Key Points
- Ripple announced a partnership with Crypto ISAC to distribute threat intelligence on North Korean cyber operatives to cryptocurrency companies.
- Attackers successfully infiltrated organizations by building employee relationships over extended periods rather than targeting smart contract weaknesses.
- The Drift security incident resulted in $285 million in stolen assets after operatives installed malicious software on authorized devices.
- The Kelp bridge attack siphoned $292 million in ETH, with authorities identifying Lazarus Group as responsible.
- A legal representative delivered restraining notices to Arbitrum DAO regarding 30,765 ETH connected to the Kelp security breach.
Ripple announced Monday that it has initiated a partnership with Crypto ISAC to distribute its North Korean cyber actors intelligence to cryptocurrency organizations. This strategic move comes after two significant security breaches extracted more than $500 million during April.
Ripple Launches Threat Intelligence Initiative Through Crypto ISAC Partnership
The company revealed plans to supply Crypto ISAC with comprehensive detailed dossiers connected to North Korean threat actors. This intelligence package encompasses LinkedIn profiles, email credentials, contact numbers, and geographical tracking information. Ripple’s objective centers on helping organizations recognize patterns of repeated infiltration campaigns throughout the digital asset sector.
Crypto ISAC functions as a central hub for threat intelligence distribution among cryptocurrency enterprises. According to Ripple, malicious actors frequently submit applications to multiple organizations within short timeframes. “A threat actor who fails a background check at one company will apply to three more that same week,” Ripple wrote on X.
The company explained that traditional security measures proved ineffective during the Drift incident because threat actors had already established legitimate credentials. North Korean operatives allegedly cultivated relationships with team members over several months. Following this trust-building phase, they installed malicious software and obtained private keys while bypassing security protocols.
Both Ripple and Crypto ISAC characterized the Drift incident as a human-focused infiltration strategy. They emphasized that attackers avoided targeting smart contract vulnerabilities. The threat actors focused on compromising employee systems and executed transfers totaling $285 million after establishing access.
Historical records indicate that DeFi exploits from 2022 through 2024 primarily concentrated on technical vulnerabilities in code. Nevertheless, organizations have significantly enhanced smart contract security protocols recently. This improvement prompted attackers to pivot from technical exploits toward human-focused manipulation techniques.
Ripple emphasized that distributed intelligence enables organizations to verify questionable candidates across multiple hiring processes. The organization maintains that pooled information resources can minimize successful repeated infiltration campaigns. “The strongest security posture in crypto is a shared one,” Ripple posted.
Legal Challenges Emerge Following April Attacks Connected to Lazarus Group
Both the April Drift security incident and the Kelp bridge compromise focused on ethereum-based holdings. The Kelp attack extracted $292 million worth of ETH. Law enforcement agencies have formally connected both incidents to Lazarus Group operations.
On Monday, legal counsel representing victims of North Korean terrorism delivered restraining notices to Arbitrum DAO. The documentation asserts that 30,765 ETH immobilized following the Kelp compromise represents North Korean assets. The legal representative referenced U.S. enforcement statutes in the documentation.
Arbitrum DAO implemented asset freezing measures in response to the exploit. Meanwhile, decentralized lending protocol Aave challenged the restraining notice. Aave filed arguments supporting Arbitrum’s position that illicitly obtained assets cannot establish legal ownership rights.
“A thief does not gain lawful ownership of stolen property simply by taking it,” Aave stated in its filing. The legal debate currently focuses on whether immobilized ETH qualifies as North Korean property under applicable law. The aggregate April losses from both Drift and Kelp incidents surpass $500 million.
Ripple confirmed ongoing intelligence distribution to Crypto ISAC member organizations. The company pledged to provide updated information as additional intelligence becomes available. Crypto ISAC has declined to reveal the current number of organizations receiving access to the collaborative intelligence platform.





