Skip to main content

31 posts tagged with "Cybersecurity"

Cybersecurity threats and defenses

View all tags

Bybit's $1.5B Hack One Year Later: 88% Traceable, Only 3% Frozen — What Went Wrong

· 10 min read
Dora Noda
Software Engineer

On February 21, 2025, North Korea's Lazarus Group executed the largest cryptocurrency theft in history — $1.5 billion in Ethereum drained from Bybit's cold wallet in a single transaction. One year later, the numbers tell a sobering story: while blockchain analytics firms initially tracked 88.87% of the stolen funds, only 3.54% has been frozen. The rest sits in thousands of wallets, waiting.

This is not just a heist story. It is a case study in how a nation-state hacking operation outmaneuvered an entire industry's security infrastructure, and what the crypto world learned — and failed to learn — in the twelve months since.

AI Smart Contract Audit Arms Race: Purpose-Built Security AI Detects 92% of DeFi Exploits

· 7 min read
Dora Noda
Software Engineer

For $1.22 per contract, an AI agent can now scan a smart contract for exploitable vulnerabilities — and offensive exploit capabilities are doubling every 1.3 months. Welcome to the most consequential arms race in decentralized finance.

In February 2026, OpenAI and Paradigm jointly launched EVMbench, an open-source benchmark evaluating how effectively AI agents detect, patch, and exploit smart contract vulnerabilities. The results were sobering. GPT-5.3-Codex successfully exploited 72.2% of known vulnerable contracts, up from 31.9% just six months earlier. Meanwhile, a purpose-built AI security agent detected vulnerabilities in 92% of 90 exploited DeFi contracts worth $96.8 million — nearly three times the 34% detection rate of a baseline GPT-5.1 coding agent.

The implication is clear: the battle for DeFi security has become an AI-versus-AI contest, and the economics overwhelmingly favor attackers — for now.

Fake CEOs on Zoom: How North Korea's Deepfake Campaigns Are Draining Crypto Wallets

· 8 min read
Dora Noda
Software Engineer

A Polygon co-founder discovers strangers asking if he is really on a Zoom call with them. A BTC Prague organizer watches a convincing AI-generated replica of a well-known crypto CEO appear on screen, only to be asked to run a "quick audio fix." An AI startup founder avoids infection by insisting on Google Meet — and the attackers vanish. These are not scenes from a cyberpunk thriller. They happened in early 2026, and they share a common thread: North Korea's rapidly evolving deepfake social engineering machine.

Quantum Threats and the Future of Blockchain Security: Naoris Protocol's Pioneering Approach

· 9 min read
Dora Noda
Software Engineer

Roughly 6.26 million Bitcoin—valued between $650 billion and $750 billion—sit in addresses vulnerable to quantum attack. While most experts agree that cryptographically relevant quantum computers remain years away, the infrastructure needed to protect those assets can't be built overnight. One protocol claims it already has the answer, and the SEC agrees.

Naoris Protocol became the first decentralized security protocol cited in a U.S. regulatory document when the SEC's Post-Quantum Financial Infrastructure Framework (PQFIF) designated it as a reference model for quantum-safe blockchain infrastructure. With mainnet launching before Q1 2026 ends, 104 million post-quantum transactions already processed in testnet, and partnerships spanning NATO-aligned institutions, Naoris represents a radical bet: that DePIN's next frontier isn't compute or storage—it's cybersecurity itself.

Cold Wallet Security Crisis: How Lazarus Group's Month-Long Preparation Attacks Are Defeating Crypto's Strongest Defenses

· 9 min read
Dora Noda
Software Engineer

Your cold wallet is not as safe as you think. In 2025, infrastructure attacks — targeting private keys, wallet systems, and the humans who manage them — accounted for 76% of all stolen cryptocurrency, totaling $2.2 billion across just 45 incidents. The Lazarus Group, North Korea's state-sponsored hacking unit, has perfected a playbook that renders traditional cold storage security almost meaningless: month-long infiltration campaigns that target the people, not the code.

