The developers who helped build some of the most widely used DeFi protocols were, in at least 40 documented cases, working for North Korea. That is the core claim from Taylor Monahan, a security researcher at MetaMask, who said on April 6 that DPRK IT workers have been embedded in crypto projects since DeFi summer.
"Lots of DPRK IT workers built the protocols you know and love," Monahan wrote. The infiltration spans at least seven years, and the workers' claimed blockchain development experience, she added, "is not a lie."
Fake Resumes, Real Code
The infiltration method is not technically sophisticated. North Korean operatives apply for developer positions through standard channels: job boards, LinkedIn outreach, and hiring pipelines. They show up to Zoom interviews. They pass technical screens.
What makes detection difficult is the identity infrastructure behind them. Monahan described "fully constructed identities including employment histories, public-facing credentials, and professional networks built to withstand due diligence." In many cases, non-North Korean third-party intermediaries handle face-to-face meetings and conferences, providing an additional layer of separation.
ZachXBT, the on-chain investigator who has tracked similar infiltration patterns, described the job-based threats as "basic and in no way sophisticated." The relentlessness is the weapon, not the complexity. A single rejection costs the operation nothing. They submit hundreds of applications.
Once inside a protocol's codebase, the operatives gain access to internal communications, deployment keys, and the trust that comes with being a contributing team member. That access can sit dormant for months before it is weaponized.
$7 Billion and Counting
The Lazarus Group, North Korea's primary state-backed cyber unit, has stolen an estimated $7 billion in cryptocurrency since 2017. The headline incidents are familiar: $625 million from the Ronin Bridge in 2022, $235 million from WazirX in 2024, $1.4 billion from Bybit in 2025, and $280 million from Drift Protocol earlier this month.
What Monahan's disclosure adds is the supply chain layer. These are not all external attacks. In the Drift case, the operatives spent six months attending conferences, depositing over $1 million of their own capital, and building face-to-face relationships before compromising two multisig signers in under a minute. The exploit required insider-level knowledge of the protocol's signing architecture.
Radiant Capital suffered a similar pattern. The thread connecting these incidents is the same: the attacker was, at some point, a colleague.
Why DeFi Is the Target
Traditional finance has centralized compliance departments, background check vendors with government database access, and physical offices where employees badge in. DeFi has pseudonymous contributors, remote-first teams, and governance structures that reward shipping code over verifying identities.
For a state actor running hundreds of fake developer personas simultaneously, that environment is close to ideal. The protocols pay well, the work is remote, the identity verification is minimal, and the codebase access is broad.
Monahan's estimate of 40+ affected platforms likely understates the problem. She specified that these are the projects where infiltration was identified. The number that went undetected is unknown.
The Screening Gap
The US Office of Foreign Assets Control (OFAC) maintains a sanctions screening framework that crypto businesses can use to verify counterparties, but it was designed for transaction monitoring, not employment vetting. Checking whether a wallet address appears on the SDN list is straightforward. Checking whether a developer applying through a staffing agency in Singapore is routing their salary to Pyongyang is not.
Several protocols have begun implementing stricter contributor onboarding: video calls with identity verification services, code commit reviews with geographic metadata, and compensation structures that require bank accounts in verified jurisdictions. These measures add friction to a hiring process that many DeFi teams built to be as frictionless as possible.
The tension is structural. DeFi's openness is both its value proposition and its attack surface.
What This Means for Users
For anyone holding funds in a DeFi protocol, Monahan's disclosure raises a question that cannot be answered from the outside: who actually wrote the code your money sits in?
Self-custody wallets reduce counterparty risk from exchanges and custodians. They do not reduce risk from compromised smart contracts. If a protocol's multisig was signed by someone who was, at any point, a North Korean operative, the contract's security assumptions may not hold.
The practical takeaway: diversify across protocols, limit exposure to any single smart contract, and pay attention to which projects have completed rigorous third-party security audits with firms that verify contributor backgrounds.
As of April 6, 2026, BTC trades at $69,910 (+3.9% in 24 hours), ETH at $2,147 (+4.4%), and SOL at $82.05 (+2.9%). The Fear & Greed Index sits at 38, in "Fear" territory. The market is climbing on ceasefire optimism while the security infrastructure under it remains porous.
Overview
MetaMask security researcher Taylor Monahan disclosed that North Korean IT workers have been embedded inside at least 40 DeFi protocols for seven years, using fabricated identities and third-party intermediaries. The Lazarus Group has stolen an estimated $7 billion in crypto since 2017, with recent incidents at Drift Protocol, Bybit, and WazirX all connected to insider access rather than external code exploits. DeFi's remote-first, pseudonymous hiring culture creates structural vulnerability that current screening tools were not designed to address. Users should diversify protocol exposure and prioritize platforms with verified contributor backgrounds and completed security audits.








