{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreifxzajns2lqkr35h36u72kvcomakqyz5wz7wq4tuyix2f6emyi6xq",
"uri": "at://did:plc:xb5etev7ncohgebas3kjeqek/app.bsky.feed.post/3miv3ug6k5rv2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreibeosm73habsdsqit4us25swm2nxwnjoxgoibr3n2owlasknmvcsm"
},
"mimeType": "image/png",
"size": 164040
},
"path": "/north-korean-hackers-trading-firm-drift-protocol/",
"publishedAt": "2026-04-06T11:09:26.000Z",
"site": "https://hackread.com",
"tags": [
"Security",
"Cyber Attacks",
"Scams and Fraud",
"Blockchain",
"Crypto",
"Drift",
"Drift Protocol",
"Fraud",
"North Korea",
"Scam",
"UNC4736"
],
"textContent": "North Korean hackers (UNC4736) posed as a trading firm for six months to infiltrate Drift Protocol, using social engineering tactics to steal $285M without suspicion.",
"title": "North Korean Hackers Pose as Trading Firm to Steal $285M from Drift"
}