1928374656574839.25T USD in ten seconds wiped out: When a nation-state hacker becomes Silicon Valley HR, how many strings are left in Web3's undergarments?



2.85 billion USD.
When Drift Protocol’s monitoring screen shows the numbers dropping to zero in just ten seconds, Wall Street quant traders barely have time to swallow their espresso. In this decentralized utopia where “code is law,” ten seconds is enough to pull off a shocking heist. But if you think this was just an ordinary smart contract vulnerability attack or the work of a genius hacker frantically pounding keys in a basement, you’re too naive.
This nearly $300 million celebration’s true starting point wasn’t those deadly ten seconds but a LinkedIn private message sent half a year earlier, full of warmth and concern. In this magical crypto world, hackers have long given up on brute-force cracking your asymmetric encryption algorithms. They’ve shed their hoodies, donned virtual Armani haute couture suits, and in fake Slack channels, they talk at length about career plans and millions in funding. You might think you’ve met a talent scout leading you to financial freedom, but in reality, they’re just craving your computer’s underlying system permissions.

The highest level of phishing is chatting with you about your career aspirations for two months

There’s a deeply absurd misalignment in the security defenses of the crypto industry. Project teams are willing to spend millions hiring top auditing firms to meticulously review every nested layer of smart contract logic, yet they remain completely indifferent to which online chat partners the core developers with code merge permissions are talking to. UNC1069, or that long-standing North Korean state-level hacker organization lurking deep in the dark web, has precisely targeted this soft spot. Their current attacks follow a high-end headhunting approach, emphasizing “long-termism” and “emotional value.” This is a thoroughly industrialized form of dimensionality reduction attack. Their infiltration of Axios open-source library maintainer Jason Saayman and several core figures in the Node community is a textbook example of social engineering.
They don’t start with trojan-laden compressed files or the low-level “your account is suspected of money laundering, please verify” scams. These state-sponsored hackers spend weeks or even months carefully constructing a fake tech company shell. They set up a flawless corporate website, create Slack workspaces with multiple active channels, and even arrange “colleagues” from various departments to passionately discuss business. They understand tech geeks all too well. To appear as busy, real executives, these hackers even schedule meetings in advance and politely email to reschedule as the time approaches. Such minor frictions, only found in the real business world, become the final hammer to break down the victim’s psychological defenses.
After weeks of small talk, discussion, and mutual flattery, a seemingly
DRIFT10,01%
DEFI10,38%
View Original
post-image
post-image
post-image
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 29
  • Repost
  • Share
Comment
Add a comment
Add a comment
XiaoXiCaivip
· 1h ago
Volatility is an opportunity 📊
View OriginalReply0
XiaoXiCaivip
· 1h ago
Experienced driver takes me 📈
View OriginalReply0
XiaoXiCaivip
· 1h ago
Confident HODL💎
View OriginalReply0
XiaoXiCaivip
· 1h ago
Confident HODL💎
View OriginalReply0
XiaoXiCaivip
· 1h ago
Just go for it💪
View OriginalReply0
discoveryvip
· 2h ago
2026 GOGOGO 👊
Reply0
Miss_1903vip
· 2h ago
To The Moon 🌕
Reply0
CryptoBGsvip
· 4h ago
LFG 🔥
Reply0
CryptoBGsvip
· 4h ago
To The Moon 🌕
Reply0
View More
MasterChuTheOldDemonMasterChuvip
· 4h ago
Just go for it 👊
View OriginalReply0
View More
  • Pin