Scan to download
BTC $76,763.78 +3.10%
ETH $2,413.30 +3.44%
BNB $641.28 +3.08%
XRP $1.48 +5.16%
SOL $89.56 +5.93%
TRX $0.3247 -0.65%
DOGE $0.1007 +4.61%
ADA $0.2637 +4.30%
BCH $455.14 +3.30%
LINK $9.74 +4.01%
HYPE $44.53 -0.13%
AAVE $117.19 +8.72%
SUI $1.03 +5.08%
XLM $0.1727 +6.24%
ZEC $345.76 +0.29%
BTC $76,763.78 +3.10%
ETH $2,413.30 +3.44%
BNB $641.28 +3.08%
XRP $1.48 +5.16%
SOL $89.56 +5.93%
TRX $0.3247 -0.65%
DOGE $0.1007 +4.61%
ADA $0.2637 +4.30%
BCH $455.14 +3.30%
LINK $9.74 +4.01%
HYPE $44.53 -0.13%
AAVE $117.19 +8.72%
SUI $1.03 +5.08%
XLM $0.1727 +6.24%
ZEC $345.76 +0.29%

north

Security experts: North Korea's "public" theft of cryptocurrency assets has become its means of financing

As the infiltration and attacks targeting the cryptocurrency industry continue to escalate, security experts point out that the core difference from hackers with backgrounds in other countries is that cryptocurrency assets have become an important direct source of financing for military expenses in that country. Reports indicate that during a recent months-long infiltration operation against Drift Protocol, North Korean hackers once again caused a stir in the industry.Experts state that this model is not merely a "fund transfer tool," but rather a direct "predatory profit" mechanism used to bypass international sanctions and obtain immediately usable hard currency. Security researchers note that, unlike countries such as Russia and Iran, North Korea almost entirely lacks sustainable foreign economic and commodity export capabilities, making it more reliant on cryptocurrency theft as a core source of income to support its nuclear weapons and ballistic missile programs.Experts also emphasize that North Korean hacker attack targets have expanded from simple phishing to exchanges, wallet services, and key holders of DeFi protocols, commonly employing long-term social engineering and identity disguise infiltration methods. Due to the characteristic of blockchain transactions being "irreversible once confirmed," the cryptocurrency industry is far weaker than the traditional financial system in terms of freezing and recovering funds, making such attacks more destructive in speed and scale. Security personnel warn that this type of "long-term infiltration + precise power seizure" attack model has yet to be effectively addressed by the industry.

Elliptic: The Drift attack incident is suspected to be carried out by a North Korean hacker organization

According to CoinDesk, blockchain analytics firm Elliptic stated that the Drift Protocol attack resulted in a loss of $285 million, with "multiple signs" pointing to the North Korean-supported DPRK hacker organization. Elliptic focused on analyzing on-chain behavior, money laundering techniques, and signals at the network level, all of which align with previous state-affiliated attacks.The Elliptic report noted: "If confirmed, this would be the 18th DPRK attack tracked by Elliptic this year, with over $300 million stolen to date." On a technical level, Elliptic described this attack as "premeditated and meticulously planned," with early test transactions and pre-positioned wallets prior to the main attack. After the execution of the attack, the funds were quickly consolidated and transferred across chains, converted into more liquid assets, forming an organized and repeatable money laundering process aimed at obscuring the source of funds while maintaining control.This incident involved over ten types of assets, with funds being transferred across chains from Solana to Ethereum and other chains, further highlighting the importance of cross-chain tracing capabilities. Drift Protocol is the largest decentralized perpetual contract trading platform on the Solana blockchain, and its token has dropped over 40% to approximately $0.06 since the hack.

Bitrefill disclosed that it was attacked by suspected North Korean hackers, resulting in a customer data breach, and has shut down relevant systems for isolation

Bitcoin payment service provider Bitrefill disclosed on platform X that it suffered a cyberattack on March 1, 2026, resulting in a customer data breach. The attack originated from a compromised employee's laptop and allowed the attackers to access certain databases and cryptocurrency wallets.Investigations revealed that the attack method was highly similar to past attacks on cryptocurrency companies by the North Korean DPRK Lazarus/Bluenoroff hacker group. Approximately 18,500 purchase records involved limited customer information (email, cryptocurrency payment addresses, and IP metadata), with about 1,000 records having customer name information stored in an encrypted format, but potentially accessible. Bitrefill stated that customers do not need to take special actions but are advised to be vigilant for unusual information.Bitrefill further added that it has currently shut down related systems for isolation and is collaborating with security experts, on-chain analysts, and law enforcement. Operations have nearly returned to normal. The company emphasized that it is long-term profitable and financially robust enough to absorb this loss and will continue to strengthen cybersecurity measures, including internal access controls, monitoring, and emergency response mechanisms.
app_icon
ChainCatcher Building the Web3 world with innovations.