Daily Crypto News & Musings

North Korean Hackers Allegedly Steal $577M from DRIFT and Kelp in Major DeFi Heist

30 April 2026 Daily Feed Tags: , , ,
North Korean Hackers Allegedly Steal $577M from DRIFT and Kelp in Major DeFi Heist

North Korean Hackers Stole $577M from DRIFT and Kelp

North Korea-linked hackers are reportedly behind a massive $577 million crypto theft tied to DRIFT and Kelp-related targets, a reminder that DeFi’s biggest vulnerability is still the humans, permissions, and sloppy security wrapped around it.

  • Reported loss: $577 million
  • Targets: DRIFT and Kelp-related assets
  • Suspected attackers: North Korea-linked hackers
  • Main lesson: security is still crypto’s weak spot

If that number sounds unreal, it should. A reported theft of this size doesn’t happen because someone typed the wrong password and had a bad afternoon. It points to a highly organized operation, likely with state-linked backing or at least state-tolerated infrastructure, carrying out a deliberate, well-resourced attack. North Korea has spent years building a grim reputation as one of the most effective crypto thieves on the planet, and this incident fits the same pattern: find the weakest link, move quickly, and launder the loot before anyone can fully react.

DRIFT and Kelp are connected to the decentralized finance, or DeFi, world. DeFi is the part of crypto that tries to replace traditional financial middlemen like banks, brokers, and clearinghouses with smart contracts — self-executing code that runs on a blockchain. The upside is obvious: open access, fewer gatekeepers, and a system that doesn’t need permission from a suit in a glass tower. The downside is just as obvious: if the code, key management, or surrounding infrastructure is weak, there’s no customer support line to call when things go sideways. In DeFi, the safety net is often missing, and that’s not a bug — it’s part of the design tradeoff.

To be clear, the exact mechanics of a theft this large matter. Was it a smart contract exploit? A private key compromise? Phishing? A bridge attack? Those details can completely change the technical lesson. But the broader lesson is already painfully familiar: crypto security remains uneven, and attackers are far more disciplined than many projects are willing to admit.

North Korean hackers have repeatedly been linked to some of the largest crypto thefts in history because crypto is simply useful to them. Sanctioned actors need ways to turn stolen digital value into something spendable, mobile, and hard to claw back. Crypto fits that brief better than most traditional systems. Bitcoin, Ethereum, stablecoins, and cross-chain tools each offer different routes to move funds around the globe, and the more fragmented the ecosystem becomes, the more hiding places attackers get.

That doesn’t mean crypto is “broken.” That lazy take gets trotted out every time there’s a major exploit, usually by people who don’t understand the difference between a decentralized system and a poorly secured one. The real problem is simpler and uglier: too many projects still treat security like a checkbox instead of core infrastructure. Glossy marketing, yield farming gimmicks, and token hype are easy. Building systems that can survive adversarial pressure is the hard part, and plenty of teams still fail the test.

And yes, users have skin in the game too. DeFi hands people enormous freedom, but freedom without caution is just expensive stupidity with a wallet attached. If you’re interacting with protocols, approvals and permissions matter. A lot. So does self-custody. So do hardware wallets. So does not apeing into shiny “passive yield” schemes because some anonymous account on X posted a screenshot with a 4-digit APY and a laser-eyed profile picture. That’s not finance; that’s digital gambling with better branding.

For builders, the bar should be much higher. Audits are important, but an audit is not a magic shield. Bug bounties help, but only if they’re meaningful enough to attract real talent. Monitoring tools, withdrawal controls, circuit breakers, role separation, multi-signature protections, and transparent incident response should all be standard practice. If a protocol is holding serious value, security needs to be treated like the foundation of the house, not a coat of paint slapped on after the roof is already leaking.

There’s also a broader strategic point here. North Korean-linked groups don’t keep coming back to crypto because they’re lucky. They keep coming back because too many targets are still soft. The industry loves talking about decentralization, censorship resistance, and financial sovereignty — all good things, all worth defending — but those ideals get ugly fast when implementation is sloppy. A decentralized system with weak controls is not freedom; it’s a buffet for thieves.

Key questions and takeaways:

  • How much was reportedly stolen?
    About $577 million, making this one of the larger crypto thefts linked to North Korea.
  • Who was targeted?
    DRIFT and Kelp-related assets were reportedly hit, placing the incident squarely in DeFi territory.
  • Why do North Korean hackers keep targeting crypto?
    Crypto is fast, borderless, and difficult to reverse once funds are moved, which makes it attractive for sanctioned actors and laundering operations.
  • What does this say about DeFi security?
    DeFi remains powerful, but security is still too often treated as an afterthought. One weak point can expose huge amounts of value.
  • Does this mean crypto itself is failing?
    No. It means security practices, operational discipline, and protocol design still need serious work in many corners of the ecosystem.
  • How can users reduce risk?
    Use hardware wallets, limit approvals, avoid reckless yield chasing, and treat every interaction with a protocol as a potential attack surface.
  • What should developers focus on?
    Better audits, stronger monitoring, meaningful bug bounties, withdrawal safeguards, and clear incident response plans.

Crypto’s promise is still real. Self-custody, permissionless finance, and resistance to censorship are not empty slogans — they’re powerful tools for a freer financial future. But if the industry keeps tolerating rushed deployments, weak opsec, and “trust me bro” security, then state-backed thieves and plain old opportunists will keep walking away with the winnings.

Decentralization without security is just expensive chaos.

North Korea’s alleged $577 million theft from DRIFT and Kelp is another hard reminder that the crypto fight is not just about scaling, regulation, or price. It’s about building systems that can survive real adversaries. Anything less is just a flashy invitation for the next robber with better tools and a worse conscience.