{"id":159205,"date":"2026-04-06T12:52:08","date_gmt":"2026-04-06T12:52:08","guid":{"rendered":"https:\/\/chainrumors.com\/index.php\/2026\/04\/06\/this-is-how-secret-north-korean-agents-infiltrated-top-crypto-protocols-researcher-claims\/"},"modified":"2026-04-06T12:59:32","modified_gmt":"2026-04-06T12:59:32","slug":"this-is-how-secret-north-korean-agents-infiltrated-top-crypto-protocols-researcher-claims","status":"publish","type":"post","link":"https:\/\/chainrumors.com\/index.php\/2026\/04\/06\/this-is-how-secret-north-korean-agents-infiltrated-top-crypto-protocols-researcher-claims\/","title":{"rendered":"This Is How Secret North Korean Brokers Infiltrated Prime Crypto Protocols, Researcher Claims"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<div class=\"trusted-editorial-content trusted-editorial-content--top\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/bitcoinist.com\/wp-content\/uploads\/2025\/02\/safe.png\" class=\"trusted-editorial-content__icon\"\/><\/p>\n<div class=\"trusted-editorial-content__text\"><u>Trusted Editorial<\/u> content material, reviewed by main trade consultants and seasoned editors. Advert Disclosure<\/div>\n<\/p><\/div>\n<p>North Korea\u2011related operatives have spent years quietly embedding themselves inside crypto firms and DeFi tasks.<\/p>\n<h2>A Lengthy-Standing Crypto-Infiltration Saga<\/h2>\n<p>Information and stories from the Democratic Individuals\u2019s Republic of Korea are likely to have a selected conspiracy theory-action film really feel to them. Nevertheless, in addition they have the tendency to be true and never over exaggerated in any respect.<\/p>\n<p>This time, safety researcher and MetaMask developer Taylor Monahan mentioned on a Sunday submit on the social community X that these strategies date again to DeFi\u2019s youth, with actors linked to the DPRK quietly contributing to a number of main, broadly used protocols.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">Yuppppppp<\/p>\n<p>Numerous DPRK IT Staff constructed the protocols  and love, all the way in which again to defi summer season<\/p>\n<p>The \u201c7 years blockchain dev expertise\u201d on their resume shouldn&#8217;t be a lie. https:\/\/t.co\/EQNgl5KhJ5<\/p>\n<p>\u2014 Tay \ud83d\udc96 (@tayvano_) <a href=\"https:\/\/twitter.com\/tayvano_\/status\/2040664577168547920?ref_src=twsrc%5Etfw\" rel=\"nofollow noopener\" target=\"_blank\">April 5, 2026<\/a><\/p>\n<\/blockquote>\n<p>She claims that North Korean IT employees have quietly labored inside greater than 40 DeFi tasks over roughly seven years, together with protocols that grew to become family names after DeFi summer season.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">oh god uhhhh like sushi, thorchain, yam, pickle, harvest, reclaim, swing, paid, naos, shezmu, qrolli, saffron, sifu, napier, concord, blueberry, stabble, onering, elemental, divvy, la token, impermax, kira, cook dinner, fantom, ankr, gamerse, metaplay, spice, beanstalk, deltaprime,\u2026<\/p>\n<p>\u2014 Tay \ud83d\udc96 (@tayvano_) <a href=\"https:\/\/twitter.com\/tayvano_\/status\/2040668973923189123?ref_src=twsrc%5Etfw\" rel=\"nofollow noopener\" target=\"_blank\">April 5, 2026<\/a><\/p>\n<\/blockquote>\n<p>These employees typically have \u201cactual\u201d on\u2011chain expertise (seven years of blockchain dev) however function below stolen or artificial identities, plugging into groups by way of regular hiring funnels<\/p>\n<p>Her posts reply to tim, a pseudonymous builder and public face of Titan, a Solana\u2011based mostly DEX aggregator and routing mission, claiming that for a earlier job they interviewed an especially certified candidate that turned out to be a Lazarus operative, the North-Korea affiliated group that has funneled billions of {dollars} in stolen cash by cryptocurrency networks.