Close Menu
FSNN | Free Speech News NetworkFSNN | Free Speech News Network
  • Home
  • News
    • Politics
    • Legal & Courts
    • Tech & Big Tech
    • Campus & Education
    • Media & Culture
    • Global Free Speech
  • Opinions
    • Debates
  • Video/Live
  • Community
  • Freedom Index
  • About
    • Mission
    • Contact
    • Support
Trending

Your crypto strategy should be about how much pain you can handle, not how much money you’ll make, Schwab finds

9 minutes ago

DATs Need Liquid Staking to Outperform ETH Staking ETFs: Lido Exec

11 minutes ago

Proposed Ethereum Standard Aims to Help AI Agents Execute Complex DeFi Trades

14 minutes ago
Facebook X (Twitter) Instagram
Facebook X (Twitter) Discord Telegram
FSNN | Free Speech News NetworkFSNN | Free Speech News Network
Market Data Newsletter
Tuesday, April 7
  • Home
  • News
    • Politics
    • Legal & Courts
    • Tech & Big Tech
    • Campus & Education
    • Media & Culture
    • Global Free Speech
  • Opinions
    • Debates
  • Video/Live
  • Community
  • Freedom Index
  • About
    • Mission
    • Contact
    • Support
FSNN | Free Speech News NetworkFSNN | Free Speech News Network
Home»Cryptocurrency & Free Speech Finance»How North Korea’s 6-month long secret espionage program has crypto community rethinking security
Cryptocurrency & Free Speech Finance

How North Korea’s 6-month long secret espionage program has crypto community rethinking security

News RoomBy News Room2 hours agoNo Comments5 Mins Read984 Views
Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email VKontakte Telegram
How North Korea’s 6-month long secret espionage program has crypto community rethinking security
Share
Facebook Twitter Pinterest Email Copy Link

Listen to the article

0:00
0:00

Key Takeaways

Playback Speed

Select a Voice

When Drift disclosed the details behind its $270 million exploit, the most unsettling part wasn’t the scale of the loss — it was how it happened.

According to the team behind the protocol, the attack wasn’t a smart contract bug or a clever piece of code manipulation. It was a six-month campaign involving fake identities, in-person meetings across multiple countries and carefully cultivated trust. The attackers, allegedly from North Korea, didn’t just find a vulnerability in the system. They became part of it.

This new threat is now forcing a broader reckoning across decentralized finance.

For years, the industry has treated security as a technical problem, something that could be solved with audits, formal verification and better code. But the Drift incident suggests something far more complex: that the real vulnerabilities may lie outside the codebase altogether.

Alexander Urbelis, chief information security officer (CISO) at ENS Labs, argues the framing itself is already outdated.

“We need to stop calling these ‘hacks’ and start calling them what they are: intelligence operations,” Urbelis told CoinDesk. “The people who showed up at conferences, who met Drift contributors in person across multiple countries, who deposited a million dollars of their own money to build credibility: that’s tradecraft. It’s the kind of thing you’d expect from a case officer, not a hacker.”

If that characterization holds, then Drift represents a new playbook: one where attackers behave less like opportunistic hackers and more like patient operators embedding themselves socially before making a move onchain.

“North Korea isn’t scanning for vulnerable contracts anymore. They’re scanning for vulnerable people… That’s not hacking. That’s running agents,” Urbelis added.

The tactics themselves aren’t entirely new.

Investigations in recent years have shown North Korean operatives infiltrating crypto firms by posing as developers, passing job interviews and even securing roles under fake identities. But the Drift incident suggests those efforts have escalated — from gaining access through hiring pipelines to running months-long, in-person relationship-building operations before executing an attack.

‘The Achilles’ heel’

That shift is what has many security leaders most concerned. Even the most rigorously audited protocol can still fail if a contributor is compromised.

David Schwed, chief operating officer of SVRN and a former CISO at both Robinhood and Galaxy, sees the Drift case as a wake-up call.

“Protocols need to understand what they’re up against. These aren’t simple exploits. These are well-planned, months-long operations with dedicated resources, fabricated identities, and a deliberate human element,” Schwed told CoinDesk. “That human element is the Achilles’ heel for many organizations.”

Many DeFi teams remain small, fast-moving and built on trust. But when a handful of individuals control critical access, compromising one can be enough.

Schwed argues that the response needs to be updated. “The answer is a well-fortified security program that protects not just the technology, but the people and the process… Security needs to be foundational to the project and the team.”

Some protocols are already adjusting. At Jupiter, one of Solana’s largest DeFi platforms, the baseline of audits and formal verification remains, but leaders claim it’s no longer sufficient.

“Clearly, securing code via multiple independent audits, open sourcing, and formal verification is just table stakes. The surface area for attacks has broadened substantially,” said COO Kash Dhanda.

That broader surface now includes governance, contributors and operational security. Jupiter has expanded its use of multisigs and timelocks while investing in detection systems and internal training.

“Given that flesh is more vulnerable than code, we’re also updating opsec training and monitoring for key team members,” Dhanda said.

Even then, he added, “there is no end-state for security” and complacency remains the biggest risk.

For protocols like dYdX, the Drift incident reinforces a reality that can’t be engineered away entirely.

“It’s an unfortunate fact of life that crypto projects are being increasingly targeted by state-sponsored bad actors… developers must take precautions to prevent and mitigate the impact of social engineering compromises, but users should also be aware that given the increasing sophistication of bad actors the risk of such compromises cannot be totally eliminated,” said David Gogel, COO of dYdX Labs.

