{"id":27617,"date":"2026-05-05T17:05:25","date_gmt":"2026-05-05T17:05:25","guid":{"rendered":"https:\/\/bitunikey.com\/news\/ripple-to-share-dprk-hacker-intel-with-crypto-industry-after-577m-in-defi-hacks\/"},"modified":"2026-05-05T17:05:36","modified_gmt":"2026-05-05T17:05:36","slug":"ripple-to-share-dprk-hacker-intel-with-crypto-industry-after-577m-in-defi-hacks","status":"publish","type":"post","link":"https:\/\/bitunikey.com\/news\/ripple-to-share-dprk-hacker-intel-with-crypto-industry-after-577m-in-defi-hacks\/","title":{"rendered":"Ripple to share DPRK hacker intel with crypto industry after $577M in DeFi hacks"},"content":{"rendered":"<p><\/p>\n<div class=\"post-detail__content blocks\">\n<p class=\"is-style-lead\">Ripple is feeding North Korea\u2013linked threat intelligence into Crypto ISAC, hoping shared context on DPRK operatives and DeFi exploits can blunt a 2026 hack wave led by Drift and KelpDAO.<\/p>\n<div id=\"cn-block-summary-block_c9d72726b6a4daeaa72dbf3711443faf\" class=\"cn-block-summary\">\n<div class=\"cn-block-summary__nav tabs\">\n        <span class=\"tabs__item is-selected\">Summary<\/span>\n    <\/div>\n<div class=\"cn-block-summary__content\">\n<ul class=\"wp-block-list\">\n<li>Ripple is contributing exclusive North Korea\u2013linked threat intelligence to the Crypto ISAC information-sharing platform, arguing that \u201cthe strongest security posture in crypto is a shared one.\u201d<\/li>\n<li>DPRK hackers have stolen about $577 million in crypto so far in 2026\u201476% of all hack losses year-to-date\u2014largely via two DeFi exploits on Drift Protocol and KelpDAO.<\/li>\n<li>The intelligence covers enriched profiles of suspected North Korean IT operatives and detailed indicators of compromise (IOCs), as attackers pivot from pure technical exploits to long, social engineering\u2013driven campaigns.<\/li>\n<\/ul><\/div>\n<\/div>\n<p><!-- .cn-block-summary --><\/p>\n<p>Ripple said it has begun sharing internal threat intelligence on North Korean hacking activity with members of Crypto ISAC, a not-for-profit cyber collective focused on the digital asset sector.<\/p>\n<p>In a joint\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.cryptoisac.org\/news-member-content\/north-korean-hackers-are-infiltrating-crypto-companies-ripple-and-crypto-isac-are-sharing-the-intelligence-to-help-stop-them\" target=\"_blank\" rel=\"nofollow\">blog<\/a>, Crypto ISAC growth director Christina Spring wrote that the data \u201cranges from domains and wallets known to be associated with fraud, to Indicators of Compromise (IOCs) from active DPRK hack campaigns.\u201d<\/p>\n<h2 class=\"wp-block-heading\">Ripple\u2019s threat feeds go to Crypto ISAC<\/h2>\n<p>She stressed that what differentiates Ripple\u2019s feeds is not just raw indicators but \u201ccontextual enrichment from a security team with deep expertise of the threat actors impacting the crypto ecosystem,\u201d giving defenders more actionable context than a typical IOC list.<\/p>\n<p>Ripple\u2019s own announcement on X argued that \u201cthe strongest security posture in crypto is a shared one,\u201d adding that \u201ca threat actor who fails a background check at one company will apply to three more that same week. Without shared intelligence, every company starts from zero.\u201d<a rel=\"nofollow\" target=\"_blank\" rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/Ripple\/status\/2051336839202783489\"><\/a><\/p>\n<p>The intelligence reportedly includes enriched profiles of suspected North Korean IT workers attempting to embed themselves inside crypto and fintech firms, tying together email addresses, domains, on-chain wallets, and malware infrastructure used across multiple campaigns.<\/p>\n<h2 class=\"wp-block-heading\" id=\"drift-and-kelpdao-show-a-shift-to-social-engineeri\">Drift and KelpDAO show a shift to social engineering<\/h2>\n<p>Ripple\u2019s move comes in response to a wave of DPRK-linked attacks that have targeted DeFi in 2026, most notably the hacks on Solana-based Drift Protocol and re-staking platform KelpDAO.