (data.success && !data.has_more) {
hasMore = false;
endText.classList.remove(‘hidden’);
} else if (!data.success) {
console.error(‘AJAX error:’, data.error);
hasMore = false;
endText.textContent=”Error loading more articles”;
endText.classList.remove(‘hidden’);
}
})
.catch(error => {
console.error(‘Fetch error:’, error);
isLoading = false;
loadingText.classList.add(‘hidden’);
hasMore = false;
endText.textContent=”Error loading more articles”;
endText.classList.remove(‘hidden’);
});
}

// Set up IntersectionObserver
const observer = new IntersectionObserver(function(entries) {
if (entries[0].isIntersecting) {
loadMoreArticles();
}
}, { threshold: 0.1 });

observer.observe(loadingTrigger);
})();

© Decentral Media and Crypto Briefing® 2026.

Source: https://cryptobriefing.com/amanda-wick-nation-state-actors-are-escalating-cyber-threats-north-koreas-hacking-is-a-major-revenue-source-and-crypto-companies-must-rethink-security-protocols-unchained/

Market Opportunity
CyberConnect Logo
CyberConnect Price(CYBER)
$0.5084
$0.5084$0.5084
+0.29%
USD
CyberConnect (CYBER) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.
Tags:

USD1 Genesis: 0 Fees + 12% APR

USD1 Genesis: 0 Fees + 12% APRUSD1 Genesis: 0 Fees + 12% APR

New users: stake for up to 600% APR. Limited time!