North Korean Cyber Heist: Radiant Capital’s $50M Vanishing Act!
Radiant Capital fell victim to a $50 million heist orchestrated by a North Korean threat actor. The cunning hackers used malware-infected developer devices to sign fraudulent transactions during a routine process. The attack, attributed to UNC4736, went undetected as malicious transactions hid behind a façade of legitimacy.

Hot Take:
In this techy twist of fate, it looks like the only thing Radiant Capital got from their “trusted” contractor was a big ol’ $50 million headache, courtesy of North Korea. Maybe next time they’ll think twice before opening that sketchy PDF. Who knew that malware could double as a financial advisor?
Key Points:
- Radiant Capital suffered a $50 million heist in October due to a sophisticated malware attack.
- Three developers were deceived into signing fraudulent transactions via infected devices.
- The incident began with a deceptive Telegram message and a disguised malware-laden PDF.
- Mandiant attributes the attack to a North Korean threat group, UNC4736, also known as AppleJeus or Citrine Sleet.
- The attack spanned multiple blockchain networks, including Arbitrum, Base, Binance Smart Chain, and Ethereum.
Already a member? Log in here
