North Korean Cyber Spies Target Crypto Conferences

Picture this: a friendly chat at a crypto conference. Six months later, $285 million gone. North Korean spies are shaking hands now, not just hacking screens.

North Korean Spies Ditch Keyboards for Handshakes in $285M Crypto Heist — theAIcatchup

Key Takeaways

  • North Korean hackers now use in-person conference networking for targeted crypto exploits, like Drift's $285M loss.
  • Beyond hacks, DPRK runs fake IT worker networks pulling $1M/month via remote jobs.
  • Defenses like Kim-insult tests work, but spies adapt—expect tighter conference security.

Handshake sealed at the booth. Smiles all around. Fast-forward six months—Drift’s $285 million evaporates into the ether.

North Korean cyber spies aren’t phoning it in anymore. They’re showing up. In the flesh. At your favorite crypto confabs. And Drift just learned that the hard way.

This $285 million exploit on the Solana-based DEX? Biggest DeFi hack of 2026 so far. TRM Labs calls it that. Second-largest in Solana history, trailing only Wormhole’s $326 million fiasco from ‘22. But here’s the kicker: these state-backed goons didn’t just phishing-link their way in. No. They played the long game, in person.

Crypto Conferences: New Spy Playground?

Drift spilled the beans on X Sunday. Attackers posed as a quantitative trading firm. Approached the protocol team—face-to-face—at a major industry shindig this past autumn. Then kept at it. For six months. Across multiple conferences. Multiple countries.

“It is now understood that this appears to be a targeted approach, where individuals from this group continued to deliberately seek out and engage specific Drift contributors, in person, at multiple major industry conferences in multiple countries over the following six months,” said the DEX.

That’s not a cold email. That’s networking. The kind that doesn’t ping your spam filter. Who suspects the guy with the badge and the pitch? Until your multisig signers greenlight a scam token, anyway.

Exploit went down mid-March. Funds from Tornado Cash. CarbonVote Token (CVT) deployed. Social engineering magic—signers approve elevated perms. Boom. Token minted en masse, trading faked to pump volume. Oracles buy the hype. April 1st: CVT as collateral. Limits jacked. USDC drained.

Laundering? Faster and fiercer than Bybit’s $1.4 billion mess last year. North Korea’s playbook expanding. Hacks for the big scores. Infiltration for the drip-feed cash.

UN reckons it’s all funding missiles. Thursday, DPRK state media bragged about an electromagnetic weapon test. And a Hwasong-11 with cluster warheads. Coincidence? Please.

But wait—there’s steady revenue too.

A network of fake IT workers. Posing as devs. Embedding in crypto and tech shops. ZachXBT got data from an anon source: $1 million a month. Over $3.5 million since November. Falsified IDs. Shared payment system. Fiat via Payoneer to Chinese banks. Basic setup—a shared site, common password, leaderboards for earnings. They applied openly. VPNs. Fab docs.

Security researcher Taylor Monahan notes DeFi infiltration since “DeFi summer.” Forty protocols touched by DPRK suspects.

Cointelegraph’s own 2025 probe? Months chatting a “Motoki,” fake Japanese dev. He rage-quit a dummy interview when asked to intro in dialect. They bypass geo-blocks via remote US machines. Not VPNs—direct access. Looks local.

Viral defense: make ‘em trash Kim Jong Un on the call. Works so far. But Drift? In-person charm offensive. García’s finds? Creative geo-hacks. Cat and mouse. They’re adapting.

Why Your Next Confab Feels Sketchy Now

Remember the Cold War? KGB honey traps at diplomatic dos. North Korea’s cribbing the script—swap caviar for conference swag. Unique insight: this isn’t evolution; it’s regression to spycraft 101. Crypto thought remote was the threat. Nah. Physical proximity’s the new vector. Bold prediction: expect badge-checks and Kim-insult icebreakers at Devcon 2027. Metal detectors optional.

Corporate hype calls it “targeted engagement.” Please. It’s a heist with hors d’oeuvres. Drift’s post reeks of post-mortem spin—“review your connections!” Too late, pals.

Defenses? Evolving, sure. Headhunters wise up. But spies pivot. In-person at events? Blends right in. Freelancers—watch your gigs. They might be using you as a money mule.

TRM traces the aggression. Speedy laundering. But the real scam? Trust. Crypto’s built on it. One schmooze, and poof.

And the weapons tests? Timed perfectly. Steal. Launder. Test. Repeat. Fintech’s bleeding for Pyongyang’s arsenal.

Short version: lock your doors. Even at the afterparty.

How Do North Korean Hackers Beat Remote Defenses?

Remote roles were the old game. Fake devs on Upwork. Steady $1M/month. Now? Hybrid. Conferences for intros. Remote for execution. Bypass VPN flags with U.S.-proxied rigs. Interviews? Dodge dialects. Or go live—no screens.

Insult test? Gold so far. But they’ll script it. Or send a local cutout. Adaptation’s their superpower.

DeFi’s oracle flaw? Treats fake volume as real. Fix that, maybe. But social engineering? Human weak spot. Eternal.

Look, crypto bros love the decentralization dream. But North Korea’s laughing. They’re the ultimate outsiders—state-sponsored, no rules. Your multisig? Their playground.

Historical parallel: Enigma codebreakers infiltrated Bletchley. Spies always go human. Tech’s just the tool.

Prediction: conference vetting goes nuclear. Background checks mandatory. No badge, no booth. PR spin will cry “trustless stifles innovation.” Bull. Survival demands suspicion.

Drift lost $285M. Bybit $1.4B. Infiltration networks millions monthly. Total haul? Weapons-grade.

Wake up. They’re not remote threats anymore.


🧬 Related Insights

Frequently Asked Questions

What happened in the Drift $285M hack?

North Korean-linked hackers posed as traders, met Drift team in-person at conferences, socially engineered multisig approvals for a fake token (CVT), then drained funds via manipulated oracles.

Are North Korean spies at crypto conferences?

Yes—targeted in-person approaches over six months across events. Review those business cards.

How to spot North Korean IT infiltrators?

Viral test: ask them to insult Kim Jong Un. Failsafe so far. Also check docs, dialects, geo-IP quirks.

Elena Vasquez
Written by

Senior editor and generalist covering the biggest stories with a sharp, skeptical eye.

Frequently asked questions

What happened in the Drift $285M hack?
North Korean-linked hackers posed as traders, met Drift team in-person at conferences, socially engineered multisig approvals for a fake token (CVT), then drained funds via manipulated oracles.
Are North Korean spies at crypto conferences?
Yes—targeted in-person approaches over six months across events. Review those business cards.
How to spot North Korean IT infiltrators?
Viral test: ask them to insult Kim Jong Un. Failsafe so far. Also check docs, dialects, geo-IP quirks.

Worth sharing?

Get the best AI stories of the week in your inbox — no noise, no spam.

Originally reported by Cointelegraph

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.