North Korea's Lazarus Group stole $7.5B in crypto using social engineering, fake jobs, and RPC poisoning. Learn their 5-phase playbook and how to defend your protocol.

It is 2:16 AM in Dubai. A Bybit signer stares at his laptop.
The screen shows a routine transfer. Cold wallet to warm wallet. He has signed dozens of these before. He checks the UI. Everything looks normal. He clicks approve.
Somewhere outside Pyongyang, a room full of people erupts in celebration. They just pulled off the largest financial theft in human history.
$1.5 billion. Gone in a single block confirmation.
And here's the thing most founders still haven't fully reckoned with it wasn't an anomaly. It was the climax of a decade-long playbook. A playbook so polished that, by 2025, a single nation-state was responsible for 59% of all crypto theft on the planet and in April 2026 alone, they struck twice in 17 days for a combined $575 million.
We are not dealing with a cybercrime group. We are dealing with a sovereign nation-state that has decided hacking crypto is a legitimate branch of its economy.
— Ari Redbord, Head of Policy, TRM Labs
Before we go into how, let's sit with how much.

Lifetime cumulative total (as of April 18, 2026): $7.5B+ (includes Drift $285M + KelpDAO $290M, both April 2026)
The United Nations estimates that crypto theft now represents roughly 13% of North Korea's entire GDP. This isn't a side hustle or a rogue operation. It is, by any reasonable definition, a branch of the North Korean state economy and it funds ballistic missiles, centrifuges, and nuclear research directly.
The WSJ found that DPRK hacks fund approximately 50% of North Korea's ballistic missile program.
Every protocol that gets drained isn't just losing TVL. It's contributing to a warhead.
Confirmed or high-confidence attribution by FBI, Chainalysis, TRM Labs, Elliptic, or UN Sanctions Panel.
| # | Target | Date | Amount Stolen | Attack Vector | Status |
|---|---|---|---|---|---|
| 1 | Bithumb (South Korea) | Feb 2017 | ~$7M | Spear-phishing, credential theft | Recovered, rebranded |
| 2 | Yapizon (South Korea) | Apr 2017 | ~$5M | Insider credential compromise | Closed |
| 3 | Youbit (South Korea) | Apr 2017 | ~$73M | Phishing + hot wallet drain | Filed for bankruptcy |
| 4 | Youbit (second attack) | Dec 2017 | ~17% of remaining assets | Repeat intrusion | Forced into bankruptcy |
| 5 | NiceHash (Slovenia) | Dec 2017 | ~$64M (4,736 BTC) | Internal credential compromise | Recovered, repaying users |
| 6 | Coincheck (Japan) | Jan 2018 | ~$530M (NEM) | Hot wallet, spear-phishing | Acquired by Monex Group |
| 7 | Bithumb (2nd attack) | Jun 2018 | ~$30M | Suspected insider threat | Recovered |
| 8 | Bithumb (3rd attack) | Mar 2019 | ~$13M | Hot wallet compromise | Recovered |
| 9 | Kuwait Financial Institution | 2019 | ~$49M | SWIFT-style fraud + crypto | Undisclosed |
| 10 | UpBit (South Korea) | Nov 2019 | ~$50M (ETH) | Hot wallet private key theft | Recovered with reserves |
| 11 | KuCoin (Seychelles) | Sep 2020 | ~$281M | Private key compromise | 84% recovered, survived |
| 12 | Liquid Global (Japan) | Aug 2021 | ~$97M | Hot wallet compromise | Hack by lazarus - Acquired by FTX → double collapse |
| 13 | Poly Network (DeFi) | Aug 2021 | ~$611M | Smart contract exploit | Hacker returned some funds |
| 14 | Ronin Network / Axie | Mar 2022 | ~$625M | LinkedIn job → validator key theft | Bridge rebuilt, Axie weakened |
| 15 | Harmony Horizon Bridge | Jun 2022 | ~$100M | Private key (2-of-5 multisig) | Bridge shut down permanently |
| 16 | Nomad Bridge | Aug 2022 | ~$190M | Smart contract + copycat chaos | Protocol shut down |
| 17 | Atomic Wallet | Jun 2023 | ~$100M | Supply chain / key extraction | Resumed, reputation damaged |
| 18 | Alphapo (payment) | Jul 2023 | ~$60M | Hot wallet private key | Operations disrupted, rebranded |
