The numbers are getting harder to ignore.
In February 2025, the Lazarus Group—North Korea’s state-sponsored hacking unit—drained $1.5 billion from Bybit in the largest single crypto heist in history. The FBI formally attributed the attack to DPRK within weeks. Then on April 1, 2026, $285 million was stolen from Drift Protocol on Solana using a combination of social engineering and a legitimate Solana feature called “durable nonces.” TRM Labs attributed this one to North Korea as well.
That’s $1.8 billion from just two attacks. Factor in the dozens of smaller incidents TRM Labs has tracked—this was reportedly the eighteenth DPRK-linked attack in 2026 alone, with over $300 million stolen this year—and the cumulative figure exceeds $6.75 billion all-time according to multiple blockchain analytics firms.
The Uncomfortable Reality
A 2024 UN Panel of Experts report estimated that North Korea funds approximately 40% of its weapons of mass destruction programs through cryptocurrency theft. Let that number settle. Nearly half of a nuclear weapons program is being bankrolled by exploits against DeFi protocols, cross-chain bridges, and exchange infrastructure.
Every protocol that ships with inadequate security, every multi-sig that relies on human operational security without time-bound transaction validity, every bridge that prioritizes speed over verification—these aren’t just financial risks. They’re potential funding channels for weapons proliferation.
The Attack Pattern Is Consistent and Evolving
What makes Lazarus Group particularly dangerous is the sophistication trajectory:
- 2022-2023: Exploiting code vulnerabilities in bridges (Ronin $625M, Harmony Horizon $100M)
- 2024: Moving to social engineering combined with smart contract exploitation
- 2025: Bybit hack—compromising multi-sig signers through sophisticated social engineering, then executing malicious transactions disguised as routine operations
- 2026: Drift Protocol—using legitimate protocol features (durable nonces) as attack vectors. The attacker spent weeks staging the attack: Tornado Cash withdrawal on March 11, deploying CVT tokens, social engineering security council signers, then executing in under 60 seconds
The pattern shows clear adaptation. When code audits got better, they moved to social engineering. When hot wallet security improved, they targeted multi-sig operational procedures. When multi-sig awareness increased, they exploited legitimate features that decouple signing from execution.
The Industry Response Is Not Proportional
Here’s what troubles me most: the DeFi industry’s security investment is nowhere near proportional to the threat.
- Protocols still launch with $50K-$150K audits focused on code bugs while $285M is stolen through operational security failures
- Multi-sig governance structures assume signers review transactions at execution time—durable nonces break this assumption entirely
- Cross-chain bridges remain the highest-value targets, yet bridge security standards are still voluntary
- Bug bounty programs max out at $1-5M while individual exploits now routinely exceed $100M
The cost-benefit calculation for nation-state attackers is overwhelmingly favorable. If you can fund a nuclear weapons program by exploiting DeFi protocols with a few dozen engineers, why wouldn’t you?
Questions for the Community
-
Should the industry treat DPRK-attributed exploits differently? If we know stolen funds are going to weapons programs, does the community have a moral obligation to do more than standard incident response?
-
Is “move fast and break things” security culture morally defensible when the consequence isn’t just lost user funds but potential weapons proliferation?
-
What concrete security standards should become mandatory before protocols go live with significant TVL? Time-bound transaction validity? Decentralized sequencer requirements? Mandatory operational security audits beyond code audits?
-
Should there be industry-wide coordination against state-sponsored attackers—shared threat intelligence, standardized incident response, or even a DeFi security DAO with teeth?
I’m not asking whether DPRK will stop attacking crypto (they won’t). I’m asking whether our collective tolerance for “good enough” security makes every protocol developer partially responsible for what happens with stolen funds.
The best hack is the one that never happens. Right now, we’re making it far too easy.