{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreifxzajns2lqkr35h36u72kvcomakqyz5wz7wq4tuyix2f6emyi6xq",
    "uri": "at://did:plc:xb5etev7ncohgebas3kjeqek/app.bsky.feed.post/3miv3ug6k5rv2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreibeosm73habsdsqit4us25swm2nxwnjoxgoibr3n2owlasknmvcsm"
    },
    "mimeType": "image/png",
    "size": 164040
  },
  "path": "/north-korean-hackers-trading-firm-drift-protocol/",
  "publishedAt": "2026-04-06T11:09:26.000Z",
  "site": "https://hackread.com",
  "tags": [
    "Security",
    "Cyber Attacks",
    "Scams and Fraud",
    "Blockchain",
    "Crypto",
    "Drift",
    "Drift Protocol",
    "Fraud",
    "North Korea",
    "Scam",
    "UNC4736"
  ],
  "textContent": "North Korean hackers (UNC4736) posed as a trading firm for six months to infiltrate Drift Protocol, using social engineering tactics to steal $285M without suspicion.",
  "title": "North Korean Hackers Pose as Trading Firm to Steal $285M from Drift"
}