| 19 | CoinsPaid (Estonia) | Jul 2023 | ~$37.3M | Fake job interview → malware | Survived, published post-mortem |
| 20 | Stake (casino) | Sep 2023 | ~$41M | Private key compromise | Resumed |
| 21 | CoinEx (Hong Kong) | Sep 2023 | ~$54–70M | Hot wallet key theft | Survived |
| 22 | Radiant Capital (DeFi) | Oct 2024 | ~$53M | Malicious PDF via Telegram | Halted, partially resumed |
| 23 | WazirX (India) | Jul 2024 | ~$234.9M | Multi-sig Safe infrastructure | Operations frozen, users locked |
| 24 | Bybit (UAE) | Feb 2025 | ~$1.5B | Safe{Wallet} UI poisoning | Survived with emergency funding |
| 25 | Drift Protocol (Solana) | Apr 1, 2026 | ~$285M | 6-month in-person social engineering + fake collateral | Frozen, under recovery |
| 26 | KelpDAO / rsETH (LayerZero) | Apr 18, 2026 | ~$290M | RPC infrastructure poisoning + DDoS failover (TraderTraitor) | Under investigation, LayerZero DVN restored |
Several smaller exchange hacks from 2018–2020 remain attributed with medium confidence only. The Nomad Bridge hack included significant copycat draining alongside Lazarus-attributed activity. KelpDAO attribution is preliminary as of publication, LayerZero Labs has confirmed likely attributable to the Lazarus Group, more specifically TraderTraitor.
Some protocols got hit and lived. Others didn't. This is the table that should matter most to founders not because of the money, but because of the pattern.
| Protocol | Fatal Hack | Amount Lost | What Happened After |
|---|---|---|---|
| Youbit (South Korea) | Dec 2017 | ~$73M + 17% of assets | Filed for bankruptcy December 2017. First crypto company provably destroyed by Lazarus. |
| Yapizon (South Korea) | Apr 2017 | ~$5M | Closed operations. One of the earliest Lazarus victims to go fully dark. |
| Harmony Horizon Bridge | Jun 2022 | ~$100M | Bridge shut down permanently. ONE token lost 90%+ of peak value. TVL never recovered. |
| Nomad Bridge | Aug 2022 | ~$190M | Protocol shut down. Team disbanded. Nearly all user funds permanently lost. |
| Liquid Global (Japan) | Aug 2021 | ~$97M | Acquired by FTX Feb 2022. When FTX collapsed Nov 2022, Liquid went with it. A double-death. |
Near-fatal but survived:
- WazirX (2024): India's largest exchange had operations frozen for months. As of early 2026, tens of thousands of users are still navigating a restructuring process to recover funds.
- Axie Infinity / Sky Mavis (2022): The Ronin hack didn't kill Sky Mavis, but it ended the mainstream chapter of Axie's growth trajectory. DAU numbers never recovered. The play-to-earn thesis effectively died here.
To understand Lazarus Group, you have to understand where they came from.
They are attached to North Korea's Reconnaissance General Bureau (RGB) the country's primary foreign intelligence apparatus and have been active since at least 2009. Internally, defectors refer to the unit as the 414 Liaison Office. They operate under aliases you may have seen in FBI alerts: APT38, Hidden Cobra, Labyrinth Chollima, Diamond Sleet, TraderTraitor.
Their earliest major financial operation wasn't crypto at all. In 2016, they issued 35 fraudulent SWIFT instructions from the Federal Reserve Bank of New York, attempting to drain $1 billion from Bangladesh Bank's account. A single typo the word fandation instead of foundation flagged one transfer and saved most of the money. But $81 million still vanished into casinos in the Philippines.
The lesson Lazarus learned: traditional finance had chokepoints. Correspondent banks, SWIFT monitors, compliance officers, frozen accounts. Crypto had none of these.
Crypto transactions are irreversible. There are no correspondent banks to freeze funds. The infrastructure is global, permissionless, and often operated by small teams with startup-grade security postures.
For a regime locked out of SWIFT, banned from dollar clearing, and sanctioned from buying almost anything abroad crypto wasn't just a target. It was a lifeline.
