Ripple has begun sharing its internal threat intelligence on North Korean hackers with the wider crypto industry through Crypto ISAC, a move the company announced on Monday alongside the message that “the strongest security posture in crypto is a shared one.” The initiative centers on distributing operational data—such as domains, wallets, and indicators of compromise—so that exchanges, wallets, DeFi protocols, and infrastructure providers can harden defenses against the handful of highly effective attacks that have defined crypto’s 2026 threat landscape.
Technology Overview
At the core of Ripple’s contribution is curated threat intelligence tailored to how crypto businesses actually operate. According to Crypto ISAC, the not‑for‑profit cybersecurity organization coordinating the effort, the dataset ranges from addresses and web infrastructure known to be linked to fraud, to indicators of compromise (IOCs) observed in active Democratic People’s Republic of Korea (DPRK) campaigns. The package also includes enriched profiles of suspected North Korean IT workers who attempt to embed themselves inside crypto firms, giving security teams practical context they can use to screen applicants, watch for anomalous activity, and disrupt infiltration earlier in the kill chain.
Christina Spring, Director of Growth at Crypto ISAC, emphasized that the value is not just in the raw artifacts but in the context Ripple’s security team attaches to them. Typical threat feeds tend to be long lists of hashes, IPs, or wallet addresses that are difficult to prioritize. Ripple’s material, by contrast, pairs those elements with narrative details about behaviors, observed tactics, and campaign linkages within the crypto ecosystem. That “contextual enrichment” allows defenders to score risk, tune detections, and move from reactive blocklists to proactive controls.
How It Works
Information sharing through Crypto ISAC gives member organizations a common operating picture of ongoing threats. When one organization identifies a malicious domain, compromised wallet, or malware signature, others can quickly add the indicator to their email gateways, RPC infrastructure monitors, node configurations, or cold‑storage procedures. The model is designed to prevent what Ripple described as an all‑too‑common pattern: when a single attacker fails an employment screen at one company, they simply try multiple others in short succession. With a shared repository, companies do not start from zero each time a new resume appears, a new contributor joins a repository, or a new endpoint anomaly surfaces.
The need for coordinated intelligence has intensified as North Korean operations have shifted from smash‑and‑grab technical exploits to patient, people‑driven intrusions. In April’s Drift exploit, attackers reportedly spent months building trust with contributors, then used that access to plant malware, capture sensitive material, and ultimately extract keys—resulting in a $285 million theft. That pattern mirrors traditional enterprise compromises in which adversaries exploit social relationships and routine workflows before triggering an on‑chain event.
Other incidents this year highlight the diversified playbook. The KelpDAO attack followed a different path: adversaries compromised two internal RPC nodes and executed distributed denial‑of‑service (DDoS) attacks against external nodes. By degrading visibility and control at the network layer, they were able to feed false data to LayerZero Labs’ DVN, a component involved in cross‑chain messaging. The approach underscores how web‑scale infrastructure elements—RPC endpoints, node health, and data validation networks—now sit squarely inside crypto’s threat surface alongside smart contracts and private keys.
Industry Impact
The stakes are unusually concentrated. Through April 2026, just a handful of attributed incidents—including the KelpDAO and Drift hacks—accounted for 76% of all crypto hack value. In total, North Korean hackers have taken $577 million so far this year, an outsized share driven not by volume but by precision and preparation. For defenders, that concentration suggests returns on intelligence will be highest when it spotlights the specific tradecraft and infrastructure that enable these large‑scale thefts.
Security researchers say the tempo and sophistication of DPRK activity is reshaping threat models across Web3. Natalie Newson, a senior blockchain security researcher at CertiK, recently pointed to the clustering of severe events—KelpDAO, Drift, and the emergence of a new macOS malware kit within the same month—as evidence that this is not sporadic criminal activity but a state‑directed financial operation running at institutional scale and speed. Her framing reflects how teams now think about layered defenses: from contributor onboarding and device hygiene to RPC governance and cross‑chain verification.
The operational response is evolving as well. After the KelpDAO exploit on April 20, the Arbitrum Security Council froze more than 30,000 ETH linked to downstream attacker funds, an example of networks mobilizing controls to limit damage once indicators surface on‑chain. At the same time, such actions can generate friction within decentralized finance. Aave later filed a memorandum in federal court seeking to unfreeze $71 million in funds on Arbitrum, arguing that the assets belonged to users rather than the attackers. The dispute illustrates the delicate balance between rapid, coordinated security interventions and the preservation of user property rights—an equation that hinges on timely, credible attribution and clear operational playbooks.
Why Shared Intelligence Matters
Threat intelligence built for crypto’s stack must bridge people, software, and network boundaries. IOCs and wallet clusters can help transaction monitors and compliance tools stop the flow of illicit funds. Domain and infrastructure indicators support DevOps and node teams in blocking command‑and‑control or phishing infrastructure. Enriched profiles of suspected infiltrators give HR, legal, and engineering leaders signals to validate identity, scrutinize access requests, and structure contributor programs with least‑privilege. When those elements are combined and distributed to many defenders at once, the industry’s baseline hardens even as attackers iterate.
Ripple’s decision to contribute its internal findings to Crypto ISAC operationalizes that concept. Instead of each company responding to spear‑phishing lures, contributor outreach, or malware beacons in isolation, member teams gain early warnings and reusable detections. The goal is to shorten the window between the first compromise attempt and a coordinated block, particularly in campaigns where social engineering and infrastructure manipulation unfold over weeks rather than minutes.
Future Implications
Leaders at Crypto ISAC frame the collaboration as part of a broader industry shift toward collective defense. Executive Director Justine Bone argued that information sharing can no longer be treated as optional and called the Ripple partnership a proof point for the model. If defenders continue to align on common data, context, and response playbooks, they can reduce the asymmetry that currently favors attackers who reuse tools, personas, and infrastructure across multiple targets.
For now, the metrics that define 2026—few incidents, extraordinary losses, and adversaries adept at both social and technical compromise paths—explain why operational, context‑rich intelligence is becoming central to crypto security. By pushing domains, wallets, and IOCs tied to active DPRK campaigns into a shared clearinghouse, Ripple and Crypto ISAC aim to help Web3 organizations spot the same attacker one step earlier, across many different perimeters.
That premise echoes the company’s Monday message: without shared intelligence, every company starts from zero. With it, defenders can narrow the attack surface that has enabled a handful of operations to account for most of this year’s losses—and do so using tools and data that map directly to how crypto infrastructure actually runs.

