Drift says $270 million exploit was a six-month North Korean intelligence operation

4 hours ago

Attackers posed arsenic a trading firm, met Drift contributors successful idiosyncratic crossed aggregate countries, deposited $1 cardinal of their ain capital, and waited fractional a twelvemonth earlier executing the drain CoinDesk elaborate earlier this week.

Apr 5, 2026, 12:17 p.m.

A six-month quality cognition preceded the $270 cardinal exploit of Drift Protocol and was carried retired by a North Korean state-affiliated group, according to a detailed incidental update published by the squad earlier connected Sunday.

The attackers archetypal made interaction astir autumn 2025 astatine a large crypto conference, presenting themselves arsenic a quantitative trading steadfast looking to integrate with Drift.

They were technically fluent, had verifiable nonrecreational backgrounds, and understood however the protocol operated, Drift said. A Telegram radical was established and what followed were months of substantive conversations astir trading strategies and vault integrations, interactions that are modular for however trading firms onboard with DeFi protocols.

Between December 2025 and January 2026, the radical onboarded an Ecosystem Vault connected Drift, held aggregate moving sessions with contributors, deposited implicit $1 cardinal of their ain capital, and built a functioning operational beingness wrong the ecosystem.

Drift contributors met individuals from the radical look to look astatine aggregate large manufacture conferences crossed respective countries done February and March. By the clip the onslaught launched connected April 1, the narration was astir fractional a twelvemonth old.

The compromise appears to person travel done 2 vectors.

A 2nd downloaded a TestFlight application, Apple's level for distributing pre-release apps that bypasses App Store information review, which the radical presented arsenic their wallet product.

For the repository vector, Drift pointed to a known vulnerability successful VSCode and Cursor, 2 of the astir wide utilized codification editors successful bundle development, that the information assemblage had been flagging since precocious 2025, wherever simply opening a record oregon folder successful the exertion was capable to silently execute arbitrary codification with nary punctual oregon informing of immoderate kind.

Once devices were compromised, the attackers had what they needed to get the 2 multisig approvals that enabled the durable nonce onslaught CoinDesk elaborate earlier this week. Those pre-signed transactions sat dormant for much than a week earlier being executed connected April 1, draining $270 cardinal from the protocol's vaults successful nether a minute.

The attribution points to UNC4736, a North Korean state-affiliated radical besides tracked arsenic AppleJeus oregon Citrine Sleet, based connected some on-chain money flows tracing backmost to the Radiant Capital attackers and operational overlap with known DPRK-linked personas.

The individuals who appeared successful idiosyncratic astatine conferences were not North Korean nationals, however. DPRK menace actors astatine this level are known to deploy third-party intermediaries with afloat constructed identities, employment histories, and nonrecreational networks built to withstand owed diligence.

Drift urged different protocols to audit entree controls and dainty each instrumentality touching a multisig arsenic a imaginable target. The broader accusation is uncomfortable for an manufacture that relies connected multisig governance arsenic its superior information model.

But if attackers are consenting to walk six months and a cardinal dollars gathering a morganatic beingness wrong an ecosystem, conscionable teams successful person, lend existent capital, and wait, the question is what information exemplary is designed to drawback that.

View source