Unchained

How 'Booth Babes' at Crypto Conferences Could Lead to Big Hacks Like Drift's

8 snips
Apr 8, 2026
Amanda Wick, crypto compliance lead at VerifyVASP, and Michael Lewellen, blockchain security pro from Turnkey, unpack a six‑month in‑person long con that enabled the $285M Drift hack. They probe conference social engineering, Potemkin identities, use of USDC for laundering, why stablecoin freezes lag, booth-access risks, nation‑state tradecraft, and practical operational defenses.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Long Term In-Person Intel Led To Multisig Compromise

  • The Drift hack was a long-term intelligence operation that used in-person trust-building at conferences to compromise engineers and admin multisigs.
  • Attackers cloned repos, exploited endpoint vulnerabilities, and obtained pre-signed multisig transactions weeks before execution.
INSIGHT

Nation State Hacking Has Become Organized Revenue Operations

  • Nation-state actors like DPRK now run franchise-style, revenue-driven hacking operations that use intermediaries and proxies.
  • These groups target high-value crypto teams because stolen crypto funds materially fund state programs and are worth sustained effort.
INSIGHT

Conference Booths And BD Are Real Attack Surfaces

  • Non-technical conference practices like hiring booth staff can create attack surfaces by granting access to prospective customers.
  • Casual BD interactions at conferences may leak PII or operational details attackers can exploit later.
Get the Snipd Podcast app to discover more snips from this episode
Get the app