Ripple has announced that it will share its internal threat intelligence regarding North Korean hackers with the broader cryptocurrency industry. This initiative reflects a significant change in how the sector is adapting to evolving attack methodologies employed by North Korean operatives.
The recent Drift hack is emblematic of this new approach. Unlike traditional hacks where vulnerabilities are exploited, the Drift incident revealed a more insidious tactic. North Korean operatives spent months ingratiating themselves with Drift’s contributors, eventually managing to install malware on their machines and ultimately stealing sensitive keys. This stealthy method allowed the attackers to move $285 million without triggering any security alerts.
In contrast to the 2022-2024 wave of DeFi hacks that focused on exploiting code vulnerabilities, the current trend emphasizes social engineering and human manipulation. As many firms bolster their technical security measures, intruders have shifted their focus towards building trust within organizations. They often apply for jobs, pass background checks, and engage in Zoom calls with team members to lay the groundwork for future attacks that traditional security systems are ill-equipped to detect.
Ripple is collaborating with Crypto ISAC, a threat-sharing group in the cryptocurrency space, to provide insights about North Korean threat actors. The shared intelligence includes profiling information such as LinkedIn profiles, contact numbers, and locations of known operatives. This data is crucial for enhancing the ability of security teams to recognize candidates who may be posing as legitimate applicants but have failed background checks at other firms.
Ripple emphasized the importance of shared intelligence, stating, “The strongest security posture in crypto is a shared one.” They pointed out the critical need for collaboration, as a threat actor who fails at one company could easily apply to multiple others in a short time frame. Without a system of intelligence sharing, individual companies find themselves starting from scratch in their security efforts.
The rise of the Lazarus Group, a North Korean hacking collective, has also had legal repercussions within the sector. An attorney representing victims of North Korean terrorism filed restraining notices targeting the Arbitrum DAO, asserting that 30,765 ETH frozen after the Kelp bridge exploit should be recognized as North Korean property under U.S. enforcement laws. This claim sparked a dispute from lending giant Aave, which argued that an individual cannot gain lawful ownership of stolen property merely by taking it. The Kelp breach was similarly attributed to Lazarus Group operatives, contributing to losses exceeding $500 million linked to a single state actor within just a month.
As the cryptocurrency industry continues to grapple with these sophisticated threats, whether industry-wide intelligence sharing can effectively thwart these ongoing campaigns remains an open question. Many of the same operatives may already be seeking opportunities elsewhere, potentially leaving organizations vulnerable to the next wave of attacks.


