$DRIFT has published the latest findings regarding the recent attack, revealing that the same threat actor responsible for Radiant Capital
#黑客事件 in October 2024 conducted
#朝鲜黑客 organized attacks (led by the Lazarus Group) on cryptocurrency with the core aim of extracting foreign exchange and rapid monetization, specifically targeting highly liquid, easily launderable, and vulnerable coins and platforms, with clear and defined main targets. Mainstream cryptocurrencies are the top targets.
#BTC and
#ETH are the most favored coins by
#黑客 , which enjoy high global consensus and broad monetization channels; almost all attacks ultimately convert the stolen assets into these two currencies for laundering. In 2025, attacks on
#bybit and
#交易所 resulted in the theft of 1.5 billion USD in ETH, while in 2024, DMMBitcoin was breached, stealing 4503 BTC. USDT, USDC, and other stablecoins with stable prices and quick transfers are commonly used by hackers as temporary asset transit to avoid price fluctuations, serving as a core part of the laundering process, and have been involved in all major attacks. GameFi and public chain coins are frequent victims. Early-stage projects often have weak security, with many cross-chain bridges and vulnerabilities. In 2022, the Ronin bridge was breached, resulting in the theft of AXS,
$RONIN , and ETH, USDC, totaling 625 million USD, marking the largest GameFi attack in history; game public chains like
#sol and
$IMX have also been repeatedly attacked due to their active ecosystems and concentrated assets. Exchange platform coins and popular public chains such as
#KUCOIN (
#KCS ) and
#Harmony (
#ONE ) have been targeted by hackers due to exchange security vulnerabilities and insufficient cross-chain bridge protection, resulting in the theft of hundreds of millions of USD in assets
#Drift称攻击事件疑为朝鲜黑客策划 #Drift协议遭黑客攻击 .