Categories: Crypto

Expert Says North Korean IT Workers Helped Build Top Protocols During DeFi Summer




North Korean developers weren’t faking resumes, said Taylor Monahan, who went on to add that they were actively building prominent DeFi platforms and later enabled billions in crypto losses.

Cybersecurity researcher Taylor Monahan has claimed that North Korea-linked IT workers have been operating within the decentralized finance ecosystem for years. Monahan stated that these actors have contributed to many well-known protocols during the “DeFi summer” era of 2020.

According to her latest tweet, the years of blockchain development experience listed on their resumes were often genuine, which was indicative of real technical contributions rather than fabricated credentials.

Years of DeFi Infiltration

When asked for examples, she pointed to several prominent projects, including SushiSwap, THORChain, Yearn, Harmony, Ankr, and Shiba Inu, among many others. Monahan also revealed that some teams, like Yearn, stood out for their strict approach to security, relying heavily on peer review and maintaining a high level of skepticism toward contributors.

This, she implied, helped limit potential exposure compared to other projects. Additionally, Monahan warned that the tactics have evolved, and these groups are now potentially using non-North Korean individuals to carry out parts of their operations, including in-person interactions. According to the security expert’s estimates, these entities may have collectively extracted at least $6.7 billion from the crypto space during this period.

North Korea has continued to dominate crypto-related cybercrime, emerging as the largest state-backed threat in the sector. According to an earlier report by Chainalysis, DPRK hackers stole at least $2.02 billion in digital assets in 2025 alone, which is a 51% increase from 2024 and accounts for 76% of all service-related breaches.

While there were fewer attacks, the scale was significantly larger. Chainalysis attributed this scale to the state-backed groups’ use of infiltrated IT workers who gain access to crypto firms, including exchanges and custodians, before major exploits take place.

Once funds are stolen, these actors typically move assets in smaller transactions, with more than 60% of transfers under $500,000. Their laundering methods rely heavily on cross-chain tools, mixing services, and Chinese-language financial networks.

You may also like:

Security Alliance (SEAL) had previously found that cyberattacks using fake Zoom or Microsoft Teams calls were carried out by these groups to infect victims with malware. These operations often begin through compromised Telegram accounts, where attackers pose as known contacts and invite targets to join a video call.

During the meeting, pre-recorded videos are used to appear legitimate before victims are told to install a supposed update, which instead grants attackers access to their devices. Once inside, these actors steal sensitive data and reuse hijacked accounts to spread the attack further.

Expanding Attack Surface

North Korea-linked hackers were also suspected to be behind the March 1 breach of Bitrefill. The attackers reportedly gained entry through a compromised employee device and managed to extract credentials that allowed deeper access into internal systems.

From there, they moved into parts of the database and drained funds from hot wallets while also exploiting gift card supply flows. Indicators such as malware patterns, on-chain behavior, and reused infrastructure matched previous operations tied to the Lazarus and Bluenoroff groups.

SPECIAL OFFER (Exclusive)

Binance Free $600 (CryptoPotato Exclusive): Use this link to register a new account and receive $600 exclusive welcome offer on Binance (full details).

LIMITED OFFER for CryptoPotato readers at Bybit: Use this link to register and open a $500 FREE position on any coin!



Source link

Adam Forsyth

Share
Published by
Adam Forsyth

Recent Posts

Iran leadership crisis as Khamenei reportedly unconscious, regime fall odds spike

Iran’s Supreme Leader, Mojtaba Khamenei, is reportedly unconscious, raising concerns about leadership in Iran. The…

10 minutes ago

AI startup Rocket offers vibe McKinsey-style reports at a fraction of the cost

Indian startup Rocket is betting that the next big opportunity is the part before vibe…

23 minutes ago

What You Need to Know About the 2028 Timeline – Taxes Bitcoin News

Key Takeaways: On March 31, the Diet passed a stopgap budget that keeps the proposal…

24 minutes ago

XRP’s Price is Crashing Again and This Key Level Could Decide Everything

XRP's price remains suppressed and further downside could be around the corner. XRP’s price…

1 hour ago

A $20 Private AI Tool Makes Analyzing Spreadsheets Much Easier

Your Data Assistant is a local data analysis tool for spreadsheets that lets you talk…

1 hour ago

Roblox Ban Temporarily Deferred as Platform Agrees to New Safety Measures — Digital Pinoys

The potential nationwide ban on the online gaming platform Roblox has been temporarily deferred following…

1 hour ago