Skip to content
Est. MMXXVIVol. VI · № 273RSS
Blockchain Breaches

An archive of cryptocurrency security incidents — hacks, exploits, bridge failures and rug pulls, documented with on-chain evidence.

Dossier № 212Phishing / Social Engineering

Tapioca DAO Discord Social Engineering

Tapioca DAO lost $4.65M after a Discord member was social-engineered into connecting a hardware wallet; attacker seized TAP/USDO ownership. $2.7M recovered.

Date
Chain(s)
Status
Partially Recovered
Attribution
Suspected Lazarus Group (DPRK)

On October 18, 2024, the LayerZero-native protocol Tapioca DAO lost approximately $4.65 million (605 ETH + 3.1M USDC) after a social-engineering attack on a core contributor. The attackers — whose TTPs strongly suggested Lazarus Group — tricked a Discord member into connecting a hardware wallet under a pretext, then used the access to compromise both the TAP token contract ownership and the USDO stablecoin contract. The team subsequently counter-exploited the attacker's address to recover $2.7M before it could be laundered.

What happened

The attack vector started in Discord. A Tapioca DAO contributor was contacted in private message about a "friend being hired" — pretext storytelling designed to lower his guard. The exchange escalated to a request to connect his hardware wallet for what appeared to be a legitimate onboarding flow.

Once the hardware wallet was connected — and crucially, once the contributor signed a transaction he believed was routine — the attacker obtained the contributor's wallet authority over critical Tapioca contracts.

With this access, the attacker:

  1. Compromised the TAP token vesting contract's ownership, granting themselves the ability to claim and sell 30 million vested TAP tokens that should have been locked.
  2. Compromised the USDO stablecoin contract, adding themselves as a minter with unrestricted access to mint USDO.
  3. Drained the USDO/USDC liquidity pool by minting fake USDO and trading it for the pool's USDC reserves.
  4. Sold the 30M vested TAP through DEX liquidity, crashing the TAP token price approximately 96%.

Total extracted: ~$4.65M in ETH and USDC, plus the dilutive impact of the TAP sales on holders.

Counter-exploit and aftermath

In an unusual response, the Tapioca security team identified an exploitable condition in the attacker's own wallet — likely a gap in how the attacker had structured the laundering path — and executed a counter-exploit that recovered 996 ETH (~$2.7M) from the attacker's address before it could be moved to mixers.

The remaining ~$2M was successfully laundered through standard Lazarus routes (Tornado Cash, cross-chain bridges, conversion to BTC).

Tapioca published a detailed post-mortem covering the attack chain and the recovery operation, and rotated all administrative keys to a new multi-sig with hardware-wallet-only signing and additional out-of-band verification.

Why it matters

The Tapioca incident is a clean case study for how Lazarus-style social engineering can compromise an entire protocol through a single team-member endpoint. The attack chain illustrates:

  1. Discord is an attack surface for protocol teams just as much as it is for retail users. Direct-message phishing of contributors is a Lazarus standard play, and the small-team / always-on culture of crypto protocols makes contributors particularly vulnerable to "we're hiring your friend" pretexts.

  2. Hardware-wallet signing alone does not eliminate social-engineering risk — it raises the bar but doesn't eliminate it. The attack worked because the contributor signed a transaction he thought was legitimate. The hardware wallet protected against key theft but not against authorised-by-the-victim malicious transactions.

  3. Counter-exploits work occasionally and are increasingly part of the defensive playbook for sophisticated protocol teams. The $2.7M Tapioca recovery is one of a small number of cases where on-chain offensive capability has been used productively in incident response.

The pattern — Lazarus social engineering → individual key compromise → broad protocol authority — is essentially identical to what played out at Radiant Capital earlier in 2024 and at much larger scale at Bybit in 2025. The recurring lesson: multi-sig with strict role separation and out-of-band verification of any privileged operation is no longer optional for protocols of any meaningful scale.

Sources & on-chain evidence

  1. [01]halborn.comhttps://www.halborn.com/blog/post/explained-the-tapioca-dao-hack-october-2024
  2. [02]dlnews.comhttps://www.dlnews.com/articles/defi/tapioca-dao-hacks-its-hacker-after-north-korean-attack/
  3. [03]mirror.xyzhttps://mirror.xyz/tapiocada0.eth/RVcRuKmJAavD05ObYsyYOHLDJ4gkEZKwyY_Y0Gx6gNc

Related filings