CoinInsight360.com logo CoinInsight360.com logo
America's Social Casino

CoinDesk 2025-06-20 15:49:21

Decentralized Protocols Are Soft Targets for North Korean Hackers

North Korean hacking groups have been targeting crypto for years. The 2022 $625 million Ronin bridge exploit was an early wake-up call—but the threat has only evolved. In 2025 alone, North Korean-affiliated attackers have been linked to a string of campaigns designed to siphon value and compromise key players in Web3: They’ve targeted $1.5 billion worth of assets at Bybit through credential-harvesting campaigns, with millions already laundered. They’ve launched malware attacks on MetaMask and Trust Wallet users, attempted to infiltrate exchanges through fake job applicants , and set up shell companies inside the U.S. to target crypto developers . And while the headlines often focus on large-scale thefts, the reality is simpler—and more damning. The weakest layer of Web3 is not smart contracts, but humans. Nation-state attackers no longer need to find zero-days in Solidity. They target the operational vulnerabilities of decentralized teams: poor key management, nonexistent onboarding processes, unvetted contributors pushing code from personal laptops, and treasury governance conducted via Discord polls. For all our industry’s talk of resilience and censorship resistance, many protocols remain soft targets for serious adversaries. At Oak Security, where we’ve conducted over 600 audits across major ecosystems, we consistently see this gap: teams invest heavily in smart contract audits but ignore basic operational security (OPSEC). The result is predictable. Inadequate security processes lead to compromised contributor accounts, governance capture, and preventable losses. The Smart Contract Illusion: Secure Code, Insecure Teams For all the money and talent poured into smart contract security, most DeFi projects still fail the basics of operational security. The assumption seems to be that if the code has passed an audit, the protocol is safe. That belief is not just naive—it's dangerous. The reality is that smart contract exploits are no longer the preferred method of attack. It’s easier—and often more effective—to go after the people running the system. Many DeFi teams have no dedicated security leads, opting to manage enormous treasuries without anyone formally accountable for OPSEC. That alone should be cause for concern. Crucially, OPSEC failures aren’t limited to attacks from state-sponsored groups. In May 2025, Coinbase disclosed that an overseas support agent—bribed by cybercriminals—illegally accessed customer data, triggering a $180–$400 million remediation and ransom limbo. Malicious actors made similar attempts on Binance and Kraken. These incidents weren’t driven by coding errors—they were borne from insider bribery and frontline human failures. The vulnerabilities are systemic. Across the industry, contributors are commonly onboarded via Discord or Telegram, with no identity checks, no structured provisioning, and no verifiably secure devices. Code changes are often pushed from unvetted laptops, with little to no endpoint security or key management in place. Sensitive governance discussions unfold in unsecured tools like Google Docs and Notion, without audit trails, encryption, or proper access controls. And when something inevitably goes wrong, most teams have no response plan, no designated incident commander, and no structured communication protocol—just chaos. This isn’t decentralization. It’s operational negligence. There are DAOs managing $500 million that would fail a basic OPSEC audit. There are treasuries guarded by governance forums, Discord polls, and weekend multisigs – open invitations for bad actors. Until security is treated as a full-stack responsibility—from key management to contributor onboarding—Web3 will keep leaking value through its softest layers. What DeFi Can Learn from TradFi Security Culture TradFi institutions are frequent targets of attacks from North Korean hackers and beyond — and as a result, banks and payment companies lose millions each year. But it’s rare to see a traditional financial institution collapse, or even pause operations, in the face of a cyberattack. These organizations operate on the assumption that attacks are inevitable. They design layered defenses that reduce the likelihood of attacks and minimize damage when exploits do occur, driven by a culture of constant vigilance that DeFi still largely lacks. In a bank, employees do not access trading systems from personal laptops. Devices are hardened and continuously monitored. Access controls and segregation of duties ensure that no single employee can unilaterally move funds or deploy production code. Onboarding and offboarding processes are structured; credentials are issued and revoked with care. And when something goes wrong, incident response is coordinated, practiced, and documented — not improvised in Discord. Web3 needs to adopt similar maturity, but adapted to the realities of decentralized teams. That starts with enforcing OPSEC playbooks from day one, running red-team simulations that test for phishing, infrastructure compromise, and governance capture — not just smart contract audits — and using multi-signature wallets backed by individual hardware wallets or treasury management. Teams should vet contributors and perform background checks on anyone with access to production systems or treasury controls — even in teams that consider themselves fully 'decentralized.' Some projects are starting to lead here, investing in structured security programs and enterprise-grade tooling for key management. Others leverage advanced Security Operations (SecOps) tooling and dedicated security consultants. But these practices remain the exception, not the norm. Decentralization Is No Excuse for Negligence It’s time to confront the real reason many Web3 teams lag on operational security: it is difficult to implement in decentralized, globally distributed organizations. Budgets are tight, contributors are transient, and cultural resistance to cybersecurity principles, which are often misperceived as "centralization," remains strong. But decentralization is no excuse for negligence. Nation-state adversaries understand this ecosystem. They’re already inside the gates. And the global economy is increasingly reliant on on-chain infrastructure. Web3 platforms urgently need to employ and adhere to disciplined cybersecurity practices, or risk becoming a permanent funding stream for hackers and scammers seeking to undermine them. Code alone will not defend us. Culture will.

면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.