Tapioca DAO Discord Social Engineering
Tapioca DAO lost $4.65M after a Discord member was social-engineered into connecting a hardware wallet; attacker seized TAP/USDO ownership. $2.7M recovered.
- Date
- Victim
- Tapioca DAO
- Chain(s)
- Status
- Partially Recovered
- Attribution
- Suspected Lazarus Group (DPRK)
On October 18, 2024, the LayerZero-native protocol Tapioca DAO lost approximately $4.65 million (605 ETH + 3.1M USDC) after a social-engineering attack on a core contributor. The attackers — whose TTPs strongly suggested Lazarus Group — tricked a Discord member into connecting a hardware wallet under a pretext, then used the access to compromise both the TAP token contract ownership and the USDO stablecoin contract. The team subsequently counter-exploited the attacker's address to recover $2.7M before it could be laundered.
What happened
The attack vector started in Discord. A Tapioca DAO contributor was contacted in private message about a "friend being hired" — pretext storytelling designed to lower his guard. The exchange escalated to a request to connect his hardware wallet for what appeared to be a legitimate onboarding flow.
Once the hardware wallet was connected — and crucially, once the contributor signed a transaction he believed was routine — the attacker obtained the contributor's wallet authority over critical Tapioca contracts.
With this access, the attacker:
- Compromised the TAP token vesting contract's ownership, granting themselves the ability to claim and sell 30 million vested TAP tokens that should have been locked.
- Compromised the USDO stablecoin contract, adding themselves as a minter with unrestricted access to mint USDO.
- Drained the USDO/USDC liquidity pool by minting fake USDO and trading it for the pool's USDC reserves.
- Sold the 30M vested TAP through DEX liquidity, crashing the TAP token price approximately 96%.
Total extracted: ~$4.65M in ETH and USDC, plus the dilutive impact of the TAP sales on holders.
Counter-exploit and aftermath
In an unusual response, the Tapioca security team identified an exploitable condition in the attacker's own wallet — likely a gap in how the attacker had structured the laundering path — and executed a counter-exploit that recovered 996 ETH (~$2.7M) from the attacker's address before it could be moved to mixers.
The remaining ~$2M was successfully laundered through standard Lazarus routes (Tornado Cash, cross-chain bridges, conversion to BTC).
Tapioca published a detailed post-mortem covering the attack chain and the recovery operation, and rotated all administrative keys to a new multi-sig with hardware-wallet-only signing and additional out-of-band verification.
Why it matters
The Tapioca incident is a clean case study for how Lazarus-style social engineering can compromise an entire protocol through a single team-member endpoint. The attack chain illustrates:
-
Discord is an attack surface for protocol teams just as much as it is for retail users. Direct-message phishing of contributors is a Lazarus standard play, and the small-team / always-on culture of crypto protocols makes contributors particularly vulnerable to "we're hiring your friend" pretexts.
-
Hardware-wallet signing alone does not eliminate social-engineering risk — it raises the bar but doesn't eliminate it. The attack worked because the contributor signed a transaction he thought was legitimate. The hardware wallet protected against key theft but not against authorised-by-the-victim malicious transactions.
-
Counter-exploits work occasionally and are increasingly part of the defensive playbook for sophisticated protocol teams. The $2.7M Tapioca recovery is one of a small number of cases where on-chain offensive capability has been used productively in incident response.
The pattern — Lazarus social engineering → individual key compromise → broad protocol authority — is essentially identical to what played out at Radiant Capital earlier in 2024 and at much larger scale at Bybit in 2025. The recurring lesson: multi-sig with strict role separation and out-of-band verification of any privileged operation is no longer optional for protocols of any meaningful scale.
Sources & on-chain evidence
- [01]halborn.comhttps://www.halborn.com/blog/post/explained-the-tapioca-dao-hack-october-2024
- [02]dlnews.comhttps://www.dlnews.com/articles/defi/tapioca-dao-hacks-its-hacker-after-north-korean-attack/
- [03]mirror.xyzhttps://mirror.xyz/tapiocada0.eth/RVcRuKmJAavD05ObYsyYOHLDJ4gkEZKwyY_Y0Gx6gNc