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">at a earlier job, we interviewed somebody who turned out to be a Lazarus operative. he did video calls and was extraordinarily certified<\/p>\n<p>we invited him for in individual interviews and he in the end declined to fly out, so we handed<\/p>\n<p>solely later did we discover his title in a Lazarus data dump\u2026 https:\/\/t.co\/Vnvffrkjee<\/p>\n<p>\u2014 tim | Titan (@timahhl) <a href=\"https:\/\/twitter.com\/timahhl\/status\/2040636929058955505?ref_src=twsrc%5Etfw\" rel=\"nofollow noopener\" target=\"_blank\">April 5, 2026<\/a><\/p>\n<\/blockquote>\n<p>Famend crypto detective ZachXBT additionally replied to tim\u2019s submit, explaining that this isn&#8217;t simply \u201cLazarus\u201d however a community of DPRK models (Lazarus, APT38, AppleJeus, and many others.) coordinated by the Reconnaissance Common Bureau and optimized for monetary cybercrime. Their strategies are based mostly on \u201cprimary, relentless\u201d outreach by way of LinkedIn, job boards, interviews, Zoom, plus distant dev roles that groups nonetheless grant far too simply.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">Lazarus Group is the collective title for all DPRK state sponsored cyber actors.<\/p>\n<p>The principle challenge is everybody teams all of them collectively when the complexity of threats are totally different.<\/p>\n<p>Threats by way of job postings, LinkedIn, e-mail, Zoom, or interviews are primary and on no account\u2026 <a href=\"https:\/\/t.co\/NL8Jck5edN\" rel=\"nofollow\">pic.twitter.com\/NL8Jck5edN<\/a><\/p>\n<p>\u2014 ZachXBT (@zachxbt) <a href=\"https:\/\/twitter.com\/zachxbt\/status\/2040666565503524932?ref_src=twsrc%5Etfw\" rel=\"nofollow noopener\" target=\"_blank\">April 5, 2026<\/a><\/p>\n<\/blockquote>\n<p>Current U.S. Division of the Treasury\u2019s Workplace of Overseas Belongings Management (OFAC) sanctions and Chainalysis findings sign that DPRK IT networks generated $800 million in 2024 alone and have moved billions in stolen crypto since 2017, feeding weapons of mass destruction (WMD) and missile applications.<\/p>\n<h3>New Info On The Crypto-Hack On Drift Protocol<\/h3>\n<p>The April 1st $285 million assault on Drift Protocol reignited fears about insider threats from North Korea, particularly after the protocol itself confirmed on Saturday that hypothesis linking the assault to North Korean hacking teams was proper.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"zxx\">https:\/\/t.co\/qYBMCup9i6<\/p>\n<p>\u2014 Drift (@DriftProtocol) <a href=\"https:\/\/twitter.com\/DriftProtocol\/status\/2040611161121370409?ref_src=twsrc%5Etfw\" rel=\"nofollow noopener\" target=\"_blank\">April 5, 2026<\/a><\/p>\n<\/blockquote>\n<p>They attributed the assault \u201cwith medium confidence\u201d to UNC4736, a North Korea\u2013aligned, state\u2011sponsored hacking group.<\/p>\n<p>The protocol claimed the attackers relied on a properly elaborated social engineering technique: faux skilled personas, in\u2011individual convention interactions, and booby\u2011trapped developer tooling to compromise contributors earlier than lastly executing the exploit. The attackers posed as a official buying and selling agency, met Drift contributors in individual throughout a number of nations and used totally constructed identities with work histories {and professional} networks earlier than triggering the exploit<\/p>\n<p>The attackers weaponized frequent developer tooling by slipping malicious duties into VS Code and Cursor configurations, delivering a compromised repository that contributors ran domestically with out realizing it. All these mixed make the incident much more like an insider\u2011type provide\u2011chain compromise than an easy sensible contract.<\/p>\n<p>The day after the assault, Ledger CTO Charles Guillement linked the assault technique to Bybit\u2019s $1.4 billion hack, which was attributed to the regime\u2019s cyber models. Then, on Friday, blockchain analytics agency Elliptic\u00a0launched an investigation claiming the on\u2011chain conduct, laundering strategies, and community\u2011degree indicators match the methods seen in prior DPRK\u2011linked operations. Bitcoinist lined the story.