{"id":72057,"date":"2026-05-05T00:50:22","date_gmt":"2026-05-05T00:50:22","guid":{"rendered":"https:\/\/crowdfundjunction.com\/blog\/ripple-shares-dprk-threat-data-on-fraud-domains-wallets-campaigns\/"},"modified":"2026-05-05T00:50:22","modified_gmt":"2026-05-05T00:50:22","slug":"ripple-shares-dprk-threat-data-on-fraud-domains-wallets-campaigns","status":"publish","type":"post","link":"https:\/\/crowdfundjunction.com\/blog\/ripple-shares-dprk-threat-data-on-fraud-domains-wallets-campaigns\/","title":{"rendered":"Ripple Shares DPRK Threat Data on Fraud Domains, Wallets, Campaigns"},"content":{"rendered":"<p><b>(Originally posted on : Bitcoin News )<\/b><br \/>\n<\/p>\n<div>\n<p><strong>Key Takeaways:<\/strong><\/p>\n<ul>\n<li>Ripple will provide <span>Crypto<\/span> ISAC members intelligence on DPRK-linked fraud domains, wallets, and campaigns.<\/li>\n<li>Security teams can use enriched identity signals to assess applicants, contractors, and vendors.<\/li>\n<li> <span>Crypto<\/span> ISAC\u2019s API will distribute shared data with context, confidence levels, and linked indicators.<\/li>\n<\/ul>\n<h2>Ripple Threat Intelligence Expands <span>Crypto<\/span> Defense<\/h2>\n<p>Ripple shared on May 4, 2026, that it will provide North Korea-linked threat intelligence to the <span>Crypto<\/span> Information Sharing and Analysis Center ( <span>Crypto<\/span> ISAC). The move puts hiring, vendor screening, and identity-based risk at the center of <span>crypto<\/span> defense as attackers increasingly seek access through people, not only software flaws.<\/p>\n<p>The program gives <span>Crypto<\/span> ISAC members access to Ripple\u2019s high-confidence intelligence on the Democratic People\u2019s Republic of Korea (DPRK)-linked activity. The shared data covers fraud-related domains, wallets, and indicators of compromise tied to active campaigns. Its value comes from added context, including identity details and signals that connect suspected actors to wider operations. That can help security teams assess applicants, contractors, and outside partners before access is granted. Ripple stated on X:<\/p>\n<blockquote>\n<p>\u201cThe strongest security posture in <span>crypto<\/span> is a shared one. A threat actor who fails a background check at one company will apply to three more that same week. Without shared intelligence, every company starts from zero.\u201d<\/p>\n<\/blockquote>\n<h2> <span>Crypto<\/span> ISAC API Targets Identity-Based Risk<\/h2>\n<p> <span>Crypto<\/span> ISAC\u2019s updated API provides the infrastructure for distributing the intelligence. The system is built to normalize Web2 and <span>Web3<\/span> indicators so members can integrate the data into security operations. Ripple and Coinbase (Nasdaq: COIN) are among the early companies using the API. The model is intended to move beyond static threat alerts by preserving context, confidence levels, and links between separate signals. That distinction matters when attackers do not begin with a visible exploit. In the Drift incident, malicious actors spent months building trust with contributors before installing harmful software and reaching multisig wallets.<\/p>\n<p>The outcome is a broader test of whether <a href=\"http:\/\/www.bitcoin.com\/get-started\/a-quick-introduction-to-crypto\/\" class=\"lar_link lar_link_outgoing\" target=\"_blank\" rel=\"noopener noreferrer\">crypto<\/a> firms can respond collectively to threats that move across companies. Once one member identifies a suspicious actor, enriched profile data can reach others before the same person or group tries another entry point. Justine Bone, Executive Director of <a href=\"http:\/\/www.bitcoin.com\/get-started\/a-quick-introduction-to-crypto\/\" class=\"lar_link lar_link_outgoing\" target=\"_blank\" rel=\"noopener noreferrer\">Crypto<\/a> ISAC, said:<\/p>\n<blockquote>\n<p>\u201cFor too long, information sharing was seen as optional. Today, it is the <a href=\"http:\/\/www.bitcoin.com\/get-started\/bitcoin-vs-gold\/\" class=\"lar_link lar_link_outgoing\" target=\"_blank\" rel=\"noopener noreferrer\">gold<\/a> standard for security and Ripple\u2019s action through <a href=\"http:\/\/www.bitcoin.com\/get-started\/a-quick-introduction-to-crypto\/\" class=\"lar_link lar_link_outgoing\" target=\"_blank\" rel=\"noopener noreferrer\">Crypto<\/a> ISAC is the definitive proof of concept, showing how to turn shared data into an actionable defense strategy that the entire industry can build upon.\u201d<\/p>\n<\/blockquote>\n<p>Ripple\u2019s contribution positions shared intelligence as a practical defense layer for an industry facing coordinated infiltration attempts.<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.bitcoin.com\/ripple-shares-dprk-threat-data-on-fraud-domains-wallets-campaigns\/\">Source link <\/a><br \/>\n<br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>(Originally posted on : Bitcoin News ) Key Takeaways: Ripple will provide Crypto ISAC members intelligence on DPRK-linked fraud domains, wallets, and campaigns. Security teams can use enriched identity signals to assess applicants, contractors, and vendors. Crypto ISAC\u2019s API will distribute shared data with context, confidence levels, and linked indicators. Ripple Threat Intelligence Expands Crypto [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":72058,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[32],"tags":[],"_links":{"self":[{"href":"https:\/\/crowdfundjunction.com\/blog\/wp-json\/wp\/v2\/posts\/72057"}],"collection":[{"href":"https:\/\/crowdfundjunction.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/crowdfundjunction.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/crowdfundjunction.com\/blog\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/crowdfundjunction.com\/blog\/wp-json\/wp\/v2\/comments?post=72057"}],"version-history":[{"count":0,"href":"https:\/\/crowdfundjunction.com\/blog\/wp-json\/wp\/v2\/posts\/72057\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/crowdfundjunction.com\/blog\/wp-json\/wp\/v2\/media\/72058"}],"wp:attachment":[{"href":"https:\/\/crowdfundjunction.com\/blog\/wp-json\/wp\/v2\/media?parent=72057"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/crowdfundjunction.com\/blog\/wp-json\/wp\/v2\/categories?post=72057"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/crowdfundjunction.com\/blog\/wp-json\/wp\/v2\/tags?post=72057"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}