AI crypto hacks drain $600M from DeFi as North Korea exploits surge in sophistication

2 Sources

Share

Two devastating attacks in April 2026 drained nearly $600 million from cryptocurrency platforms, with cybersecurity experts attributing the unprecedented sophistication to AI-powered hacking tools. The Drift Protocol and Kelp DAO breaches triggered cascading failures across DeFi, forcing a $9 billion withdrawal from Aave and prompting emergency responses across the cryptocurrency industry.

AI Crypto Hacks Devastate DeFi Platforms in April 2026

The cryptocurrency industry faced its most severe test yet when two major AI-powered crypto hacks drained almost $600 million within weeks of each other in April 2026. On April 1, attackers extracted roughly $285 million from Drift Protocol, a Solana-based derivatives exchange, followed by a $292 million breach of Kelp DAO's cross-chain bridge on April 18

1

. Together, these blockchain exploits accounted for 76% of all crypto hack losses in 2026 so far, according to blockchain forensics firm TRM Labs

1

.

Both attacks are widely attributed to North Korea-linked groups, but what alarmed cybersecurity experts most was not the scale but the method. TRM investigator Nick Carlsen, a former FBI analyst specializing in North Korean crypto crime, said the sophistication of the April heists makes it highly likely the attackers used artificial intelligence to select targets and design exploits. "This is all stuff North Korea never used to do," he noted

1

.

Sophisticated Cyberattacks in the Cryptocurrency Industry Accelerate

Source: PYMNTS

Source: PYMNTS

The Drift hack demonstrated the devastating potential of AI-supported attacks. Attackers spent months posing as a quantitative trading firm to trick employees into authorizing malicious transactions

1

. They manufactured a fictitious token, built an inflated trading record to make it appear legitimate, and used it as collateral to drain real assets in roughly 12 minutes. In an update provided during the attack, Drift described it as "a highly sophisticated operation that appears to have involved multi-week preparation and staged execution, including the use of double nonce accounts to pre-sign transactions that delayed execution"

2

.

Drift's total value locked collapsed from $550 million to under $300 million within an hour

1

. The exchange shut down and is now planning to relaunch after securing a roughly $148 million rescue package led by stablecoin issuer Tether

1

2

. A smaller DeFi project called Carrot, which had routed user funds through Drift-integrated vaults, announced on April 30 that it was shuttering entirely

1

.

Cascading Failures Expose DeFi Vulnerabilities

The Kelp DAO hack triggered an even wider crisis. Rather than selling the stolen funds immediately, the attackers deposited roughly $200 million of the proceeds as collateral on Aave, the largest decentralized lending protocol

1

. This move sparked a crisis of confidence: depositors, fearing the collateral backing Aave might be worthless, pulled roughly $9 billion from the platform in two days

1

2

. Total value locked across all DeFi lending protocols dropped by more than $13 billion in 48 hours, and Aave ended up needing a rescue of its own

1

.

The episode illustrated a structural vulnerability that distinguishes decentralized finance from traditional banking. Transactions over blockchains cannot be reversed, there is no central authority to freeze suspicious transfers before they settle, and the interconnected nature of DeFi protocols means a single exploit can cascade through an ecosystem of roughly $130 billion in locked assets

1

.

AI Cyber Threats Compress Detection Times to Hours

Determining whether hackers used AI is not an exact science, but more than half a dozen cybersecurity experts interviewed said the abrupt rise in DeFi exploits serves as a clear indicator that attackers are deploying widely available AI models

1

. April 2026 saw a record 28 to 30 incidents, almost doubling the previous high

1

.

"With AI, the cost of vulnerability detection is trending to zero," said Aneirin Flynn, chief executive of security audit firm Failsafe. The time it takes for hackers to identify a weakness in a blockchain protocol has been compressed from months to days or even hours

1

2

.

Anthropic's Mythos Model Looms Over Industry

Anthropic's own research supports the premise. In December, the company published a study showing that more than half of blockchain exploits carried out in 2025 "could have been done autonomously" using AI agents

1

. What researchers called "potential exploit revenue" had been doubling every 1.3 months, and the average cost of scanning a smart contract for vulnerabilities had fallen to $1.22

1

. A separate test by engineers at a16z, the largest crypto venture capital firm, found that an AI trained on past DeFi hacks "always found the vulnerability" in a given protocol, though it could not yet fully design a profitable exploit without human assistance

1

.

Hanging over the industry is Anthropic's Mythos, the AI model the company has withheld from wide release because of its cybersecurity capabilities

1

2

. In testing, Mythos autonomously discovered thousands of previously unknown zero-day vulnerabilities across every major operating system and web browser, including a flaw in OpenBSD that had gone undetected for 27 years

1

. Anthropic chose to limit access to a handful of major technology companies and banks through what it calls Project Glasswing, rather than releasing the model publicly

1

.

There is no evidence that the April hackers had access to Mythos, but the model's existence underscores a broader anxiety: if existing, publicly available AI tools are already capable of accelerating crypto heists to this degree, what happens when more powerful models inevitably leak or are replicated

1

?

Cryptocurrency Industry Deploys Emergency Defenses

Crypto firms are responding to AI cyber threats with multiple defensive measures. Companies are adding threat detection software that scans devices connected to a network to detect potential threats

2

. Platforms are installing transaction circuit breakers that pause or limit transactions above a certain threshold

2

. For DeFi lenders, the response includes expanding the risk framework for collateral to include cybersecurity factors

2

. These measures aim to create layers of protection against attacks that can now be executed in hours rather than months, as AI agents give anyone the skills of an elite hacker

2

.

Today's Top Stories

TheOutpost.ai

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

Instagram logo
LinkedIn logo
Youtube logo
© 2026 TheOutpost.AI All rights reserved