Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

583+ Articles
117+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Drift $280M Crypto Theft Linked to 6-Month In-Person DPRK Infiltration
Drift $280M Crypto Theft Linked to 6-Month In-Person DPRK Infiltration
NEWS

Drift $280M Crypto Theft Linked to 6-Month In-Person DPRK Infiltration

Drift Protocol has revealed that the $280 million hack it suffered was the culmination of a six-month long operation in which North Korean-linked threat actors built a physical operational presence inside the Drift ecosystem — including real-world attendance at team events — before seizing control of the platform's security council and executing the theft.

Dylan H.

News Desk

April 7, 2026
5 min read

The Drift Protocol, a Solana-based decentralized exchange (DEX) and perpetuals trading platform, has disclosed that the $280+ million hack it suffered in late March 2026 was the result of a meticulously planned six-month infiltration operation — one that went far beyond typical social engineering attacks to include physical presence at team events and the establishment of a functioning identity within the Drift ecosystem.

The revelation fundamentally changes how the incident is understood: rather than a technical exploit or phishing campaign, Drift fell victim to a patient, multi-vector operation that compromised the organization's internal governance structure over half a year before a single token was moved.

Six Months of Building Trust

According to Drift Protocol's post-mortem disclosure, the threat actor — assessed with high confidence to be affiliated with North Korea's Lazarus Group / DPRK state-sponsored hacking apparatus — spent approximately six months constructing a functional operational presence inside the Drift ecosystem before executing the theft.

This presence included:

  • Professional identity fabrication — The attacker created a credible professional persona used to engage with Drift's team and community
  • Physical attendance at team events — In at least some cases, the threat actor reportedly attended in-person gatherings associated with the Drift project, lending legitimacy to the false identity
  • Community trust establishment — The persona participated in governance discussions, technical conversations, and community channels over an extended period to build credibility

This level of investment reflects a deliberate calculation: the access achievable through a trusted insider position — specifically, a seat on Drift's security council — was worth months of groundwork.

The Security Council Hijack

Drift Protocol operates a decentralized governance model in which a security council holds emergency multisig authority over certain critical protocol actions, including the ability to pause or upgrade smart contracts.

The threat actor's six-month operation was aimed at obtaining a security council position or compromising existing council members sufficiently to achieve majority signing authority. Once that threshold was reached, the attacker used the security council's privileged access to authorize the transfer of approximately $280 million in assets out of the protocol.

This represents a novel attack vector distinct from traditional DeFi exploits: rather than finding a bug in the smart contract code itself, the attacker subverted the governance layer that exists precisely to protect against contract-level exploits. The irony is that the security council — a control designed to prevent hacks — became the attack surface.

DPRK's DeFi Playbook

The Drift attack fits a documented pattern of North Korean cryptocurrency theft operations. The DPRK's Lazarus Group and affiliated clusters (tracked as UNC1069, TraderTraitor, and others by various researchers) have stolen an estimated $3 billion in cryptocurrency over the past several years to fund the regime's weapons programs and sanctions-evading activities.

Key characteristics of DPRK DeFi operations include:

TacticDescription
Long-horizon social engineeringMulti-month relationship-building before any malicious action
Fake professional identitiesElaborate personas with LinkedIn profiles, GitHub activity, and professional references
Job application targetingApplying for positions at crypto firms to gain legitimate access
In-person engagementWillingness to attend conferences and events to establish credibility
Governance layer attacksTargeting multisig holders and DAO participants rather than contract code

The use of physical/in-person presence as part of the social engineering strategy is a notable escalation. While DPRK operatives have been documented attending online meetings using fake video technology, confirmed real-world attendance at industry events represents a higher operational investment.

Previous Coverage: The Initial Hack

Earlier reporting (Drift loses $280 million as hackers seize security council powers) documented the technical execution of the hack and confirmed the security council mechanism was compromised. Subsequent attribution reporting (285 million Drift hack traced to six-month DPRK social engineering operation) outlined the attribution to North Korea.

This latest disclosure from Drift Protocol itself provides the definitive post-mortem confirming the six-month timeline and the in-person operational component.

Implications for DeFi Security

The Drift incident surfaces a structural weakness in decentralized finance security architecture: governance security is harder to secure than contract security.

Smart contract vulnerabilities can be audited, formally verified, and bug-bounty-hunted. But governance attacks exploit the human trust layer — and no amount of code auditing will detect a threat actor who has spent six months building a credible professional identity.

Security recommendations emerging from the incident include:

  1. Identity verification for security council positions — KYC procedures, in-person verification, or cryptographically verifiable credentials for participants with privileged governance authority
  2. Timelocked governance actions — Requiring a mandatory delay (e.g., 48–72 hours) between any security council action and its execution, giving the community time to detect and override unauthorized actions
  3. Multi-factor governance consensus — Requiring supermajority thresholds that make compromise of a single individual insufficient for fund movement
  4. Background screening for core contributors — Particularly for roles with governance or technical access, vetting that goes beyond pseudonymous online identity
  5. Behavioral anomaly detection — Monitoring for sudden changes in governance voting patterns or unusual action proposals from previously inactive council members

Sources: BleepingComputer, Drift Protocol Post-Mortem

#Cryptocurrency#DPRK#North Korea#DeFi#Social Engineering#BleepingComputer

Related Articles

$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation

Drift has confirmed the April 1, 2026, theft of $285 million resulted from a meticulously planned six-month North Korean social engineering operation that began in fall 2025, in which a DPRK operative infiltrated the organization through a fake hiring process and ultimately seized Security Council powers.

4 min read

North Korea Deploys AI-Generated Video and ClickFix

North Korean threat actors are running sophisticated campaigns using AI-generated deepfake videos and the ClickFix social engineering technique to target...

6 min read

North Korean Hackers Use Fake Zoom Meeting to Target Crypto

UNC1069, a North Korean APT group, deployed a sophisticated ClickFix scam using a fake Zoom meeting to target a cryptocurrency executive in a social...

5 min read
Back to all News