The Lazarus Group Playbook: Inside North Korea's $6.75B All-Time Crypto Theft Operation

· 10 min read
Dora Noda
Software Engineer

When Safe{Wallet} developer "Developer1" received what appeared to be a routine request on February 4, 2025, they had no idea their Apple MacBook would become the entry point for the largest cryptocurrency heist in history. Within seventeen days, North Korea's Lazarus Group would exploit that single compromised laptop to steal $1.5 billion from Bybit—more than the entire GDP of some nations.

This wasn't an aberration. It was the culmination of a decade-long evolution that transformed a group of state-sponsored hackers into the world's most sophisticated cryptocurrency thieves, responsible for at least $6.75 billion in cumulative theft.

The Lazarus Group's $3.4 Billion Crypto Heist: A New Era of State-Sponsored Cybercrime

· 8 min read
Dora Noda
Software Engineer

The numbers are staggering: $3.4 billion stolen from cryptocurrency platforms in 2025, with a single nation-state responsible for nearly two-thirds of the haul. North Korea's Lazarus Group didn't just break records—they rewrote the rulebook on state-sponsored cybercrime, executing fewer attacks while extracting exponentially more value. As we enter 2026, the cryptocurrency industry faces an uncomfortable truth: the security paradigms of the past five years are fundamentally broken.

The $3.4 Billion Wake-Up Call

Blockchain intelligence firm Chainalysis released its annual crypto crime report in December 2025, confirming what industry insiders had feared. Total cryptocurrency theft reached $3.4 billion, with North Korean hackers claiming $2.02 billion—a 51% increase over 2024's already-record $1.34 billion. This brings the DPRK's all-time cryptocurrency theft total to approximately $6.75 billion.

What makes 2025's theft unprecedented isn't just the dollar figure. It's the efficiency. North Korean hackers achieved this record haul through 74% fewer known attacks than previous years. The Lazarus Group has evolved from a scattered threat actor into a precision instrument of financial warfare.

TRM Labs and Chainalysis both independently verified these figures, with TRM noting that crypto crime has become "more organized and professionalized" than ever before. Attacks are faster, better coordinated, and far easier to scale than in previous cycles.

The Bybit Heist: A Masterclass in Supply Chain Attacks

On February 21, 2025, the cryptocurrency world witnessed its largest single theft in history. Hackers drained approximately 401,000 ETH—worth $1.5 billion at the time—from Bybit, one of the world's largest cryptocurrency exchanges.

The attack wasn't a brute-force breach or a smart contract exploit. It was a masterful supply chain compromise. The Lazarus Group—operating under the alias "TraderTraitor" (also known as Jade Sleet and Slow Pisces)—targeted a developer at Safe{Wallet}, the popular multi-signature wallet provider. By injecting malicious code into the wallet's user interface, they bypassed traditional security layers entirely.

Within 11 days, the hackers had laundered 100% of the stolen funds. Bybit CEO Ben Zhou revealed in early March that they had lost track of nearly $300 million. The FBI officially attributed the attack to North Korea on February 26, 2025, but by then, the funds had already disappeared into mixing protocols and bridge services.

The Bybit hack alone accounted for 74% of North Korea's 2025 cryptocurrency theft and demonstrated a chilling evolution in tactics. As security firm Hacken noted, the Lazarus Group showed "clear preferences for Chinese-language money laundering services, bridge services, and mixing protocols, with a 45-day laundering cycle following major thefts."

The Lazarus Playbook: From Phishing to Deep Infiltration

North Korea's cyber operations have undergone a fundamental transformation. Gone are the days of simple phishing attacks and hot wallet compromises. The Lazarus Group has developed a multi-pronged strategy that makes detection nearly impossible.

The Wagemole Strategy

Perhaps the most insidious tactic is what researchers call "Wagemole"—embedding covert IT workers inside cryptocurrency companies worldwide. Under false identities or through front companies, these operatives gain legitimate access to corporate systems, including crypto firms, custodians, and Web3 platforms.

This approach enables hackers to bypass perimeter defenses entirely. They're not breaking in—they're already inside.

