TLDR
- Ripple is sharing DPRK-linked threat data through Crypto ISAC to help firms detect fake workers.
- The intelligence includes domains, wallets, emails, profiles, numbers, locations, and campaign links for security teams.
- Crypto ISAC’s new API lets members integrate Web2 and Web3 threat signals into security workflows.
- The effort targets insider-style campaigns tied to North Korean actors seeking roles in crypto companies.
- Ripple, Coinbase, and other members are using shared context to support faster defensive action together
Ripple and Crypto ISAC have started a new data-sharing effort aimed at North Korean crypto spies. The program helps crypto companies spot fake workers, fraud domains, linked wallets, and active attack patterns. It comes as hackers use trust, job access, and contractor roles to reach sensitive systems.
Ripple Shares DPRK Threat Data With Crypto Firms
North Korean-linked hackers have changed how they target crypto companies and digital asset teams. They now use social trust, fake profiles, and long contact with workers. In some cases, attackers seek access before any technical breach takes place.
The Drift hack showed how this method can work against crypto teams. Attackers did not start with a smart contract bug or a public software flaw. Instead, they gained trust over time and infected contributor devices with harmful software.
The breach then helped attackers reach multisig wallets and steal funds. That method made older warning signs less useful for security teams. As a result, Ripple is now sharing more detailed threat data through Crypto ISAC.
The shared data includes fraud domains, suspicious wallets, and markers from active DPRK-linked campaigns. It can also include profiles tied to suspected North Korean IT workers. Those profiles may carry emails, phone numbers, locations, and linked online accounts.
Crypto ISAC API Supports Faster Intelligence Sharing
Crypto ISAC said its updated API was built for high-confidence crypto threat data. The system supports both Web2 and Web3 threat signals. It also sends the data in a format security teams can use in daily work.
Ripple, Coinbase, and other founding members are among the early users. The API helps members place shared intelligence into their own security tools. It also keeps context around each threat, rather than sending raw data alone.
“Crypto ISAC’s newly updated API represents a meaningful step forward in how intelligence is shared across the ecosystem.” Erin Plante of Ripple said the work helps improve data quality. She also said it helps Ripple add new sources into security operations.
Coinbase also supported the new model through Crypto ISAC. “One of the biggest challenges in crypto threat intelligence is bridging the gap between raw signals and operational decisions.” Jeff Lunglhofer of Coinbase said the API helps preserve context and confidence.
Shared Defense Targets North Korean Crypto Infiltration
Crypto ISAC says shared context can help firms act before attackers move again. A threat actor may fail screening at one company and apply elsewhere. With shared profiles, other members can review risks before they grant access.
The approach focuses on people, wallets, domains, and campaign links. It also helps teams compare hiring risks with known threat patterns. This is useful when attackers pose as applicants, contractors, or trusted partners.
“For too long, information sharing was seen as optional.” Justine Bone, executive director of Crypto ISAC, said shared data can support stronger defense. She said Ripple’s move shows how members can turn information into action.
TRM Labs reported rising North Korean hacking activity using newer tactics. It linked groups such as Lazarus and TraderTraitor to recent crypto thefts. The firm said Drift Protocol and KelpDAO hacks totaled almost $577 million.
Crypto ISAC now wants more members to share and use trusted threat data. The group says member reports can include wallets, fake profiles, and brand impersonation domains. For crypto companies, the aim is clear: block North Korean crypto spies before they gain trust.





