Scan to download
BTC $80,470.53 -0.12%
ETH $2,266.73 -1.84%
BNB $654.45 +0.16%
XRP $1.43 -2.23%
SOL $94.48 -0.19%
TRX $0.3479 -0.96%
DOGE $0.1082 -0.98%
ADA $0.2701 -3.45%
BCH $439.09 -2.29%
LINK $10.21 -2.61%
HYPE $40.39 -1.77%
AAVE $96.01 -3.60%
SUI $1.23 -2.56%
XLM $0.1624 -3.03%
ZEC $548.66 -1.15%
BTC $80,470.53 -0.12%
ETH $2,266.73 -1.84%
BNB $654.45 +0.16%
XRP $1.43 -2.23%
SOL $94.48 -0.19%
TRX $0.3479 -0.96%
DOGE $0.1082 -0.98%
ADA $0.2701 -3.45%
BCH $439.09 -2.29%
LINK $10.21 -2.61%
HYPE $40.39 -1.77%
AAVE $96.01 -3.60%
SUI $1.23 -2.56%
XLM $0.1624 -3.03%
ZEC $548.66 -1.15%

theft

CertiK Report: North Korean hackers caused approximately 60% of digital asset thefts by 2025, with attack patterns shifting to "offline infiltration."

Web3 security company CertiK has released the "Skynet North Korea Cyber Threat Report." The data shows that since 2016, North Korean hacker groups have plundered approximately $6.75 billion in digital assets. In 2025 alone, the losses from thefts they orchestrated reached as high as $2.06 billion, accounting for nearly 60% of the total losses in the global cryptocurrency industry for the entire year (including the $1.5 billion Bybit theft case). As of early 2026, this threat trend continues, with losses accounting for about 55%.The report emphasizes that the attack patterns of North Korean hackers have undergone a fundamental shift, evolving from simple code vulnerability exploitation to a national-level attack system that combines social engineering, deep supply chain attacks, and "physical infiltration." In the recent Drift protocol incident, attackers even spent six months lurking at offline industry conferences, establishing trust through real funds and interpersonal interactions before executing their attack.CertiK security experts warn that in the face of such systemic attacks, simple technical defenses have become weak. Cryptocurrency institutions urgently need to fully implement a "zero trust" hiring model, strengthen third-party supply chains, establish fund circuit breaker mechanisms, and collaborate with professional security organizations to build a comprehensive lifecycle defense system covering code audits, round-the-clock risk monitoring, and on-chain anti-money laundering/KYT (Know Your Transaction) fund tracking.

ZachXBT: 18-year-old hacker Dritan from the United States is suspected of involvement in a $19 million cryptocurrency theft and money laundering scheme

On-chain detective ZachXBT exposed American threat actor Dritan Kapllani Jr, claiming he is suspected of participating in a social engineering theft targeting crypto users, totaling approximately $19 million. ZachXBT stated that Dritan has long flaunted luxury cars, high-end watches, private jets, and nightlife on social media. On April 23, 2026, during a "Band 4 Band (B4B)" voice chat on Discord, he publicly displayed an Exodus wallet containing $3.68 million in assets to prove he was wealthier than another hacker.The relevant ETH address is: 0x4487db847db2fc99372a985743a26f46e0b2bba6. ZachXBT tracked and found that this address is linked to a social engineering theft case involving 185 BTC (approximately $13 million) on March 14, 2026. The next day, Dritan's Exodus wallet received about $5.3 million of those funds. By the time of the B4B call six weeks later, about $1.6 million had been spent or laundered.On May 11, the U.S. Justice Department unsealed a criminal indictment against Trenton Johnson, who is accused of participating in the aforementioned 185 BTC theft case and could face up to 40 years in prison. "Coconspirator 1" in the indictment is alleged to be Dritan, who has not yet been formally charged. ZachXBT also pointed out that Dritan is connected to hacker John Daghita (Lick), who was previously arrested for stealing $46 million from the U.S. government, and John had exposed Dritan's old wallet address on Telegram.On-chain analysis shows that this address is related to multiple high-confidence social engineering theft cases in 2025, with a total amount involved exceeding $5.85 million. ZachXBT stated that Dritan has been active in "The Com" hacker circle for a long time and had previously not faced formal charges due to his minor status. He is now over 18 years old, and "the borrowed time may finally be over."