AI-Powered Exploitation

In 2025, state-sponsored groups began using artificial intelligence to supercharge every stage of their operations. AI now scans thousands of smart contracts in minutes, identifies exploitable code, and automates multi-chain attacks. What once required weeks of manual analysis now takes hours.

Coinpedia's analysis revealed that North Korean hackers have redefined crypto crime through AI integration, making their operations more scalable and harder to detect than ever before.

Executive Impersonation

The shift from pure technical exploits to human-factor attacks was a defining trend of 2025. Security firms noted that "outlier losses were overwhelmingly due to access-control failures, not to novel on-chain math." Hackers moved from poisoned frontends and multisig UI tricks to executive impersonation and key theft.

Beyond Bybit: The 2025 Hack Landscape

While Bybit dominated headlines, North Korea's operations extended far beyond a single target:

  • DMM Bitcoin (Japan): $305 million stolen, contributing to the eventual wind-down of the exchange
  • WazirX (India): $235 million drained from India's largest cryptocurrency exchange
  • Upbit (South Korea): $36 million seized through signing infrastructure exploitation in late 2025

These weren't isolated incidents—they represented a coordinated campaign targeting centralized exchanges, decentralized finance platforms, and individual wallet providers across multiple jurisdictions.

Independent tallies identified over 300 major security incidents throughout the year, highlighting systemic vulnerabilities across the entire cryptocurrency ecosystem.

The Huione Connection: Cambodia's $4 Billion Laundering Machine

On the money laundering side, U.S. Treasury's Financial Crimes Enforcement Network (FinCEN) identified a critical node in North Korea's operations: Cambodia-based Huione Group.

FinCEN found that Huione Group laundered at least $4 billion in illicit proceeds between August 2021 and January 2025. Blockchain firm Elliptic estimates the true figure may be closer to $11 billion.

The Treasury's investigation revealed that Huione Group processed $37 million linked directly to the Lazarus Group, including $35 million from the DMM Bitcoin hack. The company worked directly with North Korea's Reconnaissance General Bureau, Pyongyang's primary foreign intelligence organization.

What made Huione particularly dangerous was its complete lack of compliance controls. None of its three business components—Huione Pay (banking), Huione Guarantee (escrow), and Huione Crypto (exchange)—had published AML/KYC policies.

The company's connections to Cambodia's ruling Hun family, including Prime Minister Hun Manet's cousin as a major shareholder, complicated international enforcement efforts until the U.S. moved to sever its access to the American financial system in May 2025.

The Regulatory Response: MiCA, PoR, and Beyond

The scale of 2025's theft has accelerated regulatory action worldwide.

Europe's MiCA Stage 2

The European Union fast-tracked "Stage 2" of the Markets in Crypto-Assets (MiCA) regulation, now mandating quarterly audits of third-party software vendors for any exchange operating in the Eurozone. The Bybit hack's supply chain attack vector drove this specific requirement.

U.S. Proof-of-Reserves Mandates

In the United States, the focus has shifted toward mandatory, real-time Proof-of-Reserves (PoR) requirements. The theory: if exchanges must prove their assets on-chain in real-time, suspicious outflows become immediately visible.

South Korea's Digital Financial Security Act

Following the Upbit hack, South Korea's Financial Services Commission proposed the "Digital Financial Security Act" in December 2025. The Act would enforce mandated cold storage ratios, routine penetration testing, and enhanced monitoring for suspicious activities across all cryptocurrency exchanges.

What 2026 Defenses Need

The Bybit breach forced a fundamental shift in how centralized exchanges manage security. Industry leaders have identified several critical upgrades for 2026:

Multi-Party Computation (MPC) Migration

Most top-tier platforms have migrated from traditional smart-contract multi-sigs to Multi-Party Computation technology. Unlike the Safe{Wallet} setup exploited in 2025, MPC splits private keys into shards that never exist in a single location, making UI-spoofing and "Ice Phishing" techniques nearly impossible to execute.

Cold Storage Standards

Reputable custodial exchanges now implement 90-95% cold storage ratios, keeping the vast majority of user funds offline in hardware security modules. Multi-signature wallets require multiple authorized parties to approve large transactions.

