TLDR
- DPRK operatives infiltrate Web3 firms as Ethereum flags 100 cases
- Ethereum probe reveals hidden North Korean developers in crypto
- 100 DPRK-linked developers found embedded across Web3 teams
- Crypto firms face rising risks from DPRK developer infiltration
- Ethereum-backed project exposes long-term DPRK Web3 presence
The Ethereum Foundation revealed a major security breach involving hidden operatives inside Web3 companies. The six-month investigation identified 100 individuals linked to North Korea within crypto teams.The findings highlight a growing operational threat across the Ethereum ecosystem.
Investigation Reveals Coordinated Infiltration Across Web3
The Ethereum Foundation backed a structured investigation through its ETH Rangers initiative launched in late 2024. The program funded independent researchers focused on improving ecosystem security through targeted public goods efforts. As a result, one funded researcher created the Ketman Project to track suspicious developer activity.
The Ketman Project focused on identifying fake developers within Web3 organizations who use layered identities. Over six months, the project flagged 100 individuals linked to North Korea operating in crypto firms. Investigators contacted 53 projects that may have unknowingly employed these operatives.
The foundation confirmed that the findings expose a critical operational risk affecting Ethereum-based development environments. The project built an open-source detection tool to flag suspicious GitHub activity patterns. The initiative expanded efforts to strengthen ecosystem-level security defenses.
Longstanding DPRK Presence Tied to Major Crypto Exploits
Evidence shows that North Korean-linked developers have operated within crypto teams for several years. These individuals contributed to projects while masking their identities through credible technical output. Analysts traced many operations to the Lazarus Group, a state-backed hacking collective.
Reports estimate that North Korean-linked groups have stolen about $7 billion from crypto platforms since 2017. These incidents include high-profile breaches such as the Ronin Bridge exploit and the WazirX attack.The scale of damage reflects sustained and organized cyber activity.
Security researchers noted that these developers often possess genuine blockchain experience despite false identities. Many protocols across the DeFi ecosystem previously relied on such contributors. The infiltration extends beyond isolated cases into broader infrastructure exposure.
Basic Tactics Enable Persistent and Effective Operations
Investigators found that many infiltration methods rely on simple yet persistent tactics. These include job applications, LinkedIn outreach and remote interviews to gain trust within teams. As a result, operatives gradually embed themselves into development workflows.
The Ketman Project identified common warning signs across developer profiles and system behaviors. These include reused avatars, conflicting language settings, and exposure of unrelated email accounts. Inconsistencies often appear during screen sharing or repository activity reviews.
The project collaborated with the Security Alliance to develop a framework for identifying suspicious contributors. The initiative strengthened detection capabilities through shared intelligence across the industry. Organizations now have clearer tools to reduce exposure to hidden threats.







