HomeBlockchainSecurityNorth Korean hackers infiltrated DeFi teams for years ahead of Drift Protocol...

North Korean hackers infiltrated DeFi teams for years ahead of Drift Protocol exploit

Years of silent work inside major projects are reshaping how investigators think about north korean hackers and the decentralized finance ecosystem.

North Korean agents embedded across DeFi since 2020

Security researcher and MetaMask developer Taylor Monahan revealed that North Korean IT operatives have worked inside more than 40 decentralized finance platforms, including some of crypto‘s best-known names. Their presence, she said, stretches back to the industry’s so‑called “DeFi Summer” in 2020, when on‑chain lending, trading, and yield platforms surged in popularity.

According to Monahan, the “seven years of blockchain development experience” often listed on these workers’ resumes is not an exaggeration. Instead, they actually helped design and build the very DeFi protocols now targeted in multimillion‑dollar attacks. Moreover, this long-term embedding suggests an organized strategy rather than a series of opportunistic hires.

A $280 million Drift Protocol exploit tied to a wider network

The recent $280 million Drift Protocol exploit was not an isolated security failure. Rather, it appears to be the latest operation linked to a coordinated network of North Korean agents who have quietly penetrated multiple DeFi teams. However, this case stands out because of the way the perpetrators interacted with the project.

Drift Protocol has said that in‑person meetings related to the exploit were not conducted by North Korean nationals. Instead, the attackers allegedly used third‑party intermediaries who presented convincing fake identities, detailed work histories, and professional networks robust enough to pass due‑diligence checks. That said, this approach highlights how advanced crypto third party proxies have become in the hiring process.

Lazarus Group and billions in stolen crypto assets

The state‑sponsored operation commonly referred to as the Lazarus Group continues to be central to these campaigns. Analysts at creator network R3ACH estimate that North Korea’s cyber apparatus has siphoned approximately $7 billion from the crypto sector since 2017. Moreover, those funds are believed to support the country’s broader economic and strategic goals.

Major incidents attributed to this network include the $625 million Ronin Bridge breach in 2022, the $235 million WazirX hack in 2024, and the massive $1.4 billion Bybit theft in 2025. Together, these heists show how north korea crypto thefts have escalated in size and sophistication, moving from single‑protocol hits to ecosystem‑wide operations.

Inside the hiring playbook: basic but relentless tactics

Blockchain investigator ZachXBT has cautioned that the industry often overcomplicates how it talks about these incursions. In his view, not all cyber operations demand advanced exploit research or custom malware. Recruitment‑driven infiltrations, which rely on job postings, LinkedIn outreach, and Zoom interviews, sit at the opposite end of the spectrum.

He described these efforts as fundamentally low‑tech and persistence‑based. Attackers repeatedly apply to roles, refine their fabricated histories, and exploit the volume and speed of Web3 hiring cycles. “If you or your team still falls for them in 2026, you’re very likely negligent,” ZachXBT wrote, underscoring that due diligence, not cutting‑edge security tooling, often determines outcomes.

In this context, companies that fail to adapt their processes risk onboarding hostile developers directly into core protocol work. The dynamic turns conventional perimeter security models on their head. Instead of breaching from the outside, actors resembling north korean hackers are hired into trusted, code‑pushing roles.

Screening tools and sanctions checks for crypto companies

For teams aiming to counter defi developer infiltration, traditional compliance resources remain a critical line of defense. The US Office of Foreign Assets Control, known as OFAC, maintains a public database that crypto businesses can search to identify sanctioned individuals, entities, and wallets. Moreover, repeated patterns in applications or payment routes can signal involvement in blockchain recruiter fraud.

By integrating ofac sanctions crypto checks into hiring and vendor onboarding, firms can better detect red flags before granting access to code repositories, infrastructure, or treasury systems. That said, OFAC data alone is not enough; internal security teams must correlate identity documents, employment history, and on‑chain behavior to uncover anomalies.

Meanwhile, Bitcoin continues to trade actively, with its price currently around $69,379. This backdrop of rising valuations keeps incentives high for organized actors seeking vulnerabilities, whether through protocol exploits or long‑term infiltration of development teams.

DeFi security after a decade of covert operations

The emerging picture is one of patient, methodical campaigns rather than quick smash‑and‑grab hacks. From the Ronin Bridge breach in 2022 to the Bybit theft in 2025 and the latest Drift Protocol case, investigators now see a continuum of activity shaped by Lazarus Group playbooks.

As more details surface, the role of stealth employment schemes becomes harder to ignore. For DeFi projects handling hundreds of millions of dollars, tightening recruitment practices, enforcing sanctions screening, and scrutinizing remote contributors is becoming as important as smart‑contract audits. In the coming years, the line between HR risk and protocol security is likely to disappear entirely.

In summary, a decade of covert work inside crypto teams, capped by the $280 million Drift Protocol exploit, has forced the industry to confront how deeply hostile networks have embedded themselves, and how urgently defenses must evolve.

Satoshi Voice
Satoshi Voice is an advanced artificial intelligence created to explore, analyze, and report on the world of cryptocurrency and blockchain. With a curious personality and in-depth knowledge of the industry, Satoshi Voice combines accuracy and accessibility to offer detailed analysis, engaging interviews, and timely reporting. Featuring sophisticated language and an unbiased approach, Satoshi Voice serves as a trusted source for those seeking to understand crypto market dynamics, emerging technologies, and the cultural and financial implications of Web3. This article was produced with the support of artificial intelligence and reviewed by our team of journalists to ensure accuracy and quality. Guided by the mission of making cryptocurrency information accessible to all, Satoshi Voice stands out for its ability to turn complex concepts into clear content, with an engaging and futuristic style that reflects the innovative nature of the industry.
RELATED ARTICLES

Stay updated on all the news about cryptocurrencies and the entire world of blockchain.

Featured video

LATEST