Supply Chain Auditing

The key takeaway from 2025 is that security extends beyond the blockchain to the entire software stack. Exchanges must audit their vendor relationships with the same rigor they apply to their own code. The Bybit hack succeeded because of compromised third-party infrastructure, not exchange vulnerabilities.

Human Factor Defense

Continuous training regarding phishing attempts and safe password practices has become mandatory, as human error remains a primary cause of breaches. Security experts recommend periodic red and blue team exercises to identify weaknesses in security process management.

Quantum-Resistant Upgrades

Looking further ahead, post-quantum cryptography (PQC) and quantum-secured hardware are emerging as critical future defenses. The cold wallet market's projected 15.2% CAGR from 2026 to 2033 reflects institutional confidence in security evolution.

The Road Ahead

Chainalysis's closing warning in its 2025 report should resonate across the industry: "The country's record-breaking 2025 performance—achieved with 74 percent fewer known attacks—suggests we may be seeing only the most visible portion of its activities. The challenge for 2026 will be detecting and preventing these high-impact operations before DPRK-affiliated actors inflict another Bybit-scale incident."

North Korea has proven that state-sponsored hackers can outpace industry defenses when motivated by sanctions evasion and weapons funding. The $6.75 billion cumulative total represents not just stolen cryptocurrency—it represents missiles, nuclear programs, and regime survival.

For the cryptocurrency industry, 2026 must be the year of security transformation. Not incremental improvements, but fundamental rearchitecting of how assets are stored, accessed, and transferred. The Lazarus Group has shown that yesterday's best practices are today's vulnerabilities.

The stakes have never been higher.


Securing blockchain infrastructure requires constant vigilance and industry-leading security practices. BlockEden.xyz provides enterprise-grade node infrastructure with multi-layer security architecture, helping developers and businesses build on foundations designed to withstand evolving threats.

The $82 Billion Shadow Economy: How Professional Crypto Laundering Networks Became the Backbone of Global Crime

· 10 min read
Dora Noda
Software Engineer

Cryptocurrency money laundering has exploded to $82 billion in 2025—an eightfold increase from $10 billion just five years earlier. But the real story isn't the staggering sum. It's the industrialization of financial crime itself. Professional laundering networks now process $44 million daily across sophisticated Telegram-based marketplaces, North Korea has weaponized crypto theft to fund nuclear programs, and the infrastructure enabling global scams has grown 7,325 times faster than legitimate crypto adoption. The era of amateur crypto criminals is over. We've entered the age of organized, professionalized blockchain crime.

The Shai-Hulud Attack: How a Supply Chain Worm Stole $58M from Crypto Developers and Users

· 9 min read
Dora Noda
Software Engineer

On Christmas Eve 2025, while most of the crypto world was on holiday, attackers pushed a malicious update to Trust Wallet's Chrome extension. Within 48 hours, $8.5 million vanished from 2,520 wallets. The seed phrases of thousands of users had been silently harvested, disguised as routine telemetry data. But this wasn't an isolated incident—it was the culmination of a supply chain attack that had been spreading through the crypto development ecosystem for weeks.

The Shai-Hulud campaign, named after the sandworms of Dune, represents the most aggressive npm supply chain attack of 2025. It compromised over 700 npm packages, infected 27,000 GitHub repositories, and exposed approximately 14,000 developer secrets across 487 organizations. The total damage: over $58 million in stolen cryptocurrency, making it one of the most costly developer-targeted attacks in crypto history.

The Anatomy of a Supply Chain Worm

Unlike typical malware that requires users to download malicious software, supply chain attacks poison the tools developers already trust. The Shai-Hulud campaign weaponized npm, the package manager that powers most JavaScript development—including nearly every crypto wallet, DeFi frontend, and Web3 application.

The attack began in September 2025 with the first wave, resulting in approximately $50 million in cryptocurrency theft. But it was "The Second Coming" in November that demonstrated the true sophistication of the operation. Between November 21-23, attackers compromised the development infrastructure of major projects including Zapier, ENS Domains, AsyncAPI, PostHog, Browserbase, and Postman.