The regime responded by treating hacking as a state industry. Recruits come from elite math programs and military academies. They train in Shenyang and Vladivostok. They work shift rotations. They have quotas. By 2022, Lazarus was less a hacking group and more a vertically integrated financial crime apparatus recruiting, targeting, executing, laundering, and exfiltrating on an industrial scale.

Here is what almost everyone gets wrong about Lazarus: they rarely start with a smart contract bug. They start with a human.
The fake recruiter profile is their most refined weapon. LLM-generated work histories. Endorsements from other fabricated accounts. Staged video calls now sometimes using AI-generated faces and voice cloning to defeat liveness checks. One candidate reportedly went through six interview rounds before the malware arrived on round seven.
The bait is always the same: a job offer, a collaboration proposal, or a research opportunity.
In March 2022, a senior engineer at Sky Mavis received a LinkedIn message. The pay was generous. The interviews were thorough. Then came the offer letter a PDF, on his work laptop. That click cost the Ronin Network $625 million.
The GitHub repos used in these operations carry innocuous names: Du-store , BbaudConferenceDV, Store-V. They contain real code. Buried inside is a malicious npm dependency or a VS Code extension hook that executes the moment the victim runs npm install or opens a debug session.
By 2025, the playbook evolved. At the executive level, Lazarus began posing as venture capital firms. Fake partners. Fake pitch meetings. Fake due-diligence questionnaires specifically designed to extract: How is your treasury custodied?
Then, in early 2026, they evolved again.
The Drift Protocol Attack (April 1, 2026) marked the most audacious escalation yet. Lazarus operatives, using non-Korean intermediaries to conduct in-person meetings approached Drift contributors at major industry conferences starting in fall 2025. They posed as a quantitative trading firm. They attended multiple conferences across multiple countries over six months. They were technically fluent, had verifiable professional backgrounds, and deposited over $1 million of real capital into Drift's ecosystem to build credibility.
Then they drained $285 million in 12 minutes.
The operation required zero smart contract exploit. It required six months of relationship building, a fake token with manufactured price history, and pre-signed administrative transactions embedded using Solana's durable nonce feature.
The individuals who appeared in person were not North Korean nationals. DPRK threat actors operating at this level are known to deploy third-party intermediaries to conduct face-to-face relationship-building.
— Drift Protocol Post-Mortem, April 2026
The implication is chilling, you can no longer assume the person you met at DevConnect or Token2049 is who they say they are.
LinkedIn is the front door. But there's a second door, and it's even harder to defend.
North Korea has been placing its own operatives, under fabricated Western identities, into jobs at crypto companies. Researchers call this program Wagemole.
The setup is audacious. Operatives are trained in coding, given American or European names and stolen identities, and assigned laptop farms in the US where paid local residents host the machines. A company in San Francisco thinks it hired a developer in Austin. That developer is routing his traffic through a laptop in someone's garage in New Jersey.
Tayvano, the MetaMask researcher running the most comprehensive public record of Lazarus activity, estimates that over 40 DeFi protocols going back to DeFi Summer 2020 have employed DPRK operatives without knowing it.
The most alarming public case: KnowBe4 a company that trains organizations to defend against social engineering hired a North Korean operative posing as a US software engineer. On day one, before he'd even responded to his welcome Slack messages, he was caught planting malware on his company-issued laptop.
These operatives don't smash-and-grab. They are sleepers.
They ship real code. They attend standups. They earn promotions. The regime reportedly takes 70–90% of their salary as state income generating hundreds of millions per year on its own, completely independent of any hack. But the salary is secondary. The real prize is access.
When the command comes from Pyongyang, the operative may already hold:
Traditional security assumes the attacker is outside the perimeter. Wagemole makes them a full-time employee with a badge, a Slack handle, and a LinkedIn endorsement from your CTO.
Now we return to Bybit.

Bybit used Safe{Wallet} the gold standard of multi-sig solutions in DeFi. The smart contracts were battle-tested, deployed across thousands of protocols. The signers were trained. The process was documented.
None of that mattered.
Weeks before the February 2025 heist, a Safe developer was social-engineered. A malicious coding assignment landed on his personal workstation. That workstation had an authenticated AWS session token for Safe's infrastructure one that bypassed MFA because it was already active.
Lazarus stepped quietly into Safe's backend and deployed a narrowly targeted code change to the Safe UI: a filter that activated only when Bybit's specific wallet addresses were in view. For every other Safe user on Earth, nothing looked different.
