{"@type":"StructuredNewsArticle","access":{"license":"neupai_standard","structured_data":"free","full_text_access":null,"full_text_available":false,"attribution_required":true},"content":{"claims":[{"id":"c1","type":"fact","as_of":"2026-04","figures":{"unit":"USD","value":270000000,"converted":{"unit":"KRW","value":409000000000},"approximate":false},"insight":{},"as_of_raw":"April 2026","statement":"A hacking organization linked to North Korea stole $270 million (approximately ₩409 billion) from cryptocurrency trading platform Drift Protocol","comparison":null,"expiry_hint":null,"source_type":"journalist_analysis","as_of_explicit":false},{"id":"c2","type":"fact","as_of":"2025-12","figures":{"unit":"USD","value":1000000,"converted":{"unit":"KRW","value":1500000000},"approximate":false},"insight":{},"as_of_raw":"starting from December 2025","statement":"The attackers deposited $1 million (₩1.5 billion) of their own money starting in December 2025 and built relationships by meeting Drift employees directly at blockchain events in various countries","comparison":null,"expiry_hint":null,"source_type":"journalist_analysis","as_of_explicit":true},{"id":"c3","type":"fact","as_of":"2026-04","figures":{"unit":"months","value":6,"converted":null,"approximate":false},"insight":{},"as_of_raw":"over 6 months","statement":"It was revealed that they had been building trust by disguising themselves as a legitimate investment company for 6 months","comparison":null,"expiry_hint":null,"source_type":"journalist_analysis","as_of_explicit":false},{"id":"c4","type":"fact","as_of":"2026-04-01","figures":null,"insight":{},"as_of_raw":"April 1st","statement":"They withdrew the money on April 1st","comparison":null,"expiry_hint":null,"source_type":"journalist_analysis","as_of_explicit":true}],"topics":["cybersecurity","cryptocurrency","hacking","blockchain","north korea"],"summary":"A North Korean-linked hacking organization built trust relationships over 6 months before stealing $270 million from Drift Protocol. The hackers disguised themselves as a fake investment company, built relationships with employees, then exploited security vulnerabilities in malicious apps and code editing programs to carry out the attack.","entities":[{"name":"Drift Protocol","type":"product","metadata":{"parent":null,"ticker":null},"canonical_id":"product:xx:nttk-ttikici","role_in_article":"primary_subject"},{"name":"VS Code","type":"product","metadata":{"parent":"corp:us:microsoft","ticker":null},"canonical_id":"product:us:vscode","role_in_article":"mentioned"},{"name":"Cursor","type":"product","metadata":{"parent":null,"ticker":null},"canonical_id":"product:xx:cobo","role_in_article":"mentioned"}],"headline":"North Korean Hackers Steal ₩409 Billion from Drift by Posing as Employee Friends for 6 Months","geography":["KR","KP"],"ai_emotional_context":{"arousal":0.7,"valence":-0.6,"primary_emotions":[{"emotion":"alarmed","intensity":0.7},{"emotion":"concerned","intensity":0.6}],"emotional_triggers":[{"reason":"significant_negative_metric","emotion":"alarmed","claim_id":"c1"},{"reason":"safety_risk","emotion":"concerned","claim_id":"c2"}],"secondary_emotions":[{"emotion":"vigilant","intensity":0.5}]}},"@context":"https://neupai.io/schema/v0.2","identity":{"ai_url":null,"author":"앨리스","language":"en","publisher":{"name":"Tech42","type":"online","domain":"tech42.co.kr"},"article_id":"tech42_20260405_north-korea-hackers-drift-protocol-hack","updated_at":null,"originality":"self_produced","article_type":"straight_news","published_at":"2026-04-05T23:41:36.000Z","canonical_url":"https://www.tech42.co.kr/%eb%b6%81%ed%95%9c-%ed%95%b4%ec%bb%a4-6%ea%b0%9c%ec%9b%94%ea%b0%84-%ec%a7%81%ec%9b%90-%ec%b9%9c%ea%b5%ac-%ed%96%89%ec%84%b8%ed%95%98%eb%a9%b0-%eb%93%9c%eb%a6%ac%ed%94%84%ed%8a%b8%ec%84%9c-4090/?utm_source=rss&utm_medium=rss&utm_campaign=%25eb%25b6%2581%25ed%2595%259c-%25ed%2595%25b4%25ec%25bb%25a4-6%25ea%25b0%259c%25ec%259b%2594%25ea%25b0%2584-%25ec%25a7%2581%25ec%259b%2590-%25ec%25b9%259c%25ea%25b5%25ac-%25ed%2596%2589%25ec%2584%25b8%25ed%2595%2598%25eb%25a9%25b0-%25eb%2593%259c%25eb%25a6%25ac%25ed%2594%2584%25ed%258a%25b8%25ec%2584%259c-4090"},"temporal":{"freshness":"recent","next_update_expected":null},"provenance":{"source_chain":["primary_reporting"],"related_articles":[],"original_source_url":null}}