The propagation mechanism was elegant and terrifying. When Shai-Hulud infects a legitimate npm package, it injects two malicious files—setup_bun.js and bun_environment.js—triggered by a preinstall script. Unlike traditional malware that activates after installation, this payload runs before installation completes and even when installation fails. By the time developers realize something is wrong, their credentials are already stolen.

The worm identifies other packages maintained by compromised developers, automatically injects malicious code, and publishes new compromised versions to the npm registry. This automated propagation allowed the malware to spread exponentially without direct attacker intervention.

From Developer Secrets to User Wallets

The connection between compromised npm packages and the Trust Wallet hack reveals how supply chain attacks cascade from developers to end users.

Trust Wallet's investigation revealed that their developer GitHub secrets were exposed during the November Shai-Hulud outbreak. This exposure gave attackers access to the browser extension source code and, critically, the Chrome Web Store API key. Armed with these credentials, attackers bypassed Trust Wallet's internal release process entirely.

On December 24, 2025, version 2.68 of the Trust Wallet Chrome extension appeared in the Chrome Web Store—published by attackers, not Trust Wallet developers. The malicious code was designed to iterate through all wallets stored in the extension and trigger a mnemonic phrase request for each wallet. Whether users authenticated with a password or biometrics, their seed phrases were silently exfiltrated to attacker-controlled servers, disguised as legitimate analytics data.

The stolen funds broke down as follows: approximately $3 million in Bitcoin, over $3 million in Ethereum, and smaller amounts in Solana and other tokens. Within days, the attackers began laundering funds through centralized exchanges—$3.3 million to ChangeNOW, $340,000 to FixedFloat, and $447,000 to KuCoin.

The Dead Man's Switch

Perhaps most disturbing is the Shai-Hulud malware's "dead man's switch" mechanism. If the worm cannot authenticate with GitHub or npm—if its propagation and exfiltration channels are severed—it will wipe all files in the user's home directory.

This destructive feature serves multiple purposes. It punishes detection attempts, creates chaos that masks the attackers' tracks, and provides leverage if defenders try to cut off command-and-control infrastructure. For developers who haven't maintained proper backups, a failed cleanup attempt could result in catastrophic data loss on top of credential theft.

The attackers also demonstrated psychological sophistication. When Trust Wallet announced the breach, the same attackers launched a phishing campaign exploiting the ensuing panic, creating fake Trust Wallet-branded websites asking users to enter their recovery seed phrases for "wallet verification." Some victims were compromised twice.

The Insider Question

Binance co-founder Changpeng Zhao (CZ) hinted that the Trust Wallet exploit was "most likely" carried out by an insider or someone with prior access to deployment permissions. Trust Wallet's own analysis suggests attackers may have gained control of developer devices or obtained deployment permissions before December 8, 2025.

Security researchers have noted patterns suggesting possible nation-state involvement. The timing—Christmas Eve—follows a common advanced persistent threat (APT) playbook: attack during holidays when security teams are understaffed. The technical sophistication and scale of the Shai-Hulud campaign, combined with the rapid laundering of funds, suggests resources beyond typical criminal operations.

Why Browser Extensions Are Uniquely Vulnerable

The Trust Wallet incident highlights a fundamental vulnerability in the crypto security model. Browser extensions operate with extraordinary privileges—they can read and modify web pages, access local storage, and in the case of crypto wallets, hold the keys to millions of dollars.

The attack surface is massive:

  • Update mechanisms: Extensions auto-update, and a single compromised update reaches all users
  • API key security: Chrome Web Store API keys, if leaked, allow anyone to publish updates
  • Trust assumptions: Users assume updates from official stores are safe
  • Holiday timing: Reduced security monitoring during holidays enables longer dwell time

This isn't the first browser extension attack on crypto users. Previous incidents include the GlassWorm campaign targeting VS Code extensions and the FoxyWallet Firefox extension fraud. But the Trust Wallet breach was the largest in dollar terms and demonstrated how supply chain compromises amplify the impact of extension attacks.

Binance's Response and the SAFU Precedent

Binance confirmed that affected Trust Wallet users would be fully reimbursed through its Secure Asset Fund for Users (SAFU). This fund, established after a 2018 exchange hack, holds a portion of trading fees in reserve specifically to cover user losses from security incidents.

