Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

558+ Articles
116+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. $285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation
$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation
NEWS

$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation

Drift has confirmed the April 1, 2026, theft of $285 million resulted from a meticulously planned six-month North Korean social engineering operation that began in fall 2025, in which a DPRK operative infiltrated the organization through a fake hiring process and ultimately seized Security Council powers.

Dylan H.

News Desk

April 5, 2026
4 min read

Solana-based decentralized finance platform Drift has disclosed that the April 1, 2026, cyberattack that resulted in the theft of $285 million was not an opportunistic exploit — it was the culmination of a six-month targeted social engineering operation orchestrated by North Korea's Democratic People's Republic of Korea (DPRK) that began in the fall of 2025.

The Attack Timeline

The operation follows a playbook increasingly associated with DPRK-linked groups such as UNC1069 (Lazarus) that have systematically targeted cryptocurrency and DeFi organizations through long-horizon infiltration campaigns:

  • Fall 2025: A DPRK operative began a targeted approach to Drift, leveraging fabricated professional credentials and identity documents to pursue a position within the organization
  • Multi-month infiltration: The operative successfully passed hiring processes and established internal access over the course of several months, gaining trust and progressively deeper system privileges
  • April 1, 2026: The operative executed the final phase of the attack, seizing Security Council governance powers within the Drift protocol — the multi-signature administrative controls that govern the platform — and draining $285 million in user funds

DPRK's DeFi Infiltration Playbook

This attack reflects a matured DPRK strategy that goes far beyond traditional technical exploits. Rather than targeting protocol vulnerabilities directly, North Korean operatives invest months in:

  1. Identity fabrication — Creating convincing developer or executive personas with fake GitHub histories, LinkedIn profiles, and portfolio projects
  2. Targeted recruitment engagement — Approaching high-value crypto/DeFi projects through legitimate hiring pipelines
  3. Long-term trust building — Performing genuine work contributions over weeks or months to establish credibility and expand access
  4. Governance seizure — Identifying and eventually accessing multi-signature keys, admin wallets, or on-chain governance mechanisms as the final step

The April 1 Drift attack follows earlier DPRK campaigns including the Axios npm supply chain attack attributed to UNC1069, and the broader pattern of IT worker infiltration documented by US, South Korean, and UK authorities.

Scale of the Theft

The $285 million stolen from Drift represents one of the largest single DeFi heists in 2026 and adds to an estimated billions of dollars extracted by North Korean state-sponsored hackers from the cryptocurrency sector over recent years. US authorities have assessed that DPRK uses these funds to finance weapons programs in violation of international sanctions.

Drift's protocol operates on the Solana blockchain, and the attackers reportedly used the seized governance powers to authorize unauthorized fund transfers directly on-chain — a move that bypassed traditional security controls by leveraging legitimately held administrative keys.

Implications for DeFi Security

The Drift hack underscores several structural vulnerabilities common across the DeFi ecosystem:

  • Governance concentration risk: When a small number of key holders control protocol administration, social engineering targeting even one insider can be catastrophic
  • Insider threat blind spots: DeFi teams often lack the background check infrastructure and ongoing behavioral monitoring that traditional financial institutions employ
  • Hiring process vulnerabilities: Remote-first, globally distributed teams in the crypto space provide natural cover for identity-based infiltration operations

What Organizations Should Do

For cryptocurrency and DeFi teams:

  1. Enhanced identity verification: Implement video KYC, government ID verification, and background checks for all roles with access to protocol admin keys or treasury functions
  2. Multi-factor governance: Require geographically distributed, time-delayed multi-signature processes for any governance action affecting funds
  3. Compartmentalize administrative access: New hires should never receive governance or treasury-adjacent access within the first several months, regardless of role
  4. Behavioral monitoring: Monitor for anomalous access patterns, especially around key management infrastructure and on-chain governance transactions
  5. DPRK threat awareness: Treat DPRK IT worker infiltration as an active, ongoing threat — not a theoretical one

Source: The Hacker News

#North Korea#DPRK#Cryptocurrency#DeFi#Social Engineering#Drift#The Hacker News

Related Articles

UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack

The North Korean threat actor UNC1069 used a sophisticated, targeted social engineering campaign against the Axios npm package maintainer Jason Saayman to...

4 min read

North Korea Deploys AI-Generated Video and ClickFix

North Korean threat actors are running sophisticated campaigns using AI-generated deepfake videos and the ClickFix social engineering technique to target...

6 min read

North Korean Hackers Use Fake Zoom Meeting to Target Crypto

UNC1069, a North Korean APT group, deployed a sophisticated ClickFix scam using a fake Zoom meeting to target a cryptocurrency executive in a social...

5 min read
Back to all News