Cybersecurity2 hrs ago

Lazarus Group Behind Record $635M Crypto Theft in April 2026

April 2026 saw 29 crypto hacks stealing over $635M, with Lazarus Group behind most. Details on Drift Protocol, KelpDAO exploits, and mitigation steps.

Peter Olaleru/3 min/US

Cybersecurity Editor

TweetLinkedIn
April Crypto Hacks Top Record 20 Incidents — North Korea's Involvement Accounts for 76% of Losses

April Crypto Hacks Top Record 20 Incidents — North Korea's Involvement Accounts for 76% of Losses

Source: FinanceOriginal source

TL;DR: In April 2026, 29 separate crypto hacks stole over $635 million, with the Lazarus Group responsible for about 95 % of the incidents. The biggest losses came from exploits of the Drift Protocol and KelpDAO platforms.

Context

The month of April 2026 saw the highest ever recorded number of cryptocurrency breaches, pushing total losses to a new peak. Analysts linked the surge to increased activity by North Korean state‑sponsored hackers, who have historically used cyber theft to fund regime programs. The attacks coincided with growing market anxiety over Ethereum’s price outlook and heightened interest in advanced AI models for defense.

Key Facts

- Twenty‑nine distinct hacks were reported, the most in a single month. - Combined losses exceeded $635 million; the Drift Protocol exploit accounted for roughly $340 million and the KelpDAO exploit for about $200 million. - Attribution analysis by blockchain forensic firms tied ~95 % of the April incidents to the Lazarus Group. - The Drift Protocol breach exploited a reentrancy flaw in its token‑swap contract, allowing attackers to drain funds repeatedly. - The KelpDAO incident used a flash‑loan maneuver that manipulated oracle prices to siphon assets from lending pools. - Both attacks followed a pattern of initial spear‑phishing to obtain developer credentials, then deployment of malicious contract updates (MITRE ATT&CK T1195.002, T1059.007).

What It Means

The scale of the theft underscores the vulnerability of decentralized finance protocols to sophisticated, state‑backed adversaries. For projects, it highlights the need for rigorous smart‑contract audits, continuous monitoring, and robust access controls. For the broader crypto market, the incident may depress confidence in Ethereum‑based assets and spur regulatory scrutiny of cross‑border cyber‑crime financing.

Mitigations

- Apply the latest security patches for Drift Protocol and KelpDAO contracts; monitor official advisories for any updates. - Deploy runtime protection that flags reentrancy calls and anomalous flash‑loan transactions (e.g., using tools that detect MITRE technique T1059.004). - Enforce multi‑signature approvals for contract upgrades and restrict private‑key exposure via hardware security modules. - Implement network‑level detection for known Lazarus Group infrastructure (IP ranges, domains) and share indicators via ISACs. - Conduct regular phishing simulations and enforce MFA for all developer and admin accounts.

Watch for upcoming guidance from the U.S. Treasury’s Office of Foreign Assets Control on sanctions evasion tactics and any SEC statements regarding DeFi oversight, as these could shape future defensive priorities.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...