{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreihqa6oc4eze4ne2hchlnwwxikneipmifeq47louja6xcpoknwnnya",
    "uri": "at://did:plc:ffceenzwg7ga7lvndlohp3mg/app.bsky.feed.post/3mjixnloo3bi2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreibg26xo7rrhpkbebjo6ijbmmksumggqf2wyxlfwagczc4e4uxq5ci"
    },
    "mimeType": "image/webp",
    "size": 21316
  },
  "path": "/single/hyperbridge-exploit",
  "publishedAt": "2026-04-14T13:43:23.290Z",
  "site": "https://web3isgoinggreat.com",
  "textContent": "On April Fools' Day, the Hyperbridge blockchain bridge project posted a tweet claiming that the North Korean Lazarus hacking group had drained $37 million from the project. A linked blog post contained a Rickroll GIF and an explanation of \"Why Hyperbridge can't be hacked\".The following day, a Hyperbridge developer posted a screenshot of a blockchain transaction, writing \"Lmao the uniBTC exploiter is testing Hyperbridge. I hope you have a quantum computer bro\". Another commenter replied, \"Rule #1 dont actively provoke attackers\".About two weeks later, an attacker was able to forge a transaction to change the admin rights for the Polkadot/Ethereum bridge contract, allowing them to mint 1 billion DOT tokens. They were able to cash out about $237,000 due to limited liquidity.The April Fools' posts have since been deleted. \"Hyperbridge exploited less than two weeks after April Fools’ day hack prank\" , Protos Tweet by 0xMarforio",
  "title": "Hyperbridge exploited two weeks after April Fools' hack joke",
  "updatedAt": "2026-04-14T13:45:24.937Z"
}