How State-Sponsored Hackers Like DPRK Drain DeFi Protocols: Uneasy Money
How State-Sponsored Hackers Like DPRK Drain DeFi Protocols: Uneasy Money
33 days agoUnchainedLaura Shin
Podcast1 hr 16 min
Listen to Episode
Note: AI-generated summary based on third-party content. Not financial advice. Read more.
Quick Insights

Investors should exercise extreme caution with Drift Protocol (DRIFT) and the broader Solana DeFi ecosystem following a $250 million exploit that remains a significant contagion risk. To protect personal and professional digital assets against sophisticated supply chain attacks, consider an allocation to CrowdStrike (CRWD), which is recommended over traditional antivirus for its behavioral detection capabilities. The recent source code leak at Anthropic serves as a bullish catalyst for Open Source AI projects, as proprietary coding logic is now being integrated into free, public models. For decentralized finance participants, Tether (USDT) currently offers superior treasury protection over Circle (USDC) due to its proactive policy of freezing stolen funds without waiting for court orders. To mitigate "admin key" risks, high-net-worth individuals and developers should immediately move to a "hardware isolation" strategy, using dedicated physical devices for sensitive financial transactions.

Detailed Analysis

Based on the transcript from the Unchained podcast episode "Uneasy Money," here are the investment insights and market analysis regarding recent cybersecurity breaches and the AI sector.


Drift Protocol (DRIFT)

The discussion centered on a massive, active exploit of the Drift Protocol, a decentralized exchange on the Solana network.

  • The Incident: A hack resulting in the loss of over $250 million.
  • The Mechanics: Attackers reportedly compromised an admin key (part of a multi-sig). They updated the admin state, created a new market for a specific token (CVT), inflated withdrawal limits, and drained liquidity pools.
  • Attribution: While not officially confirmed, the speakers strongly suspect DPRK (North Korea) state-sponsored hackers due to the sophistication and timing relative to other supply chain attacks.
  • Contagion Risk: The speakers discussed potential "contagion" where hackers dump stolen tokens, causing price crashes and liquidations in other protocols. However, they noted that Solana DeFi (like Jupiter/JLP) currently has high liquidity, which may help absorb some shocks.

Takeaways

  • Protocol Risk: Investors should be aware that even audited protocols with multi-sig protections are vulnerable to "admin key" compromises if a developer's device is infected with malware.
  • Solana Ecosystem: While the hack is significant, the speakers noted that Solana has certain "liquidity mechanisms" and policies that might help contain the damage compared to older chains.
  • Recovery Prospects: Unlike "white hat" hackers who return funds for a 10% fee, DPRK hackers rarely negotiate, making the total recovery of funds unlikely.

Anthropic / Claude (AI Sector)

The analysts discussed a major source code leak involving Claude Code, the agentic coding tool from AI startup Anthropic.

  • The Leak: The source code for Claude Code (the "harness" or interface used for coding) was leaked and reportedly sat undetected for three months.
  • Agentic Risk: The leak highlights the danger of "AI Agents." It appears an AI agent may have accidentally checked the proprietary code into a public or insecure repository.
  • Code "Laundering": The speakers noted that the leaked code is already being "ported" to other languages like Rust, allowing developers to use Anthropic’s proprietary coding logic with other models.

Takeaways

  • Investment Theme (AI Infrastructure): The value of AI companies lies in the "Math Ball" (the model weights/training data), not necessarily the "Harness" (the code used to interact with the model). Because AI models evolve so fast (every 3–6 months), leaked code becomes obsolete quickly.
  • Open Source Boost: This leak is a bullish signal for Open Source AI. Developers can now take the "tricks" and "loops" discovered by Anthropic and apply them to free, open-source models, narrowing the gap between paid and free AI.
  • Competitive Landscape: Anthropic is expected to release a new model soon to invalidate the leaked code. OpenAI is currently viewed as having a better model (Codex) but a worse "harness" than Anthropic.

Cybersecurity & Infrastructure

A significant portion of the discussion focused on the rising threat of supply chain attacks targeting crypto developers.