<\/p>\n<h3>Market Implications<\/h3>\n<p>This saga crypto-hacking has became structural nationwide\u2011safety danger. Regulators and sanctions our bodies are already tightening round DPRK IT networks, and extra aggressive enforcement is more likely to observe.<\/p>\n<p>Giant, state\u2011linked exploits create latent protocol danger: increased insurance coverage premia, potential delistings, governance infighting over restitution, and longer danger\u2011off intervals for DeFi tokens and perp volumes.<\/p>\n<p><img loading=\"lazy\" data-recalc-dims=\"1\" decoding=\"async\" class=\"aligncenter wp-image-673277 size-large\" src=\"https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/BTCUSDT_2026-04-06_14-41-29_1d529d.png?w=980&amp;resize=980%2C592\" alt=\"Bitcoin, BTC, BTCUSDT\" width=\"980\" height=\"592\" srcset=\"https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/BTCUSDT_2026-04-06_14-41-29_1d529d.png?w=2770 2770w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/BTCUSDT_2026-04-06_14-41-29_1d529d.png?w=640 640w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/BTCUSDT_2026-04-06_14-41-29_1d529d.png?w=768 768w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/BTCUSDT_2026-04-06_14-41-29_1d529d.png?w=980 980w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/BTCUSDT_2026-04-06_14-41-29_1d529d.png?w=1536 1536w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/BTCUSDT_2026-04-06_14-41-29_1d529d.png?w=2048 2048w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/BTCUSDT_2026-04-06_14-41-29_1d529d.png?w=750 750w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/BTCUSDT_2026-04-06_14-41-29_1d529d.png?w=1140 1140w\" sizes=\"(max-width: 980px) 100vw, 980px\"\/><\/p>\n<pre style=\"text-align: center;\">For the time being of writing, BTC trades for the highs $69k on the each day chart. Supply: BTCUSDT on Tradingview.<\/pre>\n<p>Cowl picture from Perplexity. BTCUSDT chart from Tradingview.<\/p>\n<div class=\"trusted-editorial-content trusted-editorial-content--bottom\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/bitcoinist.com\/wp-content\/uploads\/2025\/02\/safe.png\" class=\"trusted-editorial-content__icon\"\/><\/p>\n<p><strong>Editorial Course of<\/strong> for bitcoinist is centered on delivering completely researched, correct, and unbiased content material. We uphold strict sourcing requirements, and every web page undergoes diligent evaluate by our staff of high know-how consultants and seasoned editors. This course of ensures the integrity, relevance, and worth of our content material for our readers.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><br \/>\n<br \/><br \/>\n<br \/><a href=\"https:\/\/bitcoinist.com\/north-korean-agents-infiltrate-top-crypto-protocols\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Trusted Editorial content material, reviewed by main trade consultants and seasoned editors. Advert Disclosure North Korea\u2011related operatives have spent years quietly embedding themselves inside crypto firms and DeFi tasks. A Lengthy-Standing Crypto-Infiltration Saga Information and stories from the Democratic Individuals\u2019s Republic of Korea are likely to have a selected conspiracy theory-action film really feel to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":159207,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[32],"tags":[9057,43,46,42,313,117,44,45,29201,1540,47,497,9002,13750,803,176],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>This Is How Secret North Korean Brokers Infiltrated Prime Crypto Protocols, Researcher Claims - Chain Rumors<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/chainrumors.com\/index.php\/2026\/04\/06\/this-is-how-secret-north-korean-agents-infiltrated-top-crypto-protocols-researcher-claims\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"This Is How Secret North Korean Brokers Infiltrated Prime Crypto Protocols, Researcher Claims - Chain Rumors\" \/>\n<meta