{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreihqa6oc4eze4ne2hchlnwwxikneipmifeq47louja6xcpoknwnnya",
"uri": "at://did:plc:ffceenzwg7ga7lvndlohp3mg/app.bsky.feed.post/3mjixnloo3bi2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreibg26xo7rrhpkbebjo6ijbmmksumggqf2wyxlfwagczc4e4uxq5ci"
},
"mimeType": "image/webp",
"size": 21316
},
"path": "/single/hyperbridge-exploit",
"publishedAt": "2026-04-14T13:43:23.290Z",
"site": "https://web3isgoinggreat.com",
"textContent": "On April Fools' Day, the Hyperbridge blockchain bridge project posted a tweet claiming that the North Korean Lazarus hacking group had drained $37 million from the project. A linked blog post contained a Rickroll GIF and an explanation of \"Why Hyperbridge can't be hacked\".The following day, a Hyperbridge developer posted a screenshot of a blockchain transaction, writing \"Lmao the uniBTC exploiter is testing Hyperbridge. I hope you have a quantum computer bro\". Another commenter replied, \"Rule #1 dont actively provoke attackers\".About two weeks later, an attacker was able to forge a transaction to change the admin rights for the Polkadot/Ethereum bridge contract, allowing them to mint 1 billion DOT tokens. They were able to cash out about $237,000 due to limited liquidity.The April Fools' posts have since been deleted. \"Hyperbridge exploited less than two weeks after April Fools’ day hack prank\" , Protos Tweet by 0xMarforio",
"title": "Hyperbridge exploited two weeks after April Fools' hack joke",
"updatedAt": "2026-04-14T13:45:24.937Z"
}