Close Menu
FSNN | Free Speech News NetworkFSNN | Free Speech News Network
  • Home
  • News
    • Politics
    • Legal & Courts
    • Tech & Big Tech
    • Campus & Education
    • Media & Culture
    • Global Free Speech
  • Opinions
    • Debates
  • Video/Live
  • Community
  • Freedom Index
  • About
    • Mission
    • Contact
    • Support
Trending

Tether backs UAE tokenization firm KAIO in $8M funding round

5 minutes ago

RAVE Token Faces Another 50% Crash Amid Price Manipulation Claims

9 minutes ago

Nearly Half of New Streaming Music Is AI-Generated, Says Deezer—But Nobody’s Listening

11 minutes ago
Facebook X (Twitter) Instagram
Facebook X (Twitter) Discord Telegram
FSNN | Free Speech News NetworkFSNN | Free Speech News Network
Market Data Newsletter
Tuesday, April 21
  • Home
  • News
    • Politics
    • Legal & Courts
    • Tech & Big Tech
    • Campus & Education
    • Media & Culture
    • Global Free Speech
  • Opinions
    • Debates
  • Video/Live
  • Community
  • Freedom Index
  • About
    • Mission
    • Contact
    • Support
FSNN | Free Speech News NetworkFSNN | Free Speech News Network
Home»Cryptocurrency & Free Speech Finance»North Korea’s crypto heist playbook is expanding and DeFi keeps getting hit
Cryptocurrency & Free Speech Finance

North Korea’s crypto heist playbook is expanding and DeFi keeps getting hit

News RoomBy News Room3 hours agoNo Comments4 Mins Read1,025 Views
Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email VKontakte Telegram
North Korea’s crypto heist playbook is expanding and DeFi keeps getting hit
Share
Facebook Twitter Pinterest Email Copy Link

Listen to the article

0:00
0:00

Key Takeaways

Playback Speed

Select a Voice

Less than three weeks after North Korea-linked hackers used social engineering to hit crypto trading firm Drift, hackers tied to the nation appear to have pulled off another major exploit with Kelp.

The attack on Kelp, a restaking protocol tied into LayerZero’s cross-chain infrastructure, suggests an evolution in how North Korea-linked hackers operate, not just looking for bugs or stolen credentials, but exploiting the basic assumptions built into decentralized systems.

Taken together, the two incidents point to something more organized than a string of one-off hacks, as North Korea continues to escalate its efforts to hijack funds from the crypto sector.

“This is not a series of incidents; it is a cadence,” said Alexander Urbelis, chief information security officer and general counsel at ENS Labs. “You cannot patch your way out of a procurement schedule.”

More than $500 million was siphoned across the Drift and Kelp exploits in just over two weeks.

How Kelp was breached

At its core, the Kelp exploit did not involve breaking encryption or cracking keys. The system actually worked the way it was designed to. Rather, attackers manipulated the data feeding into the system and forced it to rely on those compromised inputs, causing it to approve transactions that never actually occurred.

“The security failure is simple: a signed lie is still a lie,” Urbelis said. “Signatures guarantee authorship; they do not guarantee truth.”

In simpler terms, the system checked who sent the message, not whether the message itself was correct. For security experts, that makes this less about a clever new hack and more about exploiting how the system was set up.

“This attack wasn’t about breaking cryptography,” said David Schwed, COO of blockchain security firm SVRN. “It was about exploiting how the system was set up.”

One key issue was a configuration choice. Kelp relied on a single verifier, essentially one checker, to approve cross-chain messages. That is because it’s faster and simpler to set up, but it removes a critical safety layer.

LayerZero has since recommended using multiple independent verifiers to approve transactions in the fallout, similar to requiring multiple signatures on a bank transfer. Some in the ecosystem have pushed back on that framing, saying that LayerZero’s default setup was to have a single verifier.

“If you’ve identified a configuration as unsafe, don’t ship it as an option,” Schwed said. “Security that depends on everyone reading the docs and getting it right is not realistic.”

The fallout has not stayed limited to Kelp. Like many DeFi systems, its assets are used across multiple platforms, meaning problems can spread.

“These assets are a chain of IOUs,” Schwed said. “And the chain is only as strong as the controls on each link.”

When one link breaks, others are affected. In this case, lending platforms like Aave that accepted the impacted assets as collateral are now dealing with losses, turning a single exploit into a wider stress event.

Decentralization marketing

The attack also exposes a gap between how decentralization is marketed and how it actually works.

“A single verifier is not decentralized,” Schwed said. “It’s a centralized decentralized verifier.”

Urbelis puts it more broadly.

“Decentralization is not a property a system has. It is a series of choices,” he said. “And the stack is only as strong as its most centralized layer.”

In practice, that means even systems that appear decentralized can have weak points, especially in the less visible layers like data providers or infrastructure. Those are increasingly where attackers are focusing.

That shift may explain Lazarus’ recent targeting.