property=\"og:description\" content=\"Trusted Editorial content material, reviewed by main trade consultants and seasoned editors. Advert Disclosure North Korea\u2011related operatives have spent years quietly embedding themselves inside crypto firms and DeFi tasks. A Lengthy-Standing Crypto-Infiltration Saga Information and stories from the Democratic Individuals\u2019s Republic of Korea are likely to have a selected conspiracy theory-action film really feel to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/chainrumors.com\/index.php\/2026\/04\/06\/this-is-how-secret-north-korean-agents-infiltrated-top-crypto-protocols-researcher-claims\/\" \/>\n<meta property=\"og:site_name\" content=\"Chain Rumors\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-06T12:52:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-06T12:59:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/generated_image78-1.png\" \/><meta property=\"og:image\" content=\"https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/generated_image78-1.png\" \/>\n<meta name=\"author\" content=\"Chain Rumors\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/generated_image78-1.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chain Rumors\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/chainrumors.com\/index.php\/2026\/04\/06\/this-is-how-secret-north-korean-agents-infiltrated-top-crypto-protocols-researcher-claims\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/chainrumors.com\/index.php\/2026\/04\/06\/this-is-how-secret-north-korean-agents-infiltrated-top-crypto-protocols-researcher-claims\/\"},\"author\":{\"name\":\"Chain Rumors\",\"@id\":\"https:\/\/chainrumors.com\/#\/schema\/person\/26aa80208380dc463b4c018637fdeadd\"},\"headline\":\"This Is How Secret North Korean Brokers Infiltrated Prime Crypto Protocols, Researcher Claims\",\"datePublished\":\"2026-04-06T12:52:08+00:00\",\"dateModified\":\"2026-04-06T12:59:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/chainrumors.com\/index.php\/2026\/04\/06\/this-is-how-secret-north-korean-agents-infiltrated-top-crypto-protocols-researcher-claims\/\"},\"wordCount\":938,\"publisher\":{\"@id\":\"https:\/\/chainrumors.com\/#organization\"},\"keywords\":[\"Agents\",\"bitcoin news\",\"blockchain news\",\"Chain Rumors\",\"claims\",\"Crypto\",\"crypto news\",\"crypto updates\",\"Infiltrated\",\"Korean\",\"NFT news\",\"North\",\"Protocols\",\"researcher\",\"Secret\",\"Top\"],\"articleSection\":[\"Bitcoin\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/chainrumors.com\/index.php\/2026\/04\/06\/this-is-how-secret-north-korean-agents-infiltrated-top-crypto-protocols-researcher-claims\/\",\"url\":\"https:\/\/chainrumors.com\/index.php\/2026\/04\/06\/this-is-how-secret-north-korean-agents-infiltrated-top-crypto-protocols-researcher-claims\/\",\"name\":\"This Is How Secret North Korean Brokers Infiltrated Prime Crypto Protocols, Researcher Claims - Chain Rumors\",\"isPartOf\":{\"@id\":\"https:\/\/chainrumors.com\/#website\"},\"datePublished\":\"2026-04-06T12:52:08+00:00\",\"dateModified\":\"2026-04-06T12:59:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/chainrumors.com\/index.php\/2026\/04\/06\/this-is-how-secret-north-korean-agents-infiltrated-top-crypto-protocols-researcher-claims\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/chainrumors.com\/index.php\/2026\/04\/06\/this-is-how-secret-north-korean-agents-infiltrated-top-crypto-protocols-researcher-claims\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/chainrumors.com\/index.php\/2026\/04\/06\/this-is-how-secret-north-korean-agents-infiltrated-top-crypto-protocols-researcher-claims\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/chainrumors.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"This Is How Secret North Korean Brokers Infiltrated Prime Crypto Protocols, Researcher Claims\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/chainrumors.com\/#website\",\"url\":\"https:\/\/chainrumors.com\/\",\"name\":\"Chain Rumors\",\"description\":\"Your Trusted Source of Crypto News\",\"publisher\":{\"@id\":\"https:\/\/chainrumors.