- My Forums
- Tiger Rant
- LSU Recruiting
- SEC Rant
- Saints Talk
- Pelicans Talk
- More Sports Board
- Fantasy Sports
- Golf Board
- Soccer Board
- O-T Lounge
- Tech Board
- Home/Garden Board
- Outdoor Board
- Health/Fitness Board
- Movie/TV Board
- Book Board
- Music Board
- Political Talk
- Money Talk
- Fark Board
- Gaming Board
- Travel Board
- Food/Drink Board
- Ticket Exchange
- TD Help Board
Customize My Forums- View All Forums
- Show Left Links
- Topic Sort Options
- Trending Topics
- Recent Topics
- Active Topics
Started By
Message
North Korean crypto fraud
Posted on 4/6/26 at 9:27 am
Posted on 4/6/26 at 9:27 am
Can anyone explain this like I’m 6?
How did North Korea carry out this hack of the crypto trading platform Drift?
They stole 285million in less than 20 minutes…
LINK
Posted on 4/6/26 at 9:28 am to SlidellCajun
quote:US Gov does that every April
They stole 285million in less than 20 minutes…
Posted on 4/6/26 at 9:37 am to SlidellCajun
reads as if it was fraud not a hack
quote:
How did North Korea carry out this hack
Posted on 4/6/26 at 10:14 am to SlidellCajun
That's what they do. Going for another record
quote:
For the second year in a row, North Korea’s vast cryptocurrency hacking operation has broken its own record, stealing $2.02 billion in 2025, new research says.
A report published Thursday by the blockchain watchdog company Chainalysis found that North Korea broke its own record of $1.3 billion in hacked and stolen crypto like bitcoin and ethereum. That brings the country’s total stolen crypto to around $6.75 billion, the report said. The total amount of stolen crypto around the globe rose to $3.4 billion.
A significant chunk of that comes from the hack of the Dubai-based cryptocurrency exchange Bybit this year. The hackers — who worked for North Korea’s elite government hacking squad, according to the U.S. Secret Service — stole around $1.5 billion, mostly in ethereum, in February, Bybit’s CEO said.
Chainalysis is one of a growing number of companies that map out the sprawling network of cryptocurrency transactions, including tracing hacked funds as they’re laundered by criminals.
quote:
Part of the theft is most likely due to the increasingly common phenomenon of North Korean hackers’ fraudulently obtaining remote technical jobs with international companies, the report said. That access can put them in positions to give their hacker colleagues a foothold to steal cryptocurrency keys and wire crypto to Pyongyang.
But no country has an alleged operation like North Korea’s, whose hackers working directly for the government routinely steal such large sums from companies around the world.
Posted on 4/6/26 at 10:29 am to SlidellCajun
is it fair for the world to re-fraud/hack the norks and india?
Posted on 4/6/26 at 7:41 pm to SlidellCajun
quote:
Step 1: Create a Fake Token (March 11–23)
Three weeks before the heist, the attackers withdrew 10 ETH from Tornado Cash—a crypto mixing service—at around 9:00 AM Pyongyang time. They used it to deploy a fictitious token called CarbonVote (CVT). They minted 750 million units, seeded a few thousand dollars in liquidity on Raydium, and ran wash trades to build a fake price history near $1.[1]
Drift’s oracles accepted CVT as valid collateral. No minimum liquidity threshold. No time-weighted price validation. The fake token looked real enough for the protocol to treat it as worth hundreds of millions.
Step 2: Trick the Multisig Signers (March 23–30)
Drift’s Security Council—a five-member multisig—controlled the protocol’s admin functions. The attackers social-engineered at least two signers into pre-signing transactions that looked routine but contained hidden authorizations for critical admin actions.[1][3]
The key trick: durable nonces. Normal Solana transactions expire after a few minutes if not executed. But durable nonce accounts replace the expiring blockhash with a fixed code that keeps the transaction valid indefinitely. The attackers got signatures on transactions that sat dormant for over a week.[3]
Step 3: Remove the Last Safety Net (March 27)
Drift migrated its Security Council to a zero-timelock configuration. This meant approved transactions could execute instantly—no delay, no review period. TRM Labs called this “the protocol’s last line of defense.”[1]
It was gone before the attackers even pulled the trigger.
What did the article not explain already that you need help with?
Posted on 4/9/26 at 7:56 am to LemmyLives
The article has a lot of jargon that I’m not familiar with.
I don’t know what some of the words mean-
Ie- normal Solana, multi sig signers, Drift’s oracles…
So I ask that you help.
Can you?
I don’t know what some of the words mean-
Ie- normal Solana, multi sig signers, Drift’s oracles…
So I ask that you help.
Can you?
Posted on 4/9/26 at 8:21 am to SlidellCajun
I didn’t get most of the freewheeling jargon, but I’m not sure the writer does either. His repeated narrative was these heists fund North Korea. Yet he selectively omitted the fact that while they steal a lot of crypto, they’ve been wholly unable to cash out into real currency.
The real question is what is the end game for hitting high profile 9-figure targets they are unable to convert to dollars.
The real question is what is the end game for hitting high profile 9-figure targets they are unable to convert to dollars.
Posted on 4/9/26 at 11:55 am to lsuconnman
They convert the crypto in money via The Chinese Laundromat
quote:
Outsourced Laundering ("The Chinese Laundromat")
OTC Brokers: North Korea rarely interacts directly with regulated, mainstream exchanges. Instead, they transfer stolen funds to a network of specialized, "rogue" over-the-counter (OTC) brokers.
Underground Banking: These brokers, often based in Southeast Asia and specializing in Chinese Yuan (CNY) settlement, purchase the stolen crypto at a discount and handle the off-chain settlement.
Mirror Payments: Intermediaries use complex methods like mirror payments (trade-based laundering) to settle transactions in fiat without leaving a blockchain trail.
Posted on 4/9/26 at 12:27 pm to TigerintheNO
I get that. We had the same discussion after they hacked Bybit last year. They still haven’t been able to wash 90% of that theft and every agency is tracking what’s left.
Stealing an additional few hundred million while sitting on billions more you can’t unload is irrational, and just an unproductive application of god given talent.
At this point they’re just trying to set the system on fire to watch it burn.
Stealing an additional few hundred million while sitting on billions more you can’t unload is irrational, and just an unproductive application of god given talent.
At this point they’re just trying to set the system on fire to watch it burn.
Posted on 4/9/26 at 1:18 pm to SlidellCajun
I've heard of someone who is a mutual friend had millions of crypto stolen from him. How it happened I don't know. I cannot imagine being in that dude's position. He probably thought WTF was I thinking by betting on crypto?
When I heard about that NY guy being tortured for his crypto password but luckily escaped, I said there is no way in hell I am investing in that.
When I heard about that NY guy being tortured for his crypto password but luckily escaped, I said there is no way in hell I am investing in that.
Posted on 4/9/26 at 1:32 pm to lsuconnman
I read that by the start of 2025 over 20% had already went dark and had been washed.
Posted on 4/9/26 at 2:04 pm to TigerintheNO
Seems like the entire story just went dark after last April. I found they got $200 million out, but it seemed like it was all accomplished before anyone discovered the hack. After that a bounty was placed on the rest and it remains dormant.
Popular
Back to top
6









