Unchained

How State-Sponsored Hackers Like DPRK Drain DeFi Protocols: Uneasy Money

Apr 6, 2026
A massive DeFi drain on Solana and the mystery of why frozen USDC stayed in Circle's control. Deep dives into DPRK-style malware, stealthy supply-chain compromises, and why antivirus often misses nation-state tooling. A fresh look at a high-profile source leak that exposes agent harnesses and what that means for rapid AI model development.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ADVICE

Pin Dependencies And Delay Updates To Avoid Supply Chain Malware

  • Pin dependencies and avoid auto-updating critical libraries immediately after a release to reduce supply-chain risk.
  • Taylor advises adding minimum-age rules (e.g., reject changes <7 days old) and delaying pulls to catch malicious package updates like Axios.
ADVICE

Use EDR Not Just Antivirus For High-Value Crypto Devices

  • Use EDR (like CrowdStrike) rather than basic AV because DPRK malware often evades signature-based detection.
  • Taylor says EDR detects abnormal behavior (persistence, heartbeat pings) that simple hash-based AV will miss.
ADVICE

Use Dedicated Rotating Devices For Sensitive Keys

  • Keep separate, dedicated devices for sensitive crypto or maintainer work and rotate them regularly to limit exposure.
  • Taylor and Kain recommend having multiple MacBooks with restricted use so compromise of one device doesn't expose all keys.
Get the Snipd Podcast app to discover more snips from this episode
Get the app