BTCC / BTCC Square / D3C3ntr4l /
ZACHXBT Exposes North Korean Hackers Targeting Meme Tokens: $1M Stolen in Latest Exploits

ZACHXBT Exposes North Korean Hackers Targeting Meme Tokens: $1M Stolen in Latest Exploits

Author:
D3C3ntr4l
Published:
2025-06-28 10:09:01
12
1


In a shocking revelation, blockchain investigator ZachXBT has uncovered a coordinated campaign by North Korean-linked hackers infiltrating meme token projects on ethereum and Solana. Over $1 million was stolen in recent exploits, with attackers posing as developers to compromise projects tied to Pepe creator Matt Furie and others. This report breaks down the tactics, impacted projects, and red flags for the crypto community. ---

How Are North Korean Hackers Infiltrating Meme Token Projects?

Recent investigations by ZachXBT and cybersecurity researchers reveal a sophisticated operation by the DPRK’s "RPPC Hacker Network." The group:

  • Poses as freelance blockchain developers using aged social media/GitHub profiles
  • Offers malicious code for token creation/trading automation (notably on Solana)
  • Targets newly launched projects with weaker security, like FAVVR and Chain/SAW NFTs

One confirmed hacker was hired by FAVVR, leading to a $680K exploit. The BTCC team notes these attacks mirror past DPRK web3 cons, where fake job postings delivered malware.

Which Projects Were Hit by the $1M Exploits?

The attackers focused on:

ProjectLossConnection
FAVVR$680KCTO Alex Hong vanished post-attack
Chain/SAW NFTs$220KLinked to Matt Furie’s Pepe IP
Other Solana tokens$100K+Fake dev teams on bomb.fun

On June 27, 2025, ZachXBT tweeted evidence tying the attacks to North Korean IT workers. Hackers minted fraudulent NFTs, crashing floor prices to zero.

What’s the DPRK’s Playbook for Crypto Hacks?

Beyond meme tokens, the group:

  • Runs fake freelancer sites (e.g., "Digital Living") to infiltrate projects
  • Shares "copy-trade tools" for Solana to spread malicious code
  • Uses stolen identities (Polish/US nationals) to bypass scrutiny

As spotted by @blackbigswan on June 26, one hacker team even recruited a Canadian facilitator (@0XTAN1319). The BTCC team warns:

How Can Projects Avoid DPRK Developer Scams?

Vet developers aggressively:

  1. Verify offline identities via video calls
  2. Audit GitHub histories (look for sudden activity spikes)
  3. Monitor for reused code from known exploits

ZachXBT’s full hacker profile list remains undisclosed to avoid tipping off active operatives.

---

Your Meme Token Security Questions Answered

Are all meme tokens unsafe now?

No. Attacks targeted specific new projects with lax hiring practices, not established tokens.

Which chains are most at risk?

Ethereum and solana were primary targets, but BNB Chain/Arbitrum code was also offered by hackers.

Did exchanges like BTCC freeze stolen funds?

No confirmation yet. The BTCC team advises checking wallet approvals via revoke.cash.

|Square

Get the BTCC app to start your crypto journey

Get started today Scan to join our 100M+ users