Cybersecurity2 hrs ago

Lazarus Group Behind $635M Crypto Theft in April 2026

The Lazarus Group conducted 95% of April 2026’s 29 crypto breaches, stealing over $635 million from Drift Protocol and KelpDAO. Learn the attack details, impact, and defensive steps.

Peter Olaleru/3 min/US

Cybersecurity Editor

TweetLinkedIn
Lazarus Group Behind $635M Crypto Theft in April 2026
Source: ZhihuOriginal source

TL;DR: In April 2026, North Korea’s Lazarus Group stole over $635 million from crypto platforms, accounting for 95 % of the month’s 29 recorded breaches—the highest monthly total ever.

Context

In early April, security researchers flagged unusual outflows from the Drift Protocol’s liquidity pools. Investigators traced the activity to a series of transactions that exploited a flaw in the protocol’s smart‑contract validation logic. A second incident, affecting KelpDAO, emerged two weeks later and involved unauthorized token approvals that allowed rapid asset drainage.

Key Facts

The month recorded 29 distinct crypto security breaches, surpassing any previous monthly count. Combined losses exceeded $635 million, with the Drift and KelpDAO events responsible for the bulk of the amount. Attribution analysis linked roughly 95 % of these incidents to the Lazarus Group, North Korea’s state‑sponsored hacking unit.

What It Means

The attacks demonstrate how threat actors combine traditional social engineering with automated scripts to move large sums quickly. Observed tactics included credential harvesting via phishing, followed by the execution of pre‑written drainer scripts that interacted with vulnerable contracts. These methods align with MITRE ATT&CK techniques T1566 (Phishing) and T1059 (Command‑and‑Scripting Interpreter). The financial proceeds are believed to support Pyongyang’s weapons programs, underscoring the national‑security dimension of crypto theft.

Mitigations - Apply the latest security patches released by Drift Protocol and KelpDAO to fix the exploited validation and approval flaws. - Enforce multi‑signature requirements for any contract‑changing transactions and monitor for anomalous approval events. - Deploy blockchain‑analytics alerts that flag large, rapid outflows from a single address. - Update email‑gateway rules to block known Lazarus phishing domains and train staff to recognize spear‑phishing attempts. - Subscribe to CISA’s AA23‑XXX advisory (or equivalent) for IOCs and YARA signatures related to Lazarus‑linked malware.

What to watch Regulators are expected to issue guidance on AI‑assisted threat detection, while the SEC may clarify reporting requirements for crypto‑related losses. Monitoring upcoming advisories from the Department of the Treasury and updates from blockchain‑security firms will help defenders stay ahead of similar campaigns.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...