<\/p>\n<p>TRM Labs estimates that those two incidents alone netted North Korean groups about $577 million\u2014$285 million from Drift and roughly $292 million from KelpDAO\u2014accounting for 76% of all crypto hack value through April.<\/p>\n<p>Chainalysis and TRM note that North Korea\u2013linked actors stole more than $2 billion in 2025, bringing their cumulative haul above $6.7 billion, and that DPRK\u2019s share of global crypto hack losses climbed from under 10% in 2020 to 64% by 2025.<\/p>\n<p>The April 1 Drift exploit followed what The Hacker News and Chainalysis describe as a six\u2011month social engineering campaign that began in late 2025, during which North Korean proxies held in\u2011person meetings with Drift contributors and used that trust to convince signers to pre\u2011authorize withdrawals via Solana\u2019s \u201cdurable nonce\u201d feature.<\/p>\n<p>Attackers then executed 31 pre\u2011signed transactions in about 12 minutes, draining $285 million in assets before bridging most of the funds to Ethereum; TRM says the stolen ETH has largely remained dormant, indicating a cautious, long\u2011horizon laundering plan.<\/p>\n<p>The April 18 KelpDAO exploit used a different playbook: DPRK-linked actors compromised two internal RPC nodes, DDoS\u2019d external nodes, and fed false data into LayerZero Labs\u2019 DVN to mint 116,500 unbacked rsETH, then used that collateral to borrow about $196 million in ETH on Aave.<\/p>\n<p>    <!-- .cn-block-related-link --><\/p>\n<p>Subsequent analysis from TRM and others shows that while the Arbitrum Security Council froze roughly $71.5 million in downstream ETH, the attackers quickly pivoted to swap remaining funds into BTC via THORChain and Chinese intermediaries, underscoring the sophistication and adaptability of their laundering operations.<\/p>\n<p>In response, Aave-led coalition DeFi United has raised more than $300 million in a recovery plan for KelpDAO, while Arbitrum\u2019s emergency freeze and the rapid formation of cross\u2011protocol recovery task forces highlight a growing willingness to coordinate defensive measures at the ecosystem level.<\/p>\n<p>A recent Decrypt\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/finance.yahoo.com\/markets\/crypto\/articles\/ripple-just-made-harder-north-042450480.html\" target=\"_blank\" rel=\"nofollow\">feature<\/a>\u00a0and Ripple\u2019s own messaging frame the new data\u2011sharing initiative as an attempt to get ahead of this evolution in tactics\u2014moving the industry from fragmented awareness to shared, real\u2011time intelligence against what security researcher Natalie Newson at CertiK calls \u201ca state-directed financial operation running at institutional scale and speed.\u201d<\/p>\n<p>    <!-- .cn-block-related-link --><\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Ripple is feeding North Korea\u2013linked threat intelligence into Crypto ISAC, hoping shared context on DPRK operatives and DeFi exploits can blunt a 2026 hack wave led by Drift and KelpDAO.&hellip;<\/p>\n","protected":false},"author":1,"featured_media":2922,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-27617","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptocurrency"],"_links":{"self":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts\/27617","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/comments?post=27617"}],"version-history":[{"count":1,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts\/27617\/revisions"}],"predecessor-version":[{"id":27618,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts\/27617\/revisions\/27618"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/media\/2922"}],"wp:attachment":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/media?parent=27617"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/categories?post=27617"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/tags?post=27617"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}