For Bybit's signers, the interface showed a routine cold-to-warm wallet transfer.
The actual bytes being signed: a delegatecall to a malicious implementation contract that rewrote the multi-sig's ownership logic handing Lazarus unrestricted control over the entire wallet.
The signers approved. The transaction confirmed. The malicious code self-deleted within two minutes. 401,347 ETH ($1.5 billion) was gone.
The signers may have believed they were signing a legitimate operation while unknowingly authorizing the drain.
— Charles Guillemet, CTO of Ledger
No smart contract exploit. No private key theft in the traditional sense. The Safe contracts executed exactly what they were told. The lie lived entirely in the frontend, for approximately two minutes.
This is why 76% of all service-level crypto compromises in 2025 were attributed to North Korea. They stopped attacking code. They moved upstream to the humans and the tooling.
Stealing $1.5 billion is the hard part. But keeping it is harder.

Within minutes of the Bybit transaction confirming, Chainalysis and TRM Labs were tracking the flow. The FBI attributed the attack publicly within 48 hours. Exchanges worldwide began blacklisting addresses.
Lazarus had minutes not days before the entire industry was hunting the funds.
This is where the true scale of the apparatus becomes visible. What Lazarus has constructed is a global money-laundering pipeline that operates on a roughly 45-day cycle:
Wave 1 (Days 0–5): Layering. Funds are fragmented into transactions under $500,000 a statistical fingerprint that differentiates DPRK flows from other cybercriminals who move in larger chunks. They flow through DeFi pools, mixers, and privacy protocols. After Tornado Cash and Sinbad were sanctioned, flows shifted to Railgun and a rotating cast of short-lived privacy tools. In Bybit's case, 86% of stolen ETH was converted to Bitcoin within one month, scattered across 12,000+ addresses.
Wave 2 (Days 6–10): Cross-chain movement. ETH swaps to BTC for UTXO opacity. Funds bridge to Tron, where USDT offers the deepest global liquidity. Cross-chain bridges obscure origin.
Wave 3 (Days 20–45): Off-ramp. This is where laundering goes invisible to on-chain analysts. Flows route through Chinese-language OTC brokers in Shenzhen, Macau, and Hong Kong. The marketplace of choice: Cambodia's Huione Group, which the US Treasury's FinCEN designated a primary money laundering concern in May 2025 after determining it processed at least $4 billion in illicit crypto since 2021 (Elliptic puts the real figure closer to $11 billion). Huione even launched its own stablecoin USDH explicitly marketed as unfreezable.
By day 45, the money that started as ETH is fiat cash in Pyongyang, allocated to weapons programs.
The UN, FBI, and US Treasury have independently confirmed: the proceeds of these hacks directly fund North Korea's nuclear and ballistic missile programs.
Seventeen days after draining Drift, Lazarus struck again.

On April 18, 2026, KelpDAO's rsETH was exploited for approximately $290 million the second nine-figure theft in under three weeks, both attributed to the same TraderTraitor sub-unit of Lazarus Group.
The attack vector was something the industry had not seen at this scale before: targeted RPC infrastructure poisoning combined with DDoS-forced failover.
Here is precisely what happened, from LayerZero's post-mortem:
KelpDAO's rsETH used a 1-of-1 DVN configuration on LayerZero meaning a single Decentralized Verifier Network (LayerZero Labs' own DVN) was the sole verifier of all cross-chain messages. LayerZero had explicitly recommended multi-DVN setups and communicated best practices to KelpDAO. KelpDAO chose to remain on a single-point-of-failure setup.
That single DVN relied on a pool of RPC nodes to verify transaction legitimacy. Lazarus:
op-geth binaries for malicious onesThe net result: the LayerZero protocol itself was never exploited. The DVN smart contracts were never exploited. The private keys were never compromised. The attack lived entirely in the off-chain verification layer the infrastructure that the protocol trusted to tell it the truth about what was happening on-chain.
This is a category-expanding development. Every bridge, every oracle, every cross-chain protocol, and every DeFi integration that relies on off-chain RPC infrastructure to verify on-chain state is now operating in a world where that infrastructure itself can be precision-targeted, poisoned, and made to silently lie while appearing completely normal to all external observers.