That evolving threat model is also shifting responsibility toward users themselves.

“Users who are active in DeFi should take the time to understand the technical architecture of protocols or smart contracts that hold their funds, and should factor into their risk assessments the role and nature of any multisigs for software upgrades and the possibility that those could be maliciously compromised,” Gogel added.

‘Threat model’

For some founders, the Drift exploit underscores a more uncomfortable conclusion: that trust itself has become a vulnerability.

“The Drift exploit wasn’t a code vulnerability. It was a six-month intelligence operation that exploited trust between humans,” said Lucas Bruder, CEO of Jito Labs.

In practice, that means designing systems that assume compromise — not just bugs.

“Smart contract audits are table stakes. The real attack surface is your team, your multisig signers, and every device they touch.”

That mindset is becoming central to how DeFi approaches security. Schwed of SVRN says it starts with asking not just how a protocol works, but how it could fail.

“Start with a threat model. Ask yourself, how can I be exploited? If one of the project owners becomes compromised, what’s the blast radius of that scenario?”

In that sense, the Drift exploit may be remembered less for the funds lost than for what it revealed — that the biggest risks in DeFi may no longer live in the code, but in the people who run it.

Read more: How North Korea Infiltrated the Crypto Industry

Read the full article here

Fact Checker

Verify the accuracy of this article using AI-powered analysis and real-time sources.

Get Your Fact Check Report

Enter your email to receive detailed fact-checking analysis

5 free reports remaining

Continue with Full Access

You've used your 5 free reports. Sign up for unlimited access!

Already have an account? Sign in here

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Telegram Copy Link
News Room
  • Website
  • Facebook
  • X (Twitter)
  • Instagram
  • LinkedIn

The FSNN News Room is the voice of our in-house journalists, editors, and researchers. We deliver timely, unbiased reporting at the crossroads of finance, cryptocurrency, and global politics, providing clear, fact-driven analysis free from agendas.

Related Articles

Cryptocurrency & Free Speech Finance

Your crypto strategy should be about how much pain you can handle, not how much money you’ll make, Schwab finds

9 minutes ago
Cryptocurrency & Free Speech Finance

DATs Need Liquid Staking to Outperform ETH Staking ETFs: Lido Exec

11 minutes ago
Cryptocurrency & Free Speech Finance

Proposed Ethereum Standard Aims to Help AI Agents Execute Complex DeFi Trades

14 minutes ago
Cryptocurrency & Free Speech Finance

index drops 2.4% as all constituents trade lower

1 hour ago
Cryptocurrency & Free Speech Finance

South Korea Tightens Crypto Rules with 5-minute Asset Verification Mandate

1 hour ago
Cryptocurrency & Free Speech Finance

Devs Are Making Claude Talk Like a Caveman to Cut Costs—And It Works

1 hour ago
Add A Comment
Leave A Reply Cancel Reply

Editors Picks

DATs Need Liquid Staking to Outperform ETH Staking ETFs: Lido Exec

11 minutes ago

Proposed Ethereum Standard Aims to Help AI Agents Execute Complex DeFi Trades

14 minutes ago

‘Every Bridge in Iran Will Be Decimated’ 

60 minutes ago

Egypt arrests commentator Ahmed Douma over article and posts

1 hour ago
Latest Posts

index drops 2.4% as all constituents trade lower

1 hour ago

South Korea Tightens Crypto Rules with 5-minute Asset Verification Mandate

1 hour ago

Devs Are Making Claude Talk Like a Caveman to Cut Costs—And It Works

1 hour ago

Subscribe to News

Get the latest news and updates directly to your inbox.

At FSNN – Free Speech News Network, we deliver unfiltered reporting and in-depth analysis on the stories that matter most. From breaking headlines to global perspectives, our mission is to keep you informed, empowered, and connected.

FSNN.net is owned and operated by GlobalBoost Media
, an independent media organization dedicated to advancing transparency, free expression, and factual journalism across the digital landscape.

Facebook X (Twitter) Discord Telegram
Latest News

Your crypto strategy should be about how much pain you can handle, not how much money you’ll make, Schwab finds

9 minutes ago

DATs Need Liquid Staking to Outperform ETH Staking ETFs: Lido Exec

11 minutes ago

Proposed Ethereum Standard Aims to Help AI Agents Execute Complex DeFi Trades

14 minutes ago

Subscribe to Updates

Get the latest news and updates directly to your inbox.

© 2026 GlobalBoost Media. All Rights Reserved.
  • Privacy Policy
  • Terms of Service
  • Our Authors
  • Contact

Type above and press Enter to search. Press Esc to cancel.

🍪

Cookies

We and our selected partners wish to use cookies to collect information about you for functional purposes and statistical marketing. You may not give us your consent for certain purposes by selecting an option and you can withdraw your consent at any time via the cookie icon.

Cookie Preferences

Manage Cookies

Cookies are small text that can be used by websites to make the user experience more efficient. The law states that we may store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies, we need your permission. This site uses various types of cookies. Some cookies are placed by third party services that appear on our pages.

Your permission applies to the following domains:

  • https://fsnn.net
Necessary
Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.
Statistic
Statistic cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.
Preferences
Preference cookies enable a website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in.
Marketing
Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.