| payload |
{"created_at":"2026-04-07T23:23:54.391 {"created_at":"2026-04-07T23:23:54.391414+00:00","dedupe_key":"signal_enriched:discovery_crypto_extremes_delta:fdae8e802742710b","evidence_event_ids":["evt_e35760c47898"],"signal_type":"discovery_crypto_extremes_delta","source":"discovery_ingestor","value":{"aggregator_url":"https://decrypt.co/363364/north-korean-hackers-spent-six-months-infiltrating-drift-before-285m-exploit","as_of":"2026-04-07T23:23:54.391414+00:00","canonical_url":"https://decrypt.co/363364/north-korean-hackers-spent-six-months-infiltrating-drift-before-285m-exploit","enrichment":{"aggregator_url":"https://decrypt.co/363364/north-korean-hackers-spent-six-months-infiltrating-drift-before-285m-exploit","article_chars":4958,"article_truncated":false,"blocked_reason":null,"candidate_id":"sc_ef3fad309757f4a6","canonical_host":"decrypt.co","canonical_is_aggregator":false,"canonical_url":"https://decrypt.co/363364/north-korean-hackers-spent-six-months-infiltrating-drift-before-285m-exploit","content_type":"text/html; charset=utf-8","enriched_at":"2026-04-08T00:59:02.318942+00:00","extraction_method":"heuristic","fetched_description":"Drift Protocol said the attackers posed as traders, met contributors in person, and spent months infiltrating before draining the platform.","fetched_title":"North Korean Hackers Spent Six Months Infiltrating Drift Before $285M Exploit - Decrypt","final_url":"https://decrypt.co/363364/north-korean-hackers-spent-six-months-infiltrating-drift-before-285m-exploit","html_truncated":true,"paywall_likely":false,"publisher_domain":"decrypt.co","publisher_resolution":"canonical_url","requested_url":"https://decrypt.co/363364/north-korean-hackers-spent-six-months-infiltrating-drift-before-285m-exploit","source_event_id":"evt_e35760c47898","source_quality":"high","status_code":200,"version":"signal_enrichment_v2"},"fp":"4af12a2bb41a8919","kind":"crypto_extremes","published_at":"2026-04-06T09:52:05+00:00","publisher_domain":"decrypt.co","signal_understanding":{"analysis_basis":"article","claim_confidence":0.72,"dates_mentioned":[],"entities":[{"asset_class":"crypto_protocol","name":"Drift Protocol","relevance":"high","symbol":"","type":"company_or_protocol"},{"asset_class":"cyber_threat_actor","name":"North Korean hackers","relevance":"high","symbol":"","type":"threat_actor"},{"asset_class":"crypto","name":"BTC","relevance":"low","symbol":"BTC","type":"traded_asset"},{"asset_class":"crypto","name":"ETH","relevance":"low","symbol":"ETH","type":"traded_asset"}],"event_type":"conflict","information_gaps":["The provided text does not include the article body beyond the headline/source summary, so details like dates, method of compromise, and attribution evidence are not shown.","No confirmation is provided in the text about whether the $285M figure is exact, estimated, or net of recoveries.","The specific identities of the \u201ccontributors\u201d and the nature of the \u201cdraining\u201d (assets, contracts, timeline) are not included in the provided excerpt.","The large list of coin prices appears unrelated to the hacking claim and does not provide additional grounded details about the exploit."],"key_facts":["Drift Protocol stated attackers posed as traders.","Drift Protocol stated attackers met contributors in person.","Drift Protocol stated the attackers spent months infiltrating before the exploit.","The exploit amount is stated as $285M.","The attackers allegedly drained the platform."],"numeric_claims":[{"label":"exploit_amount_usd","value":"285M"}],"primary_claim":"Drift Protocol said North Korean hackers spent six months infiltrating the platform before carrying out a $285M exploit and draining it.","relevance_score":0.86,"sentiment":"negative","source_quality":"high","summary":"North Korean hackers allegedly infiltrated Drift Protocol for six months before executing a $285M exploit. The attackers reportedly posed as traders, met contributors in person, and then drained the platform.","topics":["crypto security","North Korea","hacking","Drift Protocol","exploit","infiltration","trader impersonation","in-person meetings","$285M exploit"]},"source":"Decrypt RSS","source_domain":"decrypt.co","summary":"Drift Protocol said the attackers posed as traders, met contributors in person, and spent months infiltrating before draining the platform.","tickers":[],"title":"North Korean Hackers Spent Six Months Infiltrating Drift Before $285M Exploit","url":"https://decrypt.co/363364/north-korean-hackers-spent-six-months-infiltrating-drift-before-285m-exploit"}}... |