What makes this different from previous attacks:
| Bybit / Safe UI Poisoning | KelpDAO RPC Poisoning |
|---|---|
| Poisoned the frontend seen by human signers | Poisoned the backend seen by automated verifiers |
| Required a compromised developer's session | Required compromising infrastructure nodes directly |
| Lie lasted ~2 minutes in the UI | Lie self-destructed and erased its own evidence |
| Detected by analytics within hours | Monitoring saw nothing anomalous |
| Single protocol targeted | Any 1/1-DVN protocol on LayerZero was a candidate |
The KelpDAO hack is also the clearest illustration yet of how configuration security not code security determines survival. The LayerZero protocol performed exactly as designed. The DVN performed as designed. No smart contract had a bug. KelpDAO was drained because they maintained a single verifier, ignored best-practice recommendations, and gave Lazarus exactly the single point of failure they needed.
Zero contagion reached any other LayerZero application. Every protocol with a multi-DVN setup was untouched. The modular architecture did its job but only for the protocols that used it correctly.
The lesson is not that LayerZero failed. The lesson is that the attack surface has expanded one more layer deeper and the next version of this attack may target a multi-DVN setup by compromising nodes across multiple providers simultaneously.
Here is the part most blog posts skip.

| Your Protocol | Lazarus Group |
|---|---|
| 10–50 person team | 1,700+ operatives (est. US Army report) |
| Startup security budget | State-funded, military-grade tradecraft |
| Moves fast, ships fast | Moves patiently 6-month infiltrations |
| Assumes attacker is external | Has operatives already inside |
| Defends at the contract layer | Attacks at the human and tooling layer |
| Transparent, public treasury | Anonymous, state-protected, zero prosecution risk |
| One failed audit = reputational damage | One failed op = reassignment, try again |
This is not a fair fight. But it can be made fairer.
The crypto industry has spent hundreds of millions of dollars on smart contract audits, formal verification, fuzzing, and invariant testing. These are the things Lazarus barely attacks.
Far less investment has gone into operational security, contributor vetting, device hygiene, hardware-isolated signing, supply chain audits, and timelocked governance. These are the things Lazarus always exploits.
The mismatch is the vulnerability.
Lazarus has developed recognizable signatures across every phase. If your team encounters any of these patterns, treat them as active threat indicators not coincidences.

On LinkedIn / Telegram / Discord:
npm install step that installs a dependency you've never heard ofIn hiring:
In operations:
At conferences:
Any single signal isn't necessarily a threat. Multiple signals from the same source absolutely are.
If you're building anything with meaningful on-chain value, the minimum viable security posture has fundamentally changed. Here is what it looks like layer by layer.
1. Assume your engineers are targets. The moment a developer's GitHub handle is tied to a protocol holding meaningful TVL, they are on Lazarus's list. Every contributor with production access should be trained to recognize fake job offers, malicious repos, and VC outreach as routine adversarial pressure, not rare events.
2. Verify what you sign not what you see. The Bybit hack proved that pristine smart contracts mean nothing if the signing UI can be silently rewritten. Signers must verify transaction calldata on a hardware device with its own independent screen. Never trust a browser alone for a high-value approval. EIP-712 structured signing, clear-signing wallets, and raw calldata verifiers are no longer optional.
3. Audit the supply chain, not just the contracts. Your multi-sig library. Your frontend bundler. Your RPC provider. Your npm dependencies. Your wallet infrastructure. Each of these surfaces has been exploited by Lazarus at least once. A smart contract audit that ignores the off-chain surface is auditing a building with the doors unlocked.
4. Timelock the big moves. A 24-hour timelock on large treasury withdrawals would have made the Bybit heist impossible. By the time the delay elapsed, analytics firms would have flagged the flow. Timelocks turn speed-based attacks into detection problems. They are cheap. They are effective. There is no excuse for a protocol holding hundreds of millions in TVL not having them.
5. Treat contributor identity like you treat private keys. Video verification. Reference cross-checking. Background checks that go deeper than LinkedIn. The Security Alliance (SEAL) maintains a growing list of known DPRK IT worker profiles. Use it. For any role touching keys or code, identity verification is a security control not an HR formality.
6. Conference hygiene is now a security topic. After Drift, the bar has moved. If someone approaches your team at a conference, expresses deep interest in your protocol, proposes integration, and is suspiciously fluent in your architecture treat that with the same skepticism you'd apply to a cold phishing email. Lazarus now deploys non-Korean intermediaries to conduct in-person meetings. The person you met at ETHDenver may have been paid to build trust with you.
