
Unchained How 'Booth Babes' at Crypto Conferences Could Lead to Big Hacks Like Drift's
8 snips
Apr 8, 2026 Amanda Wick, crypto compliance lead at VerifyVASP, and Michael Lewellen, blockchain security pro from Turnkey, unpack a six‑month in‑person long con that enabled the $285M Drift hack. They probe conference social engineering, Potemkin identities, use of USDC for laundering, why stablecoin freezes lag, booth-access risks, nation‑state tradecraft, and practical operational defenses.
AI Snips
Chapters
Transcript
Episode notes
Long Term In-Person Intel Led To Multisig Compromise
- The Drift hack was a long-term intelligence operation that used in-person trust-building at conferences to compromise engineers and admin multisigs.
- Attackers cloned repos, exploited endpoint vulnerabilities, and obtained pre-signed multisig transactions weeks before execution.
Nation State Hacking Has Become Organized Revenue Operations
- Nation-state actors like DPRK now run franchise-style, revenue-driven hacking operations that use intermediaries and proxies.
- These groups target high-value crypto teams because stolen crypto funds materially fund state programs and are worth sustained effort.
Conference Booths And BD Are Real Attack Surfaces
- Non-technical conference practices like hiring booth staff can create attack surfaces by granting access to prospective customers.
- Casual BD interactions at conferences may leak PII or operational details attackers can exploit later.