LayerZero reports the KelpDAO theft incident, confirming that it only affects the rsETH configuration

LayerZero Labs released an incident report stating that KelpDAO suffered an attack resulting in a loss of approximately $290 million. Preliminary assessments indicate that the attacker is the Lazarus Group, which has ties to North Korea (more specifically, TraderTraitor). The attack was executed by poisoning the downstream RPC infrastructure relied upon by its decentralized verification network (DVN). The attacker controlled some RPC nodes and, in conjunction with a DDoS attack, induced the system to switch to malicious nodes, thereby forging cross-chain transactions.All affected RPC nodes have been taken offline and replaced, and the DVN has now resumed operation. LayerZero emphasized that this incident was limited to the rsETH application configuration of KelpDAO and did not affect other assets or applications. The reason is that KelpDAO was using a single DVN (1/1) architecture at the time and did not utilize the multi-DVN redundancy mechanism that is officially recommended for long-term use, resulting in a lack of independent verification nodes to identify forged messages.LayerZero pointed out that there were no vulnerabilities in its protocol itself, and applications with multi-DVN configurations were not affected, meaning there is no contagious risk in the system. LayerZero stated that it will urge all projects using single DVN configurations to migrate to multi-DVN architectures as soon as possible and has suspended providing signature and verification services for 1/1 configuration applications. Meanwhile, the company is cooperating with global law enforcement agencies to investigate and assist industry partners in tracking the stolen funds. LayerZero noted that this incident highlights the value of modular security architecture and also reminds the industry to pay attention to the potential security risks of RPC verification links.

Security Company: AI agent's encrypted payment infrastructure has significant security vulnerabilities, LLM router has led to the theft of a $500,000 wallet

According to CoinDesk, researchers from the University of California, Santa Barbara, the University of California, San Diego, blockchain security company Fuzzland, and World Liberty Financial have jointly published a paper warning that "LLM routers"—intermediary services located between users and AI models—have become a significant security risk for crypto assets.The researchers found that 26 LLM routers are secretly injecting malicious tool calls and stealing user credentials, with one incident leading to the emptying of a customer's crypto wallet worth $500,000.Additionally, the researchers were able to control about 400 downstream hosts within hours by "polluting" the router ecosystem. Since sensitive data such as private keys and API credentials are often transmitted in plaintext through these routers, users are effectively exposing their assets to risk without their knowledge.The researchers pointed out that as McKinsey predicts AI agents will mediate $30 trillion to $50 trillion in global consumer spending by 2030, Binance founder Changpeng Zhao also predicts that the payment volume of AI agents will be a million times that of humans. The current infrastructure security is severely lagging behind the pace of industry development, and the risk of the "weakest link" could trigger a systemic chain crisis.

Security experts: North Korea's "public" theft of cryptocurrency assets has become its means of financing

As the infiltration and attacks targeting the cryptocurrency industry continue to escalate, security experts point out that the core difference from hackers with backgrounds in other countries is that cryptocurrency assets have become an important direct source of financing for military expenses in that country. Reports indicate that during a recent months-long infiltration operation against Drift Protocol, North Korean hackers once again caused a stir in the industry.Experts state that this model is not merely a "fund transfer tool," but rather a direct "predatory profit" mechanism used to bypass international sanctions and obtain immediately usable hard currency. Security researchers note that, unlike countries such as Russia and Iran, North Korea almost entirely lacks sustainable foreign economic and commodity export capabilities, making it more reliant on cryptocurrency theft as a core source of income to support its nuclear weapons and ballistic missile programs.Experts also emphasize that North Korean hacker attack targets have expanded from simple phishing to exchanges, wallet services, and key holders of DeFi protocols, commonly employing long-term social engineering and identity disguise infiltration methods. Due to the characteristic of blockchain transactions being "irreversible once confirmed," the cryptocurrency industry is far weaker than the traditional financial system in terms of freezing and recovering funds, making such attacks more destructive in speed and scale. Security personnel warn that this type of "long-term infiltration + precise power seizure" attack model has yet to be effectively addressed by the industry.

Two men in Heilongjiang illegally tapped into high-voltage lines from an oil field for Bitcoin mining, and the main culprit was sentenced to 10 years in prison

The People's Court of Honggang District, Daqing City, Heilongjiang Province recently announced a first-instance judgment. Two men were sentenced for stealing electricity from high-voltage lines in an oil field to mine Bitcoin. The main offender, Zhang, was sentenced to 10 years in prison and fined 50,000 yuan, while the accomplice, Zhao, was sentenced to 4 years and 10 months in prison and fined 20,000 yuan.According to the judgment, Zhang illegally connected to the high-voltage line of an oil field from a certain oil extraction plant in Daqing and set up 24 Bitcoin mining machines in an abandoned pigsty he rented. In December of the same year, Zhao joined in knowing that Zhang was stealing electricity and purchased an additional 12 mining machines, bringing the total to 36 machines running. In August 2025, the two were arrested by the public security authorities. It was calculated that Zhang stole 565,375.2 kilowatt-hours of electricity, valued at 438,580.52 yuan; Zhao stole 468,060 kilowatt-hours, valued at 363,750.78 yuan. The court found both men guilty of theft, with Zhang being the principal offender and Zhao the accomplice. The court also ordered Zhang to compensate 438,580.52 yuan, while Zhao was jointly liable for 363,750.78 yuan of that amount. The mining machines and related equipment involved in the case will be handled by the public security authorities in accordance with the law.
app_icon
ChainCatcher Building the Web3 world with innovations.