North Korean operatives stole more than $500 million from crypto protocols in April alone, and Ripple is now feeding its internal dossier on those attackers to the rest of the industry. The company announced Monday that it will share threat intelligence on DPRK hackers with Crypto ISAC, the sector’s collective security group, in what amounts to an admission that no single firm’s defenses can handle the current wave of state-sponsored infiltration.
The trigger was the Drift breach. That $285 million loss did not come from a buggy smart contract or a flash loan exploit. North Korean operatives spent months cultivating relationships with Drift’s contributors, eventually slipping malware onto their machines and extracting the keys. By the time the funds moved, every automated monitoring system designed to catch hacks had nothing unusual to flag.
The Social Engineering Pivot Changes Everything
Between 2022 and 2024, DeFi hacks followed a predictable script. Attackers found vulnerabilities in smart contract code, drained protocols in minutes, and disappeared. Security teams responded by hiring more auditors, running bug bounties, and deploying real-time monitoring. Code-level defenses got meaningfully better.
So the attackers changed tactics. Instead of hunting for software bugs, Lazarus Group operatives started hunting for people. They apply for developer jobs at crypto firms, submit polished resumes, pass background checks, and show up on video calls looking entirely normal. They build trust for months. Then they deploy custom malware that no signature-based detection tool recognizes, because the attacker is already an insider.
This is not a hypothetical scenario. Our prior coverage on Lazarus Group’s “Mach-O Man” malware documented how CertiK warned crypto executives about a new toolkit that hijacks routine video calls and erases itself before victims notice the intrusion. That warning came in April. Weeks later, half a billion dollars walked out the door.
The Drift and Kelp exploits together represent what might be the most concentrated period of state-actor theft in crypto history. A single month. A single adversary. More than $500 million. And neither attack relied on the kind of technical vulnerability the industry has spent years learning to patch.
What Ripple Is Actually Sharing
Ripple’s contribution to Crypto ISAC centers on profile data, the kind of information that makes patterns visible across companies. LinkedIn accounts. Email addresses. Phone numbers. Geographic indicators. The connective tissue that lets one firm’s security team recognize a suspicious job applicant as the same operative who failed background checks at three other companies last week.
“The strongest security posture in crypto is a shared one,” Ripple posted on X. “A threat actor who fails a background check at one company will apply to three more that same week. Without shared intelligence, every company starts from zero.”
That framing captures the asymmetry of the current threat. Defenders are siloed. Attackers are coordinated. If Company A catches an operative but doesn’t tell Companies B, C, and D, those firms have no warning when the same person applies under a slightly different identity next Tuesday.
The practical mechanics of sharing this data raise their own questions. How quickly does intelligence propagate? What legal exposure do companies face for flagging individuals who turn out to be legitimate candidates? How do you verify that the data you’re receiving from a peer firm is accurate rather than planted disinformation?
None of those questions have obvious answers. But the alternative, every company reinventing its own intelligence operation, clearly isn’t working when a single threat actor can extract nine figures from two protocols in 30 days.
Legal Chaos Follows the Money
The Kelp bridge exploit drained $292 million in Ethereum, and the frozen remnants of that theft are now at the center of an unusual legal battle. An attorney representing victims of North Korean terrorism served restraining notices on Arbitrum DAO on Monday, arguing that the 30,765 ETH locked after the breach constitutes North Korean property under US enforcement law.
The logic runs like this: if Lazarus Group is responsible for the theft, and Lazarus Group is an arm of the DPRK regime, then the stolen funds are effectively state property. Victims of North Korean terrorism have existing US court judgments entitling them to compensation. If those judgments can attach to crypto assets identifiably linked to North Korean actors, the frozen Kelp funds become a recovery target.
Our earlier reporting on this case, Arbitrum DAO Hit With $877M Legal Claim Over Frozen Hack Funds, laid out the scale of the claim. The total demand exceeds $877 million, well above the roughly $70 million in ETH currently frozen.
Aave has filed a response disputing the restraining notices. The lending protocol argued that “a thief does not gain lawful ownership of stolen property simply by taking it.” That’s a foundational principle of property law, but applying it to crypto recovered from sanctioned entities involves layers of jurisdictional complexity that courts have barely begun to sort out.
The legal fight matters beyond its immediate parties because it establishes precedent for how frozen hack proceeds get distributed. If terrorism victims can successfully claim funds attributed to Lazarus Group, future recoveries could face competing claimants before original depositors see a cent. That creates an odd incentive structure where proving a North Korean link might actually complicate victim compensation rather than simplify it.
The Insider Threat Model Is Harder to Defend
Traditional cybersecurity assumes a perimeter. Attackers are outside; defenders build walls. The Lazarus Group’s current methodology inverts that model. Attackers are inside, hired through legitimate processes, trusted with legitimate access.
Consider what has to go right for a code-based exploit to succeed. The attacker needs to find a vulnerability that auditors missed, craft an exploit before it gets patched, execute it without triggering monitoring, and launder the proceeds through mixers or bridges. Each step introduces failure modes.