  • Axios Attack: A recent supply chain attack on Axios (a massive software dependency) was linked to DPRK. This allows hackers to compromise millions of computers silently when developers update their software.
  • Social Engineering: Hackers are increasingly using fake Zoom or Microsoft Teams calls to trick developers into running malicious commands.
  • CrowdStrike (CRWD): The speakers specifically recommended CrowdStrike and EDR (Endpoint Detection and Response) over traditional antivirus for companies and high-net-worth individuals, as it detects "behavioral patterns" rather than just known file signatures.

Takeaways

  • Operational Security (OpSec): For investors and builders, the "number one risk" is device malware. The speakers suggest using separate physical devices (e.g., dedicated MacBooks) for different sensitive tasks.
  • Dependency Management: Software projects should "pin" their dependencies and implement a "minimum age" (e.g., 7 days) before updating to new software versions to avoid being caught in immediate supply chain hacks.

Stablecoin Policy: Circle (USDC) vs. Tether (USDT)

The analysts critiqued the differing philosophies of the two major stablecoin issuers regarding freezing stolen funds.

  • Circle (USDC): Takes a "Law is Law" approach. They generally only freeze funds if presented with a US court order or government mandate. This makes them slower to react during active hacks.
  • Tether (USDT): Takes a more proactive approach, often freezing known stolen funds quickly based on their own internal security team's findings.

Takeaways

  • Regulatory Risk: Circle’s refusal to act without government intervention is seen by some as a risk to DeFi users, as it allows hackers more time to "bridge" or "mix" funds before they can be frozen.
  • DeFi Safety: In the event of a hack, USDT may actually offer more "protection" for a protocol's treasury because the issuer is more willing to freeze funds in real-time.
Ask about this postAnswers are grounded in this post's content.
Episode Description
The Drift Protocol is down $285 million and Circle has the power to freeze the funds — but won’t. Kain, Taylor, and Luca explain why. Thank you to our sponsors! ⁠⁠⁠⁠⁠⁠⁠Fuse: The Energy Network ⁠⁠⁠⁠⁠⁠ – Shift your energy use and earn rewards. ⁠⁠⁠⁠⁠⁠⁠MultiChain Advisors -⁠⁠⁠⁠⁠⁠⁠ The Growth & Capital Markets Partner You Need The Drift Protocol hack was still unfolding when Kain, Taylor, and Luca went live. Within hours of a suspected admin key compromise, over $285 million had been drained across Solana, with Circle sitting on the ability to freeze the stolen USDC — and choosing not to.  Taylor Monahan, who was already in an active incident response room, walked through exactly how DPRK malware operates silently on devices for months before striking, why standard antivirus software won’t catch it, and what the Axios supply chain attack revealed about the vulnerability of open source infrastructure.  Then the conversation shifted to the Claude Code source leak — what it actually reveals about how the most sophisticated agentic coding harness in the world was built, and why Kain thinks a new Anthropic model may be days away. Hosts: ⁠⁠⁠⁠⁠⁠⁠Kain Warwick⁠⁠⁠⁠⁠⁠⁠, Founder of Infinex and Synthetix ⁠⁠⁠⁠⁠⁠⁠Taylor Monahan⁠⁠⁠⁠⁠⁠⁠, Security Expert ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Luca Netz⁠⁠⁠⁠, CEO of Pudgy Penguins Links Unchained: Drift Protocol Coverage — Search unchainedcrypto.com for current coverage Related: SEAL 911 — Volunteer crypto incident response group Drift Protocol Axios npm package — Supply chain attack vector discussed CrowdStrike EDR — Recommended endpoint detection tool Claude Code — Subject of source leak discussion Learn more about your ad choices. Visit megaphone.fm/adchoices
About Unchained
Unchained

Unchained

By Laura Shin

Crypto assets and blockchain technology are about to transform every trust-based interaction of our lives, from financial services to identity to the Internet of Things. In this podcast, host Laura Shin, an independent journalist covering all things crypto, talks with industry pioneers about how crypto assets and blockchains will change the way we earn, spend and invest our money. Tune in to find out how Web 3.0, the decentralized web, will revolutionize our world. Disclosure: I'm a nocoiner.