The Drift hack revealed a North Korean infiltration playbook that the entire crypto industry now needs to defend against
-

The Drift Protocol hack has become the defining case study for a threat model that most crypto security teams were not designed to detect. Attackers spent months building genuine trust with Drift contributors before deploying malicious software that compromised devices and bypassed the technical indicators of compromise that traditional security tooling monitors. The intrusion was not a remote attack on a smart contract or a brute-force credential compromise. It was a patient social engineering operation where North Korean actors embedded themselves close enough to the organization to gain access to multisig wallet controls and ultimately drain the protocol. The same operational pattern has been documented at both crypto firms and traditional financial institutions, confirming that the technique is not specific to DeFi's technical architecture but to the human trust layer that exists in every organization.
Crypto ISAC characterized the Drift campaign as social engineering at a qualitatively new level, raising a question that no amount of smart contract auditing addresses: how do you detect someone who presents as a trusted contributor or employee? The answer Ripple and Crypto ISAC are building toward is shared intelligence that allows companies to cross-reference job applicants, contractors, and contributors against a database of known DPRK-linked identities, domains, and behavioral signals that a single organization would never accumulate on its own. The enriched profiles contributed by Ripple, including LinkedIn accounts, email addresses, and contact numbers tied to active North Korean IT worker campaigns, give security teams a starting point for due diligence that would otherwise require months of independent investigation to develop. North Korean hacking groups were responsible for 76% of all crypto hack losses through April 2026, and the majority of that damage came from two operations that both relied on insider access rather than technical exploits.
-
Smart contract audited, penetration tested, security stack reviewed, hired a North Korean IT worker anyway, classic