- Google warns that cryptocurrency safety lags behind Web3 innovation and cryptocurrency threat intelligence capabilities.
- North Korea exploits Web2 vulnerabilities – not blockchain flaws – to steal cryptocurrency for weapons programmes.
- Organisations deal with the improper safety layer.
Someplace on the planet, a cyber operator working for North Korea is stealing cryptocurrency on the precise second you’re studying this text. They’re clicking buttons, pushing keys, transferring funds in blockchain networks – and in contrast to conventional financial institution heists, you can truly watch it occur in real-time on a public ledger.
This isn’t a hypothetical state of affairs. It’s the fact that retains Joe Dobson up at night time. As a principal threat intelligence analyst at Mandiant, now a part of Google Cloud, Dobson specialises in monitoring and analysing illicit cryptocurrency and Web3 threats. However what considerations him most isn’t the theft itself, it’s that the trade lacks the specialists to cease it.
“The nightmare state of affairs for me is we attain some extent the place you have got widespread adoption of cryptocurrency by governments, by the personal sector, by people, however there’s not sufficient defenders there to really preserve it safe,” Dobson informed Tech Wire Asia in a latest interview. “Then it simply turns right into a searching floor for adversaries.”

Dobson argues governments and organisations proceed treating monetary and state-sponsored crime as separate domains, creating harmful blind spots. The chance, nonetheless, lies in blockchain’s transparency. In contrast to conventional monetary investigations, the place accessing checking account info requires navigating buyer privateness laws, cryptocurrency operates on public ledgers.
“It’s like having the ability to see the threat actor’s checking account,” Dobson famous. “You know the way a lot cash they’ve. You possibly can see the place they’re spending it.”
This visibility lets defenders measure their effectiveness in real-time. When Google’s cryptocurrency threat intelligence group discovers malware designed to steal cryptocurrency, they’ll see instantly how a lot was stolen and observe the place the funds transfer. That’s intelligence that will be unimaginable with conventional banking programs.
The vital blind spot everybody misses
Regardless of Web3’s cryptographic sophistication, Dobson identifies a flaw in how organisations method safety: they’re so targeted on blockchain expertise that they ignore the Web2 infrastructure supporting it.
“Web3 expertise is definitely constructed on Web2 expertise,” he explains. “All these blockchains run on servers. These servers are managed by means of net interfaces and thru SSH. The businesses operating them have e-mail, they’ve social media,” – all conventional assault vectors that hackers have been exploiting for many years.
The blind spot has confirmed expensive. In line with Dobson, the most important cryptocurrency heists in historical past all occurred attributable to Web2 vulnerabilities, not blockchain exploits. Organisations audit good contracts and guarantee cryptographic safety and depart conventional assault vectors extensive open.
“You’ve got all this actually distinctive software program that’s cryptographically safe, audited good contracts, however the precise implementation requires people and Web2,” he stated. “Folks get so targeted on the truth that it’s Web3 and needs to be completely different that they’re not being attentive to the truth that the precise basis is Web2.”
North Korea’s IT employee infiltration
Past theft operations, threat actors have developed extra insidious ways. North Korea has been embedding IT staff in international companies, and Dobson’s detection suggestions throughout hiring processes are surprisingly easy but efficient.
His favorite? The “soda check.”
“Ask them to go get a soda from the fridge,” Dobson recommended. “As a result of the IT staff often are usually not the place they declare to be. Once you go to a overseas nation and purchase Coca-Cola or Pepsi, it’s going to be in regardless of the native font is, within the native language.”
Whereas it sounds nearly comically easy, this method – mixed with asking candidates to wave their fingers in entrance of their faces throughout video interviews to defeat AI face-swapping software program – has confirmed efficient at revealing location fraud.
AI: The approaching multiplier
The intersection of synthetic intelligence and cryptocurrency presents alternatives and threats. Dobson highlighted the X.402 protocol (designed for on-line funds) which lets AI brokers transact utilizing cryptocurrency wallets autonomously.