7. Configuration security is as important as code security. The KelpDAO hack had zero smart contract exploits, zero key compromises, zero protocol bugs. It was enabled entirely by a single configuration choice: a 1-of-1 DVN setup that LayerZero had explicitly warned against. Review every integration your protocol depends on for single points of failure bridges, oracles, DVNs, RPC providers, price feeds. A multi-DVN, multi-RPC, multi-oracle setup is not paranoia. It is the minimum viable posture.
8. Your off-chain verification infrastructure needs the same threat model as your contracts. The KelpDAO attack did not touch a single line of smart contract code. It poisoned the off-chain nodes that the verifier trusted to tell it what was true. Every bridge verifier, oracle network, and cross-chain protocol that relies on RPC nodes to confirm on-chain state should now ask: what happens if two of those nodes are compromised and DDoS forces failover to them? The answer should not be "$290M drained."
9. Cost of each layer before vs. after an incident:
| Security Layer | Cost Before | Cost After Breach |
|---|---|---|
| Smart contract audit | $20–200K | N/A (post-facto) |
| Hardware signing setup | $500–5K | $500M–$1.5B lost |
| Supply chain audit | $10–50K | Full TVL at risk |
| 24hr timelock | 0 (code change) | Bybit-scale loss |
| Contributor vetting process | $0–10K | Insider access to keys |
| Multi-DVN / multi-RPC setup | $0 (config change) | KelpDAO-scale loss |
| Phishing training | $5–20K/yr | Everything |
Each layer is cheap to build before an incident. Each is brutally expensive to retrofit after one.
So far this blog has been about the offense. Here is the defense.
In late 2024, the Ethereum Foundation with Secureum, The Red Guild, and SEAL launched the ETH Rangers Program: six months of stipends for independent researchers doing public goods security work across Ethereum. 17 recipients. Results that matter directly to the Lazarus threat.
The headline number: ~100 DPRK IT workers identified across 53 Web3 projects. Not hypothetical. Real operatives, inside real protocols, with real access, waiting on a command from Pyongyang. Alongside that: 785+ vulnerabilities reported, $5.8M recovered from active exploits, 36+ incident responses handled, and 209,000+ people reached with threat awareness content.
Three projects every founder should know about:
The Ketman Project built the industry standard for detecting and expelling DPRK IT workers. They open-sourced gh-fake-analyzer a GitHub profile analysis tool on PyPI that flags suspicious contributor patterns and co-authored the DPRK IT Workers Framework with SEAL. If you've hired remotely in the last two years and haven't run your contributors through this framework, your threat model is incomplete.
Nick Bax contributed to 36+ SEAL 911 incident responses, helped notify 30+ teams employing DPRK workers, and created a Fake VC warning video that hit with multiple executives crediting it for preventing them from being hacked. That's the exact fake VC attack vector from Phase 1 of this blog.
DeFiHackLabs built an Incident Explorer covering 620+ proof-of-concept exploits with root cause analysis the closest thing the industry has to a complete map of how every major DeFi attack actually executed. The client DoS research team also found 14 bugs across all five major Ethereum execution clients, the same class of infrastructure weakness Lazarus exploited to force failover in the KelpDAO attack.
Securing a decentralized network requires a decentralized defense.
— ETH Rangers Program Report, 2025
Your internal security team cannot track 100 DPRK operatives across 53 organizations. The Ketman Project can. Use what exists: gh-fake-analyzer on your contributors, the DPRK IT Workers Framework before your next hire, and SEAL 911 (@seal_911_bot on Telegram) as your first call after an incident.
The playbook is public. The attack patterns are documented. The tools to defend against them exist. And yet Lazarus just had their best decade on record. The Bybit signer did everything right. The screen lied. The Drift contributors met their attackers in person. KelpDAO's verifier confirmed a transaction that never happened. In each case, the lie was built weeks or months before anyone noticed. Lazarus is already in your next conversation on LinkedIn, at your next conference, inside a pull request. The only question is whether your perimeter is deep enough to catch it.
Contents


From day-zero risk mapping to exchange-ready audits — QuillAudits helps projects grow with confidence. Smart contracts, dApps, infrastructure, compliance — secured end-to-end.