Scan to download
BTC $79,089.00 -2.80%
ETH $2,220.76 -3.25%
BNB $673.41 -1.04%
XRP $1.44 -4.49%
SOL $89.27 -3.67%
TRX $0.3514 -0.82%
DOGE $0.1129 -2.74%
ADA $0.2607 -4.41%
BCH $425.10 -2.79%
LINK $10.02 -5.19%
HYPE $44.10 -0.24%
AAVE $92.62 -7.21%
SUI $1.09 -8.63%
XLM $0.1543 -6.14%
ZEC $515.89 -5.68%
BTC $79,089.00 -2.80%
ETH $2,220.76 -3.25%
BNB $673.41 -1.04%
XRP $1.44 -4.49%
SOL $89.27 -3.67%
TRX $0.3514 -0.82%
DOGE $0.1129 -2.74%
ADA $0.2607 -4.41%
BCH $425.10 -2.79%
LINK $10.02 -5.19%
HYPE $44.10 -0.24%
AAVE $92.62 -7.21%
SUI $1.09 -8.63%
XLM $0.1543 -6.14%
ZEC $515.89 -5.68%

hacker

CertiK Report: North Korean hackers caused approximately 60% of digital asset thefts by 2025, with attack patterns shifting to "offline infiltration."

Web3 security company CertiK has released the "Skynet North Korea Cyber Threat Report." The data shows that since 2016, North Korean hacker groups have plundered approximately $6.75 billion in digital assets. In 2025 alone, the losses from thefts they orchestrated reached as high as $2.06 billion, accounting for nearly 60% of the total losses in the global cryptocurrency industry for the entire year (including the $1.5 billion Bybit theft case). As of early 2026, this threat trend continues, with losses accounting for about 55%.The report emphasizes that the attack patterns of North Korean hackers have undergone a fundamental shift, evolving from simple code vulnerability exploitation to a national-level attack system that combines social engineering, deep supply chain attacks, and "physical infiltration." In the recent Drift protocol incident, attackers even spent six months lurking at offline industry conferences, establishing trust through real funds and interpersonal interactions before executing their attack.CertiK security experts warn that in the face of such systemic attacks, simple technical defenses have become weak. Cryptocurrency institutions urgently need to fully implement a "zero trust" hiring model, strengthen third-party supply chains, establish fund circuit breaker mechanisms, and collaborate with professional security organizations to build a comprehensive lifecycle defense system covering code audits, round-the-clock risk monitoring, and on-chain anti-money laundering/KYT (Know Your Transaction) fund tracking.

ZachXBT: 18-year-old hacker Dritan from the United States is suspected of involvement in a $19 million cryptocurrency theft and money laundering scheme

On-chain detective ZachXBT exposed American threat actor Dritan Kapllani Jr, claiming he is suspected of participating in a social engineering theft targeting crypto users, totaling approximately $19 million. ZachXBT stated that Dritan has long flaunted luxury cars, high-end watches, private jets, and nightlife on social media. On April 23, 2026, during a "Band 4 Band (B4B)" voice chat on Discord, he publicly displayed an Exodus wallet containing $3.68 million in assets to prove he was wealthier than another hacker.The relevant ETH address is: 0x4487db847db2fc99372a985743a26f46e0b2bba6. ZachXBT tracked and found that this address is linked to a social engineering theft case involving 185 BTC (approximately $13 million) on March 14, 2026. The next day, Dritan's Exodus wallet received about $5.3 million of those funds. By the time of the B4B call six weeks later, about $1.6 million had been spent or laundered.On May 11, the U.S. Justice Department unsealed a criminal indictment against Trenton Johnson, who is accused of participating in the aforementioned 185 BTC theft case and could face up to 40 years in prison. "Coconspirator 1" in the indictment is alleged to be Dritan, who has not yet been formally charged. ZachXBT also pointed out that Dritan is connected to hacker John Daghita (Lick), who was previously arrested for stealing $46 million from the U.S. government, and John had exposed Dritan's old wallet address on Telegram.On-chain analysis shows that this address is related to multiple high-confidence social engineering theft cases in 2025, with a total amount involved exceeding $5.85 million. ZachXBT stated that Dritan has been active in "The Com" hacker circle for a long time and had previously not faced formal charges due to his minor status. He is now over 18 years old, and "the borrowed time may finally be over."
app_icon
ChainCatcher Building the Web3 world with innovations.