Monday, April 6, 2026

Drift $280M crypto theft linked to 6-month in-person operation


The Drift Protocol says that the $280+ million hack it suffered final week was the results of a long-term, rigorously deliberate operation that included constructing “a functioning operational presence contained in the Drift ecosystem.”

On April 1st, the Solana-based buying and selling platform detected uncommon exercise that was adopted by affirmation that funds had been misplaced in a complicated assault that allowed hijacking of the Safety Council administrative powers.

Blockchain intelligence companies Elliptic and TRM Labs attributed the heist to North Korean hackers, who took about 12 minutes to empty consumer property.

The investigation revealed that the hackers had been getting ready the assault for not less than six months, posing as a quantitative agency and approaching Drift contributors in particular person at a number of crypto conferences.

“It’s now understood that this seems to be a focused strategy, the place people from this group continued to intentionally search out and have interaction particular Drift contributors, in particular person, at a number of main business conferences in a number of nations over the next six months,” Drift Protocol says.

The risk actor continued to speak with their targets by way of Telegram, discussing buying and selling methods and potential vault integrations. They had been technically proficient and demonstrated familiarity with how Drift labored, with interactions resembling typical onboarding exchanges between buying and selling companies and the platform.

In keeping with Drift, the Telegram goup used for participating contributors was deleted instantly after the theft occurred.

The platform has not decided with certainty the assault vector, however believes that two contributors had been compromised within the following methods:

  • A malicious code repository shared with a contributor, probably exploiting a VSCode/Cursor vulnerability that allowed silent code execution
  • A malicious TestFlight software offered as a pockets product

A number of indicators present in Elliptic and TRM Labs investigations level to a North Korean risk actor. Drift’s findings additionally point out with medium-high confidence that the assault was perpetrated by UNC4736 (a.okay.a. AppleJeus and Labyrinth Chollima), a risk actor linked to North Korea by a number of safety firms.

Incident response firm Mandiant has beforehand related UNC4736 with Lazarus. The identical risk group is accountable for the 3CX supply-chain assault in 2023, the $50 million Radiant cryptocurrency theft in 2024, and it has additionally been linked to Chrome zero-day exploitation.

Nevertheless, it’s famous that the in-person actors who met with key Drift contributors at conferences had been non-Korean intermediaries.

At present, all Drift Protocol features stay frozen, and the compromised wallets have been faraway from the multisig course of.

Drift says that the attackers’ wallets have been flagged throughout exchanges and bridge operators to stop the risk actor from shifting or withdrawing the funds.

Automated pentesting proves the trail exists. BAS proves whether or not your controls cease it. Most groups run one with out the opposite.

This whitepaper maps six validation surfaces, reveals the place protection ends, and offers practitioners with three diagnostic questions for any software analysis.

Related Articles

Latest Articles