Hackers linked to North Korea keep finding new ways to drain crypto funds
< formatted article >
North Korea-Linked Hackers Strike Again: How a "Classic Trick" Exploited Crypto’s Fragile Foundations
Less than three weeks after North Korea-linked hackers pulled off a social-engineering heist on a crypto trading firm, they returned—this time targeting Kelp, a platform designed to facilitate seamless asset transfers between blockchains. The attack didn’t rely on brute-force decryption or password cracking. Instead, the hackers exploited a fundamental flaw in how Kelp’s system processed data, tricking it into validating fraudulent transactions that should have been rejected outright.
The Weakness in the System: A Single Point of Failure
Security experts were quick to point out that this wasn’t a groundbreaking hack—just a classic exploit taking advantage of poor system design. Kelp’s architecture relied on a single verifier to approve cross-chain messages, prioritizing speed and simplicity over security. The analogy? A bank where a single employee can authorize withdrawals—no second opinion, no checks and balances. Just one compromised step, and the entire system collapses.
After the breach, LayerZero, a key player in cross-chain communication, suggested a straightforward fix: require multiple verifiers, much like demanding two signatures for high-value bank transfers. But not everyone agreed. Critics argued that LayerZero had already flagged this exact risk in its documentation, raising questions about whether users heeded the warnings—or if the platform’s design made such oversights inevitable.
The Domino Effect: When One Failure Ripples Through the System
The damage didn’t stop at Kelp. Many crypto platforms use Kelp’s assets as collateral, meaning their stability was directly tied to Kelp’s security. When that link shattered, the fallout spread like a financial contagion. It’s a stark reminder of crypto’s interconnected fragility—where a single weak link can destabilize an entire ecosystem. Like a chain reaction: if one link fails, the whole structure weakens.
Decentralization in Name Only
Another unsettling truth emerged: Kelp’s single verifier, despite sounding decentralized, was just a centralized system in disguise. Decentralization isn’t merely a buzzword—it’s a structural requirement. If even hidden layers, like data providers, harbor vulnerabilities, hackers will exploit them. North Korea-linked cybercriminals appear to be zeroing in on these lesser-guarded corners of crypto, where massive transactions flow but oversight remains dangerously thin.
The Hard Lesson: Known Risks, Ignored Consequences
The Kelp breach underscores a brutal reality: most crypto hacks aren’t the result of unknown vulnerabilities—they’re the fallout of ignored warnings. The exploit didn’t introduce a new flaw; it exposed how security is often treated as an afterthought rather than a non-negotiable priority. As hackers refine their tactics, these gaps become more dangerous—and more costly—to mend.
The message is clear: In crypto, trust isn’t given; it’s earned through rigorous design. And right now, too many systems are built on sand.