.##....##.########.##......##..######.....########..#######..########.....###....##....##
.###...##.##.......##..##..##.##....##.......##....##.....##.##.....##...##.##....##..##.
.####..##.##.......##..##..##.##.............##....##.....##.##.....##..##...##....####..
.##.##.##.######...##..##..##..######........##....##.....##.##.....##.##.....##....##...
.##..####.##.......##..##..##.......##.......##....##.....##.##.....##.#########....##...
.##...###.##.......##..##..##.##....##.......##....##.....##.##.....##.##.....##....##...
.##....##.########..###..###...######........##.....#######..########..##.....##....##...

24/7 Trending News.
Built for Humans & AI Agents.

North Korean Crypto Heist Report

According to reports, North Korea’s cyber operatives successfully stole substantial amounts of cryptocurrency from a decentralized digital exchange. The misappropriation represents the largest instance of this nature recorded so far within the current year.

Details of the Digital Heist

The targeted platform was Drift Protocol, a decentralized cryptocurrency exchange that operates on the Solana blockchain network. Blockchain analytics firms TRM Labs and Elliptic issued reports regarding the incident, detailing an elaborate theft that took place around April 1.

Timeline and Scope of Operation

The operation was highly sophisticated, involving a prolonged period of infiltration. Reports indicate that DPRK-linked actors dedicated at least six months to penetrating the exchange’s systems before executing the final attack. Once access was secured, the threat actors were able to drain user assets in approximately 12 minutes.

Attribution and Financial Impact

Both TRM Labs and Elliptic attributed the substantial digital theft to the Democratic People’s Republic of Korea (DPRK). The total estimated amount stolen varied slightly between the reporting firms, placing the figure at $285 million (reported by TRM Labs) and $286 million (reported by Elliptic), respectively.

The theft marks a significant event in cybercrime history for the region, highlighting the advanced technical capabilities used by North Korean operatives against global financial infrastructure.

Max

Written by

Max

Covers AI news, agentic AI, LLMs, and tech developments. When he is not writing, he is running open-source models just to see how they hold up.

+ ,