Loading...
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

North Korean Hackers Drained $285 Million from Drift Protocol After a Six-Month Infiltration

Drift Protocol logo centered over a broken blockchain chain with red highlights on a dark purple background

On April 1, 2026, attackers drained approximately $285 million in user assets from Drift Protocol, the largest decentralized perpetual futures exchange on the Solana blockchain. The actual vault drain took roughly 10 seconds. Drift confirmed the attack the following day, noting it was not an April Fools joke. The SEAL 911 security team attributed the operation with medium-high confidence to UNC4736, a North Korean state-affiliated group also tracked as AppleJeus and Citrine Sleet.

Six Months of Groundwork

The operation began in the fall of 2025, when individuals presenting as a quantitative trading firm approached Drift contributors at a major crypto industry conference and expressed interest in integrating with the protocol. A Telegram group was established at that first meeting. Over the following months, the same individuals met Drift contributors face to face at multiple industry events across several countries, building what appeared to be a legitimate long-term business relationship.

Between December 2025 and January 2026, the group onboarded an Ecosystem Vault on Drift, filled out the standard strategy form, participated in multiple working sessions with contributors, and deposited more than $1 million of their own capital to establish credibility. Interactions continued through February and March 2026. The individuals who appeared in person were not North Korean nationals. DPRK operations at this level routinely use third-party intermediaries carrying fully constructed professional identities, employment histories, and social networks built to withstand scrutiny.

The Infection Vectors

The technical compromise appears to have proceeded through 2 vectors. One contributor was persuaded to download a TestFlight application, Apple’s platform for distributing pre-release software that bypasses App Store review, presented as a wallet product the group was developing. A second contributor cloned a malicious code repository presented as a website-building tool for the group’s vault. That repository exploited a known vulnerability in VS Code and Cursor, widely flagged by security researchers between December 2025 and February 2026, in which simply opening a file or folder silently executes arbitrary code with no user prompt. Through these compromises, the attackers obtained the device access needed to gather multisig approvals.

The Attack: Fake Token, Hijacked Governance

On-chain staging began March 11 with a 10 ETH withdrawal from Tornado Cash. The attackers then manufactured an entirely fictitious asset, CarbonVote Token (CVT), minting 750 million units and seeding a few thousand dollars in liquidity while wash trading the price to near $1. Drift’s oracles subsequently treated CVT as legitimate collateral worth hundreds of millions of dollars. The CVT deployment was timed to approximately 9:30 AM Pyongyang time.

On March 27, Drift migrated its Security Council to a new 2-of-5 multisig configuration with zero timelock, eliminating the detection window that would have allowed intervention. Using the device access they had already obtained, attackers socially engineered 2 of the 5 required signers into pre-approving transactions that appeared routine but carried hidden authorizations for critical admin actions. Those approvals were held dormant using durable nonces, a legitimate Solana feature that allows transactions to be pre-signed and executed at a later date without expiring.

On April 1, 2 transactions fired 4 slots apart, seizing Security Council administrative powers. The attackers then introduced CVT as collateral and removed all preset withdrawal limits, draining the vaults through 31 rapid withdrawals in approximately 10 seconds. Stolen assets were consolidated into USDC and SOL and bridged to Ethereum via Circle’s Cross-Chain Transfer Protocol. On-chain investigator ZachXBT publicly criticized Circle for failing to freeze the stolen USDC despite the funds crossing during U.S. business hours.

Scale and Attribution

At $285 million, the Drift exploit is the largest DeFi hack of 2026 and the second-largest in Solana’s history, behind only the $326 million Wormhole bridge hack in 2022. Drift’s total value locked collapsed from roughly $550 million to under $250 million. The DRIFT token dropped more than 40% following the attack.

TRM Labs and Elliptic independently assessed the attack as consistent with DPRK tradecraft, citing on-chain staging patterns, laundering methodology, and cross-chain fund flow indicators. Full analyses are available from TRM Labs and Elliptic. SEAL 911, with support from Mandiant, attributed the operation to UNC4736 with medium-high confidence, based on fund flows linking the attack to wallets associated with the October 2024 Radiant Capital hack and operational overlap with known DPRK-linked personas. UNC4736 is the same group behind the $53 million Radiant Capital hack and the X_TRADER/3CX supply chain compromise in 2023. If confirmed, this would represent the eighteenth DPRK-linked crypto theft tracked by Elliptic in 2026, with over $300 million stolen by North Korean actors so far this year.

The Drift attack did not unfold in isolation. It landed on the same day that multiple security vendors attributed a separate supply chain compromise of the Axios npm library to a North Korean hacking group, suggesting a coordinated two-front operation targeting both the DeFi finance layer and the broader software development ecosystem simultaneously.

Drift has frozen all protocol functions, removed the compromised wallet from the multisig, and is coordinating with security firms, exchanges, bridges, and law enforcement to trace and recover stolen assets.

Picture of m00s3c

m00s3c

Moose (@m00s3c) is the author of BreachNews, focusing on data breach intelligence, dark web monitoring, and threat analysis. His work involves analyzing breach claims, reviewing leaked datasets, and tracking threat actor activity to provide clear, factual reporting.

Share this:

Related Posts

Newsletter signup

Get the latest data breach and security news.

Please wait...

Thank you for signing up!

Search & Monitoring Tools

Free Data Breach Search Tool

Check your email against 12 billion+ leaked records — then set up alerts so you're the first to know if you appear in a new breach.

Instant breach lookup
Real-time monitoring & alerts
12 billion+ leaked records
Check now Set up monitoring

Powered by BreachNews