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/chainrumors.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/chainrumors.com\/#organization\",\"name\":\"Chain Rumors\",\"url\":\"https:\/\/chainrumors.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/chainrumors.com\/#\/schema\/logo\/image\/\",\"url\":\"http:\/\/chainrumors.com\/wp-content\/uploads\/2022\/04\/cropped-chain-rumors-icon.png\",\"contentUrl\":\"http:\/\/chainrumors.com\/wp-content\/uploads\/2022\/04\/cropped-chain-rumors-icon.png\",\"width\":512,\"height\":512,\"caption\":\"Chain Rumors\"},\"image\":{\"@id\":\"https:\/\/chainrumors.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/chainrumors.com\/#\/schema\/person\/26aa80208380dc463b4c018637fdeadd\",\"name\":\"Chain Rumors\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/chainrumors.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a34fd5695a1a8e451f68ddaaa1c346f4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a34fd5695a1a8e451f68ddaaa1c346f4?s=96&d=mm&r=g\",\"caption\":\"Chain Rumors\"},\"sameAs\":[\"http:\/\/chainrumors.com\"],\"url\":\"https:\/\/chainrumors.com\/index.php\/author\/chainrumors\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"This Is How Secret North Korean Brokers Infiltrated Prime Crypto Protocols, Researcher Claims - Chain Rumors","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/chainrumors.com\/index.php\/2026\/04\/06\/this-is-how-secret-north-korean-agents-infiltrated-top-crypto-protocols-researcher-claims\/","og_locale":"en_US","og_type":"article","og_title":"This Is How Secret North Korean Brokers Infiltrated Prime Crypto Protocols, Researcher Claims - Chain Rumors","og_description":"Trusted Editorial content material, reviewed by main trade consultants and seasoned editors. Advert Disclosure North Korea\u2011related operatives have spent years quietly embedding themselves inside crypto firms and DeFi tasks. A Lengthy-Standing Crypto-Infiltration Saga Information and stories from the Democratic Individuals\u2019s Republic of Korea are likely to have a selected conspiracy theory-action film really feel to [&hellip;]","og_url":"https:\/\/chainrumors.com\/index.php\/2026\/04\/06\/this-is-how-secret-north-korean-agents-infiltrated-top-crypto-protocols-researcher-claims\/","og_site_name":"Chain Rumors","article_published_time":"2026-04-06T12:52:08+00:00","article_modified_time":"2026-04-06T12:59:32+00:00","og_image":[{"url":"https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/generated_image78-1.png"},{"url":"https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/generated_image78-1.png"}],"author":"Chain Rumors","twitter_card":"summary_large_image","twitter_image":"https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/generated_image78-1.png","twitter_misc":{"Written by":"Chain Rumors","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/chainrumors.com\/index.php\/2026\/04\/06\/this-is-how-secret-north-korean-agents-infiltrated-top-crypto-protocols-researcher-claims\/#article","isPartOf":{"@id":"https:\/\/chainrumors.com\/index.php\/2026\/04\/06\/this-is-how-secret-north-korean-agents-infiltrated-top-crypto-protocols-researcher-claims\/"},"author":{"name":"Chain Rumors","@id":"https:\/\/chainrumors.com\/#\/schema\/person\/26aa80208380dc463b4c018637fdeadd"},"headline":"This Is How Secret North Korean Brokers Infiltrated Prime Crypto Protocols, Researcher Claims","datePublished":"2026-04-06T12:52:08+00:00","dateModified":"2026-04-06T12:59:32+00:00","mainEntityOfPage":{"@id":"https:\/\/chainrumors.com\/index.php\/2026\/04\/06\/this-is-how-secret-north-korean-agents-infiltrated-top-crypto-protocols-researcher-claims\/"},"wordCount":938,"publisher":{"@id":"https:\/\/chainrumors.com\/#organization"},"keywords":["Agents","bitcoin news","blockchain news","Chain Rumors","claims","Crypto","crypto news","crypto updates","Infiltrated","Korean","NFT