A cryptocurrency protocol on $BLAST was exploited for $62 million following the accidental hiring of a North Korean developer. The incident has sparked discussions on the risks associated with hiring practices in the crypto industry. The hacker, identified as a North Korean developer, reportedly never transferred ownership of the smart contracts back to the team, leading to the exploit. This has led to a broader investigation, revealing that four different developers, all linked to the exploiter and likely the same person, were hired by the Munchables team. These individuals recommended each other for the job, transferred payments to the same two exchange deposit addresses, and funded each other's wallets.
This is the Github profile of the North Korean dev that hacked Munchables on Blast. Here are all the red flags🚩 for those of you looking to hire in the future: 1) Clear logo farming, very unlikely any dev is super proficient in all of these languages/tools. There are more… https://t.co/5Cep9ngV3g
Four different devs hired by the Munchables team and linked to the exploiter are likely all the same person as they: >recommended each other for the job >regularly transferred payments to the same two exchange deposit addresses >funded each others wallets Github Username… https://t.co/Pjjo4uKXPE https://t.co/Q0scxp6AxK
Things to look out for when trying to NOT hire NK "devs" https://t.co/gTVXWS7Nov
Wait, so a crypto dev hired a north korean and they got hacked? Color me surprised!
UPDATE: The hacker was reportedly a North Korean dev who never transferred ownership of the smart contracts back to the team. https://t.co/Nfuri6EhAY
So a protocol on $BLAST was exploited for $62 million and they accidentally hired a North Korean dev. wot.
"accidentally hired a North Korean dev" Ok. https://t.co/gwyJGUFKAh
note to self: don't hire north korean devs
"They accidentally hired a North Korean developer" 1) What now? https://t.co/7BX0Uw8nu7