Now consider the social engineering path. The attacker needs to fabricate a plausible identity, interview well enough to get hired, wait long enough to gain access to critical systems, and deploy malware that isn’t flagged by endpoint detection. The technical bar is lower. The patience bar is higher.
Drift’s contributors weren’t careless. They followed standard hiring practices. The problem is that standard hiring practices were designed for a world where applicants are mostly legitimate professionals, not intelligence operatives running multi-month infiltration campaigns.
Some crypto firms have responded by adding more verification layers. Reference calls to previous employers. Video interviews with cameras on. Technical assessments that require live coding. But North Korean operatives have reportedly used deepfakes and screen-sharing workarounds to pass video checks. They’ve built entire fake employment histories with accomplices ready to provide references.
The fear and greed index tracks market sentiment, but there’s no equivalent metric for organizational paranoia. How suspicious should a hiring manager be of a talented developer with a slightly unusual resume? Ratcheting up skepticism protects against infiltration but also filters out legitimate candidates and slows hiring velocity. The equilibrium point isn’t obvious.
Whether Intel Sharing Works Remains an Open Question
Ripple’s move is a response to failure, not a proven solution. The company is contributing data because the existing defenses didn’t stop the bleeding. Whether pooled intelligence actually slows future campaigns depends on factors no single firm controls.
Lazarus Group operatives presumably know that background check databases exist. They know that crypto companies compare notes. The rational response is to generate more identities faster, to outpace the industry’s ability to blacklist them. North Korea reportedly runs thousands of IT workers who apply for remote jobs globally, not all of whom are assigned to theft operations. The sheer volume of potential infiltrators makes pattern matching harder.

There’s also a coordination problem among defenders. Crypto ISAC is a membership organization. Not every crypto company is a member. Even among members, sharing sensitive data requires trust that the information won’t leak or be misused. Companies that compete for talent might hesitate to share hiring intelligence with rivals.
And the timeline matters. Drift’s attackers spent months inside the organization before striking. If intelligence sharing identifies an operative after they’ve already been hired and given access, the warning comes too late. The value of shared data is highest at the initial application stage, before trust is extended.
The derivatives markets have been relatively calm through all this. Check the funding rates on our derivatives dashboard and you’ll see that traders aren’t pricing in systemic contagion from these hacks. That might reflect confidence that the losses are contained to specific protocols, or it might reflect the market’s short attention span for security incidents that don’t immediately crash prices.
The Broader Industry Pattern
Ripple’s decision to open its intelligence files comes at an interesting moment for the company. Our March coverage noted that Ripple is testing AI on the XRP Ledger as institutional adoption accelerates. The company is simultaneously expanding its technology footprint and positioning itself as a security leader, two moves that reinforce each other if the industry buys the narrative.
The regulatory backdrop is shifting too. The SEC and CFTC signed a historic MOU in March to coordinate crypto oversight. That agreement focused on market structure and investor protection, not cybersecurity. But the same agencies that scrutinize token offerings could eventually demand baseline security standards for protocols handling customer funds. A string of nine-figure hacks attributed to a hostile foreign government provides exactly the kind of headline that prompts congressional hearings.
The XRP price has held relatively steady through the news cycle. Markets apparently don’t view intel sharing as a negative signal for Ripple specifically. If anything, the announcement positions the company as proactive rather than reactive, a firm that had intelligence worth sharing rather than a victim scrambling to explain losses.
For smaller protocols without Ripple’s resources, the calculus is different. Building an internal threat intelligence function is expensive. Vetting job applicants at intelligence-agency levels of scrutiny is expensive. The firms most vulnerable to social engineering attacks are often the ones least able to afford sophisticated defenses.
Crypto ISAC’s value proposition, in theory, is democratizing threat data so that smaller players benefit from information gathered by larger ones. The effectiveness of that model depends on the quality of the data, the speed of distribution, and the willingness of members to act on warnings. None of those variables are guaranteed.
What Comes Next
The operatives who pulled off Drift and Kelp are presumably not sitting idle. If the pattern holds, they’re already cultivating contacts at their next targets, building trust on Discord servers and Telegram groups, waiting for the right moment to deploy the next payload.
The industry’s response is playing out on two tracks. Defensive measures like intel sharing, enhanced background checks, and endpoint monitoring might slow the current methodology. But attackers adapt. The same creativity that pivoted from smart contract exploits to social engineering will eventually pivot again.
Legal remedies offer a different kind of deterrence. If terrorism victims can successfully claim frozen hack proceeds, the financial incentive to attribute thefts to sanctioned actors increases. More resources flow into blockchain forensics. More frozen funds get locked in litigation. Whether that deters future attacks or just makes the laundering phase more complicated is unclear.
For now, Ripple’s intel dump is the industry’s most concrete response to a threat that has already extracted half a billion dollars this year. It’s an acknowledgment that the old defenses failed and that collective action is the next experiment. Whether that experiment works, we’ll probably know by the next nine-figure headline.
Ripple is betting that shared intelligence changes the odds. The honest assessment is that nobody knows if it will.
Related Reading
Sources
Nothing in this article constitutes investment advice. Cryptocurrency carries risk, always do your own due diligence.




