How Crypto Teams Are Joining Forces Against North Korea’s Sneaky Hackers

North Korea, DPRKWed May 06 2026
North Korea doesn’t always hack with guns and explosions—sometimes it starts with a friendly chat. Hackers from the country have spent months slowly earning trust in online crypto circles before slipping in malware to steal digital cash. A recent attack called the Drift hack began the same way: strangers pretending to be helpful contributors, only to later bypass tight security and drain money from shared wallets. Experts warn this isn’t just luck—it’s a carefully planned trick that mixes social skills with tech tricks. More and more banks and crypto firms are getting caught in these traps, showing how sneaky these operations have become. To fight back, companies like Ripple and Coinbase now share a secret weapon: a growing list of clues tied to North Korean hackers. Think of it like a digital mugshot book—names, fake job profiles, email addresses, even phone numbers linked to campaigns. When one company spots a suspicious profile, others get the heads-up too. This isn’t just about stopping one attack; it’s about cutting off many at once. The system is built on the idea that criminals rarely work alone—they reuse tactics, so spotting one clue can expose a whole network.
A new tool is making this sharing faster and smarter. Crypto teams just launched an API that turns raw hacking clues into clear, trustworthy warnings. Instead of piles of scattered data, security teams get clean, useful intel they can plug right into their systems. Ripple and Coinbase were among the first to test it, and they say it changes the game. Instead of guessing what a hacker might do next, they can act on solid facts right away. Coinbase’s security lead pointed out that this approach keeps the context around threats—meaning fewer false alarms and clearer paths to defense. Here’s the bigger picture: hackers don’t apply for jobs at just one company. They might fail a background check at one firm and try again at ten others the same week. Without shared intel, every business starts from scratch, wasting time and missing chances to stop the same person. But when one member of this network spots a threat, the warning spreads instantly. That means if a hacker tries to join as a contractor or fake employee, every company in the group already knows who they’re dealing with—before any damage is done. Experts say this kind of teamwork isn’t optional anymore—it’s essential. Sharing threat data used to be rare; now it’s the best way to stay safe. Instead of hoping no one gets hacked, companies are building a wall together. And in a world where hackers work across borders and platforms, defense only works when everyone plays their part.
https://localnews.ai/article/how-crypto-teams-are-joining-forces-against-north-koreas-sneaky-hackers-cf75a89b

actions