The decision to reimburse sets an important precedent—and creates an interesting question about responsibility allocation. Trust Wallet was compromised through no direct fault of users who simply opened their wallets during the affected window. But the root cause was a supply chain attack that compromised developer infrastructure, which in turn was enabled by broader ecosystem vulnerabilities in npm.

Trust Wallet's immediate response included expiring all release APIs to block new version releases for two weeks, reporting the malicious exfiltration domain to its registrar (resulting in prompt suspension), and pushing a clean version 2.69. Users were advised to migrate funds to fresh wallets immediately if they had unlocked the extension between December 24-26.

Lessons for the Crypto Ecosystem

The Shai-Hulud campaign exposes systemic vulnerabilities that extend far beyond Trust Wallet:

For Developers

Pin dependencies explicitly. The preinstall script exploitation works because npm installs can run arbitrary code. Pinning to known clean versions prevents automatic updates from introducing compromised packages.

Treat secrets as compromised. Any project that pulled npm packages between November 21 and December 2025 should assume credential exposure. This means revoking and regenerating npm tokens, GitHub PATs, SSH keys, and cloud provider credentials.

Implement proper secret management. API keys for critical infrastructure like app store publishing should never be stored in version control, even in private repositories. Use hardware security modules or dedicated secret management services.

Enforce phishing-resistant MFA. Standard two-factor authentication can be bypassed by sophisticated attackers. Hardware keys like YubiKeys provide stronger protection for developer and CI/CD accounts.

For Users

Diversify wallet infrastructure. Don't keep all funds in browser extensions. Hardware wallets provide isolation from software vulnerabilities—they can sign transactions without ever exposing seed phrases to potentially compromised browsers.

Assume updates can be malicious. The auto-update model that makes software convenient also makes it vulnerable. Consider disabling auto-updates for security-critical extensions and manually verifying new versions.

Monitor wallet activity. Services that alert on unusual transactions can provide early warning of compromise, potentially limiting losses before attackers drain entire wallets.

For the Industry

Strengthen the npm ecosystem. The npm registry is critical infrastructure for Web3 development, yet it lacks many security features that would prevent worm-like propagation. Mandatory code signing, reproducible builds, and anomaly detection for package updates could significantly raise the bar for attackers.

Rethink browser extension security. The current model—where extensions auto-update and have broad permissions—is fundamentally incompatible with security requirements for holding significant assets. Sandboxed execution environments, delayed updates with user review, and reduced permissions could help.

Coordinate incident response. The Shai-Hulud campaign affected hundreds of projects across the crypto ecosystem. Better information sharing and coordinated response could have limited the damage as compromised packages were identified.

The Future of Supply Chain Security in Crypto

The cryptocurrency industry has historically focused security efforts on smart contract audits, exchange cold storage, and user-facing phishing protection. The Shai-Hulud campaign demonstrates that the most dangerous attacks may come from compromised developer tooling—infrastructure that crypto users never directly interact with but that underlies every application they use.

As Web3 applications become more complex, their dependency graphs grow larger. Each npm package, each GitHub action, each CI/CD integration represents a potential attack vector. The industry's response to Shai-Hulud will determine whether this becomes a one-time wake-up call or the beginning of an era of supply chain attacks on crypto infrastructure.

For now, the attackers remain unidentified. Approximately $2.8 million of stolen Trust Wallet funds remain in attacker wallets, while the rest has been laundered through centralized exchanges and cross-chain bridges. The broader Shai-Hulud campaign's $50+ million in earlier thefts has largely disappeared into the blockchain's pseudonymous depths.

The sandworm has burrowed deep into crypto's foundations. Rooting it out will require rethinking security assumptions that the industry has taken for granted since its earliest days.


Building secure Web3 applications requires robust infrastructure. BlockEden.xyz provides enterprise-grade RPC nodes and APIs with built-in monitoring and anomaly detection, helping developers identify unusual activity before it impacts users. Explore our API marketplace to build on security-focused foundations.