“AI brokers aren’t going to have financial institution accounts, however they’ll have cryptocurrency wallets, and they also’re going to have the ability to transfer funds round,” he stated. Which means threat actors’ AI brokers may buy infrastructure and domains independently, with out human intervention.
The evolution in ways extends past theft. Threat actors have begun utilizing blockchain as command-and-control programs for malware, embedding C2 addresses in good contracts that, as soon as on-chain, stay completely accessible.
“As soon as it’s on a sequence, it by no means goes away. It’s on there perpetually, and meaning you possibly can’t take it down,” Dobson defined. “Once you’re blocking it, it’s not a standard area, so it’s important to block it otherwise.”
The place experience falls short
On-chain evaluation gives benefits for cryptocurrency threat intelligence attribution. When adversaries reuse wallets, investigators can assess connections to recognized threat actors rapidly. Nonetheless, refined actors can exploit the identical transparency for misdirection, intentionally sending funds to wallets related to different threat actors.
The experience scarcity extends past company safety groups to incorporate legislation enforcement. Dobson recounted an incident the place a sufferer whose NFT was stolen by North Korean actors referred to as native police, solely to be requested: “What’s an NFT?”
Whereas federal companies just like the FBI have developed countermeasure capabilities, they can’t reply to each cryptocurrency theft. The hole between the size of the issue and obtainable experience is widening.
Public-private partnership challenges
When Google’s cryptocurrency threat intelligence group identifies state-backed operations, collaboration with the general public sector is hampered by a central situation: cryptocurrency is simply too new for information-sharing networks that exist in additional established industries.
“Once you take a look at the medical trade, the finance trade, there’s been much more time for people to go from working at a cybersecurity firm to a medical firm, again to a cyber firm,” he stated. “As a result of cryptocurrency is so new, you don’t have as a lot of that.”
Dobson burdened that public organisations have to be “pleasant in direction of crypto” to encourage info sharing. “If somebody thinks that the data they share goes to be weaponised in opposition to their trade, they’re not going to share.”
A believer regardless of the threats
Regardless of cataloguing an alarming array of threats, Dobson stays a cryptocurrency advocate who believes in its transformative potential. He factors to authentic makes use of like worldwide remittances and peer-to-peer funds that cryptocurrency facilitates extra effectively than conventional programs.
“Are cryptocurrency ATMs generally utilized by scammers? Completely,” he acknowledged. “However they’re additionally used for authentic functions. If you wish to ship a remittance to a member of the family abroad, going to a cryptocurrency ATM? That’s in all probability the quickest approach you are able to do it.”
The problem, he argues, isn’t eliminating cryptocurrency however constructing the safety experience and person expertise enhancements wanted to guard it. “Safety in cryptocurrency shouldn’t be straightforward. That doesn’t imply we should always eliminate cryptocurrency, nevertheless it means we’d like to concentrate on that situation in order that we are able to collectively work on it.”
The experience pipeline disaster
Dobson’s biggest concern stays the mismatch between cryptocurrency adoption and defensive capability.
“Have a look at how rapidly cryptocurrency has grown in market share, market cap, after which take a look at what number of safety jobs there have been in cryptocurrency,” he stated. “Defenders aren’t ready as a result of they don’t absolutely comprehend the extent of innovation in Web3.”
As cryptocurrency strikes towards mainstream adoption by governments, companies, and people, the trade faces a vital query: can it construct the experience pipeline quick sufficient to forestall Dobson’s nightmare state of affairs?
The reply will decide whether or not cryptocurrency fulfils its promise as a transformative expertise or turns into precisely what Dobson fears – a searching floor the place adversaries function with impunity as a result of there merely aren’t sufficient defenders to cease them.
Need to expertise the complete spectrum of enterprise expertise innovation? Be part of TechEx in Amsterdam, California, and London. Masking AI, Massive Information, Cyber Safety, IoT, Digital Transformation, Clever Automation, Edge Computing, and Information Centres, TechEx brings collectively international leaders to share real-world use instances and in-depth insights. Click on here for extra info.
Tech Wire Asia is powered by TechForge Media. Discover different upcoming enterprise expertise occasions and webinars here.














