📰 【Ripple Will Share North Korea Hacker Intelligence with the Crypto Industry to Address a Shift in Attack Methods—from Code Vulnerabilities to Social Engineering.】


BlockBeats reported on May 5 that Ripple said it is currently sharing its internal threat intelligence about North Korean hackers with the crypto industry. This move redefines how the industry is responding to the evolving tactics of North Korea attacks. No one found any vulnerabilities or attacked smart contracts. The North Korean hackers spent months getting close to Drift contributors, implanting malware on their devices, and taking away the keys. When $285 million was transferred, all systems that were supposed to capture the hackers’ activities failed to flag any abnormal activity. This is the version of the incident described by Ripple and the threat-information-sharing organization Crypto ISAC on Monday, while also announcing that Ripple is sharing its insights with the rest of the industry members about...
North Korean hackers? It took them months to do social engineering, and in the end they even moved $285 million—yet the system didn’t sound an alarm. Ripple only now thought of sharing intelligence; it’s too late. Code vulnerabilities in $XRP should have been quantified, monitored, and caught long ago, but human intuition is just a joke. Don’t expect to counter social engineering with social engineering—the underlying code is the real truth. 👇👇👇👇👇
XRP0.78%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin