Ethereum Foundation Exposes 100 North Korean Operatives in 53 Crypto Projects

The six-month ETH Rangers program recovered $5.8 million and flagged 785 vulnerabilities. Investigators say DPRK workers used fake identities and normal hiring channels to embed inside Web3 teams.

The Ethereum Foundation has disclosed that its ETH Rangers Program, a six-month security initiative launched in late 2024, identified approximately 100 IT workers linked to North Korea embedded across 53 crypto projects. The program also recovered roughly $5.8 million in funds and surfaced more than 785 security vulnerabilities across the Ethereum ecosystem. The Foundation published its findings in a blog post on April 16, the same week the U.S. Department of Justice sentenced two American nationals to at least seven years in prison for helping DPRK operatives pose as U.S.-based developers to infiltrate roughly 100 domestic companies.

The Ketman Project: Hunting Fake Developers

The core detection work was led by the Ketman Project, a research initiative funded through an ETH Rangers stipend. Ketman partnered with the Security Alliance (SEAL) to develop a framework for identifying DPRK-linked personnel within crypto organizations. The framework targets behavioral, technical, and identity-based red flags rather than relying solely on on-chain analysis.

According to Ketmanโ€™s published research, common indicators of DPRK operatives include reusing avatars and profile metadata across multiple GitHub accounts, accidentally exposing unlinked email addresses during screen sharing sessions, and displaying default language settings (such as Russian or Korean) that contradict their claimed nationality. The operatives typically enter through normal hiring channels, presenting fabricated professional identities and sometimes making credible technical contributions to build trust before exploiting their access.

Ketman also developed and open-sourced gh-fake-analyzer, a GitHub profile analysis tool designed to detect suspicious activity patterns. The tool is available on PyPI and has already been adopted by multiple project teams for screening developer applicants.

North Korean IT Workers Have Been Building DeFi Protocols Since 2020

ETH Rangers by the Numbers

The Ethereum Foundation described the programโ€™s combined output as evidence that securing a decentralized network requires a decentralized defense.

Metric Result
DPRK operatives identified ~100
Crypto projects alerted 53
Funds recovered $5.8 million
Vulnerabilities reported 785+
Teams engaged in security challenges 800+
Views and users reached 209,000+
Program duration 6 months (late 2024 โ€“ mid 2025)

Blockchain investigator Nick Bax played a parallel role outside the formal program structure, independently identifying and notifying more than 30 project teams that DPRK-linked workers were on their active payrolls. He helped freeze hundreds of thousands of dollars in crypto already received by those operatives.

Not Just Ethereum: A Sector-Wide Infiltration Problem

The ETH Rangers findings add to a growing body of evidence about the scale of DPRK infiltration across the crypto industry. Chainalysis reported that North Korean hackers stole approximately $2 billion in cryptocurrency in 2025, a 51% increase from the previous year. The Drift Protocol exploit earlier this month, which drained $285 million from the Solana-based decentralized exchange, was linked to a DPRK-affiliated group tracked as UNC4736 (Citrine Sleet), the same actors behind the 2024 Radiant Capital hack.

MetaMask developer Taylor Monahan has previously noted that DPRK-linked developers have been contributing to widely used protocols since the early DeFi era. โ€œLots of DPRK IT workers built the protocols you know and love, all the way back to DeFi summer,โ€ she said, adding that more than 40 platforms have relied on such contributors at various points.

DOJ Sentences Two Americans Who Helped DPRK Workers

The Ethereum Foundationโ€™s disclosure coincided with a U.S. criminal enforcement action targeting the support infrastructure behind DPRK infiltration. The Department of Justice reported that two U.S. nationals pleaded guilty to wire fraud and money-laundering conspiracy charges for helping DPRK workers pose as Americans to gain access to roughly 100 U.S. companies. Each received a sentence of at least seven years in prison. The pair received $700,000 for their roles in routing millions in proceeds from victimized companies to DPRK-controlled accounts. Eight additional defendants indicted in connection with the same scheme remain at large.

Security Is No Longer Just About Code

The ETH Rangers results underscore a shift in how the crypto industry must think about security. The threat is no longer limited to smart contract bugs and oracle manipulation. It now includes who writes the code and who operates the infrastructure. Investigators recommend stronger KYC and background screening for remote technical hires, monitoring of contributor payment patterns, and active collaboration with blockchain analytics firms when wallet behavior appears suspicious. The Ethereum Foundation described the programโ€™s conclusion as a structural milestone, but the underlying threat remains active and requires ongoing investment in detection infrastructure.

Disclaimer The information provided on Coingo.net is for informational purposes only and does not constitute financial or investment advice. Cryptocurrency investments are highly volatile and involve risk. While we strive to provide accurate and up-to-date information, some details may change over time. Always conduct your own research before making any financial decisions.
TAGGED: