Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

522+ Articles
116+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Drift Crypto Platform Confirms $280 Million Stolen as Researchers Point to North Korea
Drift Crypto Platform Confirms $280 Million Stolen as Researchers Point to North Korea
NEWS

Drift Crypto Platform Confirms $280 Million Stolen as Researchers Point to North Korea

Drift Protocol has confirmed that $280 million was stolen in a sophisticated hack after malicious actors executed a novel attack that achieved the rapid takeover of the company's Security Council administrative powers, with security researchers attributing the incident to North Korean state-sponsored threat actors.

Dylan H.

News Desk

April 2, 2026
5 min read

Drift Protocol has published a post-mortem confirming that $280 million was stolen from its platform in a sophisticated cyberattack, with independent security researchers pointing to North Korean state-sponsored threat actors — likely the Lazarus Group — as responsible for the operation.

The platform's post-mortem, released Wednesday night, revealed that malicious actors gained access to Drift systems through a "novel attack" that involved the "rapid takeover" of the company's Security Council administrative powers, enabling them to drain the treasury before an effective response could be mounted.

Official Post-Mortem Summary

The Drift team confirmed the following sequence of events in their post-mortem:

DetailValue
PlatformDrift Protocol (Solana-based DeFi)
Amount Stolen$280 million
Attack ClassificationNovel attack — Security Council takeover
Attack MethodRapid administrative privilege acquisition
ChainSolana
DetectionPost-compromise, during treasury drain
North Korean AttributionSecurity researcher consensus

The platform described the attack as premeditated and sophisticated, noting that the speed of the Security Council takeover and the subsequent treasury drain indicated significant advance planning.

The North Korea Connection

Independent security researchers and blockchain analysts have attributed the attack to North Korean threat actors, consistent with the Lazarus Group's longstanding pattern of targeting DeFi protocols, crypto exchanges, and blockchain infrastructure for state-level fund generation.

North Korea's cryptocurrency theft operations have generated an estimated $1.3 billion in 2025 alone according to Chainalysis, funding the regime's weapons and missile development programs. The scale and technique of the Drift attack aligns with documented Lazarus Group tradecraft.

Lazarus Group DeFi Attack Pattern

Recon Phase:
— Map high-TVL DeFi protocol architecture
— Identify security council / multisig structure and members
— Profile signer key management practices (hardware wallets, hot wallets)
 
Pre-Attack Phase:
— Targeted spear-phishing of Security Council members
— Malware deployment targeting key management infrastructure
— Patience — attackers may wait weeks before executing
 
Execution:
— Simultaneously compromise enough Security Council signers
  to achieve multisig signing threshold
— Execute rapid administrative transactions
— Drain treasury before monitoring detects the anomaly
 
Laundering:
— Bridge stolen assets across chains (Solana → ETH → BTC)
— Pass through mixers and privacy protocols
— Exchange into fiat via OTC desks in permissive jurisdictions

Why the Security Council Was the Target

Drift Protocol's Security Council is designed as an emergency administrative layer — a multisig wallet with elevated powers to respond to bugs, exploits, or other protocol emergencies. These powers include the ability to pause contracts, adjust risk parameters, and move funds to safe custody.

This design creates an inherent tension: the most powerful protection mechanism is also the highest-value attack target. Compromising the Security Council gives attackers the same administrative privileges that emergency responders would use — including direct access to treasury funds.

Security Council Design GoalAttack Consequence
Emergency fund custodyDirect path to treasury drain
Rapid parameter overrideAbility to disable circuit breakers
Low signing threshold for speedFewer keys needed to meet threshold
Broad protocol controlMaximum damage potential

Scale in Context

$280 million places the Drift incident among the most significant DeFi exploits on record:

ProtocolYearMethodAmount
Ronin Network2022Validator key compromise~$625M
Poly Network2021Smart contract exploit~$611M
Drift Protocol2026Security Council takeover~$280M
Wormhole2022Smart contract exploit~$320M
Euler Finance2023Flash loan exploit~$197M
KuCoin2020Hot wallet compromise~$281M

Drift's Response

Following discovery of the attack, Drift Protocol has:

  • Suspended all platform operations pending full security review
  • Engaged leading blockchain forensics firms to trace stolen funds on-chain
  • Notified centralised exchanges to flag and potentially freeze addresses associated with stolen assets
  • Engaged law enforcement and chain analytics providers (Chainalysis, TRM Labs)
  • Published a transparency post-mortem with known details of the attack

The likelihood of recovering the stolen funds remains low, given Lazarus Group's well-documented ability to launder large DeFi thefts through cross-chain bridges, mixers, and OTC channels. However, the on-chain traceability of Solana transactions provides investigative opportunity.

Lessons for DeFi Security Architecture

The Drift incident reinforces several key lessons for protocol security design:

Time-Lock All High-Value Transactions

Even a 24–48 hour time-lock on Security Council treasury movements would provide a detection and community response window. The speed of the Drift drain — before any circuit-breaker could activate — is consistent with a protocol that lacked mandatory delays on administrative fund movements.

Threshold Design Matters

Multisig threshold directly determines how many keys an attacker must compromise. A 3-of-5 is significantly easier to attack than a 7-of-11. High-TVL protocols should evaluate their threshold against realistic threat models including Lazarus-grade nation-state adversaries.

Signer Key Hygiene

Security Council signers should treat their signing keys with the same discipline as nuclear material:

  • Air-gapped signing environments for large transactions
  • Hardware security modules (HSMs) for key storage
  • Regular rotation and audit of authorised signer addresses
  • Dedicated, hardened devices — never shared with general developer workstations

What Drift Users Should Do

  • Withdraw any remaining funds from the Drift Protocol immediately
  • Do not interact with the platform until the Drift team provides a clear all-clear
  • Monitor official Drift communications for updates on any potential user compensation
  • Document losses for legal claims or any future recovery proceedings

Sources: The Record — April 2, 2026

#North Korea#DeFi#Crypto Heist#Drift Protocol#Solana#Lazarus Group#Governance Attack#The Record

Related Articles

Drift Loses $280 Million as Hackers Seize Security Council Powers

The Drift Protocol DeFi platform lost at least $280 million after a sophisticated threat actor executed a planned governance attack, seizing control of the protocol's Security Council multisig to drain the treasury in one of the largest DeFi exploits of 2026.

6 min read

Crypto Platform Drift Suspends Services After Hundreds of Millions Stolen

Decentralized finance platform Drift has suspended operations after a cyberattack resulted in the theft of hundreds of millions of dollars in cryptocurrency from its Solana-based protocol.

4 min read

Mercor Confirms Security Incident Tied to LiteLLM Supply Chain Attack

AI hiring platform Mercor has confirmed a security incident linked to the LiteLLM PyPI supply chain attack carried out by TeamPCP. Separately, Lapsus$ claimed on its website to have obtained hundreds of gigabytes of Mercor's data.

6 min read
Back to all News