news","North","Protocols","researcher","Secret","Top"],"articleSection":["Bitcoin"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/chainrumors.com\/index.php\/2026\/04\/06\/this-is-how-secret-north-korean-agents-infiltrated-top-crypto-protocols-researcher-claims\/","url":"https:\/\/chainrumors.com\/index.php\/2026\/04\/06\/this-is-how-secret-north-korean-agents-infiltrated-top-crypto-protocols-researcher-claims\/","name":"This Is How Secret North Korean Brokers Infiltrated Prime Crypto Protocols, Researcher Claims - Chain Rumors","isPartOf":{"@id":"https:\/\/chainrumors.com\/#website"},"datePublished":"2026-04-06T12:52:08+00:00","dateModified":"2026-04-06T12:59:32+00:00","breadcrumb":{"@id":"https:\/\/chainrumors.com\/index.php\/2026\/04\/06\/this-is-how-secret-north-korean-agents-infiltrated-top-crypto-protocols-researcher-claims\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/chainrumors.com\/index.php\/2026\/04\/06\/this-is-how-secret-north-korean-agents-infiltrated-top-crypto-protocols-researcher-claims\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/chainrumors.com\/index.php\/2026\/04\/06\/this-is-how-secret-north-korean-agents-infiltrated-top-crypto-protocols-researcher-claims\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/chainrumors.com\/"},{"@type":"ListItem","position":2,"name":"This Is How Secret North Korean Brokers Infiltrated Prime Crypto Protocols, Researcher Claims"}]},{"@type":"WebSite","@id":"https:\/\/chainrumors.com\/#website","url":"https:\/\/chainrumors.com\/","name":"Chain Rumors","description":"Your Trusted Source of Crypto News","publisher":{"@id":"https:\/\/chainrumors.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/chainrumors.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/chainrumors.com\/#organization","name":"Chain Rumors","url":"https:\/\/chainrumors.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chainrumors.com\/#\/schema\/logo\/image\/","url":"http:\/\/chainrumors.com\/wp-content\/uploads\/2022\/04\/cropped-chain-rumors-icon.png","contentUrl":"http:\/\/chainrumors.com\/wp-content\/uploads\/2022\/04\/cropped-chain-rumors-icon.png","width":512,"height":512,"caption":"Chain Rumors"},"image":{"@id":"https:\/\/chainrumors.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/chainrumors.com\/#\/schema\/person\/26aa80208380dc463b4c018637fdeadd","name":"Chain Rumors","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chainrumors.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a34fd5695a1a8e451f68ddaaa1c346f4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a34fd5695a1a8e451f68ddaaa1c346f4?s=96&d=mm&r=g","caption":"Chain Rumors"},"sameAs":["http:\/\/chainrumors.com"],"url":"https:\/\/chainrumors.com\/index.php\/author\/chainrumors\/"}]}},"jetpack_featured_media_url":"https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/generated_image78-1.png","_links":{"self":[{"href":"https:\/\/chainrumors.com\/index.php\/wp-json\/wp\/v2\/posts\/159205"}],"collection":[{"href":"https:\/\/chainrumors.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/chainrumors.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/chainrumors.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/chainrumors.com\/index.php\/wp-json\/wp\/v2\/comments?post=159205"}],"version-history":[{"count":1,"href":"https:\/\/chainrumors.com\/index.php\/wp-json\/wp\/v2\/posts\/159205\/revisions"}],"predecessor-version":[{"id":159206,"href":"https:\/\/chainrumors.com\/index.php\/wp-json\/wp\/v2\/posts\/159205\/revisions\/159206"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/chainrumors.com\/index.php\/wp-json\/wp\/v2\/media\/159207"}],"wp:attachment":[{"href":"https:\/\/chainrumors.com\/index.php\/wp-json\/wp\/v2\/media?parent=159205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/chainrumors.com\/index.php\/wp-json\/wp\/v2\/categories?post=159205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/chainrumors.com\/index.php\/wp-json\/wp\/v2\/tags?post=159205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}