The group has begun zeroing in on cross-chain and restaking infrastructure, Urbelis said, the parts of crypto that move assets between systems or allow them to be reused.

These layers are critical but complex, often sitting underneath more visible applications. They also tend to hold large amounts of value, making them attractive targets.

If earlier waves of crypto hacks focused on exchanges or obvious code flaws, recent activity suggests a move toward what could be called the industry’s plumbing, the systems that connect everything together, but are harder to monitor and easier to misconfigure.

As Lazarus continues to adapt, the biggest risk may not be unknown vulnerabilities, but known ones that are not fully addressed.

The Kelp exploit did not introduce a new kind of weakness. It showed how exposed the ecosystem remains to familiar ones, especially when security is treated as a recommendation rather than a requirement.

And as attackers move faster, that gap is becoming both easier to exploit and far more expensive to ignore.

Read more: North Korean hackers are running massive state-sponsored heists to run its economy and nuclear program

Read the full article here

Fact Checker

Verify the accuracy of this article using AI-powered analysis and real-time sources.

Get Your Fact Check Report

Enter your email to receive detailed fact-checking analysis

5 free reports remaining

Continue with Full Access

You've used your 5 free reports. Sign up for unlimited access!

Already have an account? Sign in here

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Telegram Copy Link
News Room
  • Website
  • Facebook
  • X (Twitter)
  • Instagram
  • LinkedIn

The FSNN News Room is the voice of our in-house journalists, editors, and researchers. We deliver timely, unbiased reporting at the crossroads of finance, cryptocurrency, and global politics, providing clear, fact-driven analysis free from agendas.

Related Articles

Cryptocurrency & Free Speech Finance

Tether backs UAE tokenization firm KAIO in $8M funding round

5 minutes ago
Cryptocurrency & Free Speech Finance

RAVE Token Faces Another 50% Crash Amid Price Manipulation Claims

9 minutes ago
Cryptocurrency & Free Speech Finance

Nearly Half of New Streaming Music Is AI-Generated, Says Deezer—But Nobody’s Listening

11 minutes ago
Cryptocurrency & Free Speech Finance

BTC bounces above $76,000 as DeFi suffers $14 billion exodus after major hack

1 hour ago
Cryptocurrency & Free Speech Finance

Bitcoin Holds $75K As Altcoins Search For Bullish Momentum

1 hour ago
Cryptocurrency & Free Speech Finance

Alibaba Drops Qwen 3.6 Max Preview—Its Most Powerful Model Yet

1 hour ago
Add A Comment
Leave A Reply Cancel Reply

Editors Picks

RAVE Token Faces Another 50% Crash Amid Price Manipulation Claims

9 minutes ago

Nearly Half of New Streaming Music Is AI-Generated, Says Deezer—But Nobody’s Listening

11 minutes ago

FBI Director Kash Patel Sues Atlantic Over Friday’s Article

51 minutes ago

BTC bounces above $76,000 as DeFi suffers $14 billion exodus after major hack

1 hour ago
Latest Posts

Bitcoin Holds $75K As Altcoins Search For Bullish Momentum

1 hour ago

Alibaba Drops Qwen 3.6 Max Preview—Its Most Powerful Model Yet

1 hour ago

Can New York Survive Mamdani’s Tax Plan?

2 hours ago

Subscribe to News

Get the latest news and updates directly to your inbox.

At FSNN – Free Speech News Network, we deliver unfiltered reporting and in-depth analysis on the stories that matter most. From breaking headlines to global perspectives, our mission is to keep you informed, empowered, and connected.

FSNN.net is owned and operated by GlobalBoost Media
, an independent media organization dedicated to advancing transparency, free expression, and factual journalism across the digital landscape.

Facebook X (Twitter) Discord Telegram
Latest News

Tether backs UAE tokenization firm KAIO in $8M funding round

5 minutes ago

RAVE Token Faces Another 50% Crash Amid Price Manipulation Claims

9 minutes ago

Nearly Half of New Streaming Music Is AI-Generated, Says Deezer—But Nobody’s Listening

11 minutes ago

Subscribe to Updates

Get the latest news and updates directly to your inbox.

© 2026 GlobalBoost Media. All Rights Reserved.
  • Privacy Policy
  • Terms of Service
  • Our Authors
  • Contact

Type above and press Enter to search. Press Esc to cancel.

🍪

Cookies

We and our selected partners wish to use cookies to collect information about you for functional purposes and statistical marketing. You may not give us your consent for certain purposes by selecting an option and you can withdraw your consent at any time via the cookie icon.

Cookie Preferences

Manage Cookies

Cookies are small text that can be used by websites to make the user experience more efficient. The law states that we may store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies, we need your permission. This site uses various types of cookies. Some cookies are placed by third party services that appear on our pages.

Your permission applies to the following domains:

  • https://fsnn.net
Necessary
Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.
Statistic
Statistic cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.
Preferences
Preference cookies enable a website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in.
Marketing
Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.