Ripple has introduced a proactive threat intelligence initiative designed to share actionable indicators of compromise with other cryptocurrency firms.
The effort focuses on North Korean state-linked actors, particularly the Lazarus Group, which has reportedly extracted hundreds of millions of dollars from the sector in early 2026.
The initiative distributes verified wallet addresses, malicious domains, and documented tactics, techniques, and procedures associated with DPRK operations.
Officials state that the objective is to create a coordinated defense framework across the digital asset industry rather than relying on isolated firm-level cybersecurity measures.
Ripple compiles internal threat intelligence derived from its security operations and incident response activities into structured data feeds.
These feeds include indicators of compromise, confirmed North Korean-linked wallet clusters, and behavioral patterns tied to recruitment and infiltration schemes.
Participating firms can integrate the data into existing compliance and monitoring workflows to identify high-risk activity earlier in the transaction lifecycle.
The program contributes to the infrastructure of Crypto_ISAC, a nonprofit information-sharing organization for digital asset companies, which recently launched an updated API for real-time ingestion of fraud-linked data.
Coinbase was the first institution reported to have adopted the updated Crypto_ISAC API, signaling institutional engagement with shared threat intelligence standards.
From a compliance perspective, access to verified wallet indicators enables firms to cross-reference transactions against known DPRK-linked entities before funds are routed through mixers or cross-chain bridges.
This capability may assist companies in meeting Anti-Money Laundering and Office of Foreign Assets Control screening obligations by identifying exposure risks earlier.
Public statements describe the program as targeting the full operational chain of North Korean crypto campaigns, including job application phishing, insider compromise, wallet exfiltration, and laundering strategies.
Industry observers note that fragmented threat intelligence has historically allowed threat actors to reuse techniques across multiple firms with limited resistance.
However, certain operational details remain undisclosed, including the exact delivery architecture of the intelligence feeds and the full list of participating firms beyond Coinbase.
It is also unclear whether the shared data set relies exclusively on proprietary research or incorporates findings from external forensic or blockchain analytics providers.
Available descriptions of program scope and design are based on public disclosures, and independent verification of its technical implementation has not been confirmed.