朝鲜的贸易生涯是…呃….正在进行…..🙈
—泰 💖 (@tayvano_) 2024 年 12 月 22 日
说实话,如果我是管理 Hyperliquid 的 4 个验证器(或者 gh 上那些该死的贫民区二进制文件)的家伙,我现在就会拉屎了。
高流动性的家伙似乎一点也不担心,所以我确信它没问题。 🫠 pic.twitter.com/JrrU7t1sJe
Hyperliquid (HYPE) recently hit the $11 billion trading volume mark, fueled by its recent airdrop event. Analysts are optimistic the token will surge past its recent highs of $35.02. However, recent activities from DPRK hackers have the community a little worried.
Just two weeks ago, crypto KOL Tayvano reached out to Hyperliquid, offering insights and assistance to counter the perceived risks. In a letter to the crypto project, Tayvano highlighted the dangers posed by the familiarity North Korean hackers have with Hyperliquid’s platform.
“I would like to walk you through some of the measures that your team can and should take to mitigate risk of a sophisticated attack,” Tayvano wrote. The letter further emphasized the evolving tactics of DPRK hackers, describing them as “creative, persistent, and highly sophisticated,” with access to zero-day vulnerabilities, such as those recently patched by Chrome.
Tayvano proposed an open communication channel between Hyperliquid and security experts to share updates and countermeasures effectively, aiming to prevent the platform from becoming a high-profile target.
According to a Chainalysis report, North Korean state-sponsored hackers stole an estimated $1.34 billion in cryptocurrency in 2024 alone, accounting for more than half of all crypto-related thefts this year. The frequency and scale of the attacks have intensified, with the hackers targeting a wider range of organizations.
Notably, DPRK-linked exploits yielding profits of $50 to $100 million—or more—occurred significantly more often this year compared to 2023. Chainalysis attributes this trend to the hackers’ growing expertise in executing massive exploits.
In addition to large-scale thefts, DPRK hackers have also conducted smaller attacks, pulling in as little as $10,000. These activities showcase their ability to target both high-value entities and smaller-scale opportunities.
The rise in DPRK cyber activities has also been linked to North Korean IT workers infiltrating crypto and Web3 companies. Using sophisticated tactics such as false identities, third-party hiring intermediaries, and exploiting remote work opportunities, these individuals have compromised networks and stolen proprietary information.
One notable case involved the U.S. Department of Justice (DOJ) indicting 14 North Korean nationals accused of posing as remote IT workers at U.S. companies. These individuals reportedly stole more than $88 million through extortion and data theft.
As international efforts to disrupt North Korea’s illicit activities continue, countries are now joining hands to break the chain of attacks the DPRK is executing. A collaboration between the US and the United Arab Emirates (UAE) recently led to the disruption of a DPRK money-laundering network.
According to the US Treasury’s Office of Foreign Assets Control (OFAC), two Chinese nationals and their UAE-based shell company, Green Alpine Trading LLC, were sanctioned for laundering millions of dollars in cryptocurrency for North Korea.
The duo reportedly funneled funds for Sim Hyon-Sop, a sanctioned representative of the Korea Kwangson Banking Corporation (KKBC), who is wanted by the FBI. Sop is known for establishing complex financial pipelines to support North Korea’s weapons programs.
OFAC’s sanctions freeze all US owned assets linked to the Chinese nationals and Green Alpine Trading LLC, effectively blacklisting them from global financial systems. The agency warns that financial institutions interacting with these entities may face additional penalties.
The sanctions are part of broader efforts to curb North Korea’s ability to finance its weapons of mass destruction (WMD) and ballistic missile programs through illicit means, including crypto theft and money laundering operations.
A Step-By-Step System To Launching Your Web3 Career and Landing High-Paying Crypto Jobs in 90 Days.