Drift Protocol’s $285 Million Heist Started With a Handshake and 6 Months of Trust

Drift Protocol (DRIFT) unveiled a jaw-dropping exposé on April 5, revealing that the $285 million exploit on April 1 was a meticulous, six-month-long intelligence operation, orchestrated by North Korean state-backed hackers.

What they detailed was not your average phishing or recruiter scam. Oh no, it was a whole circus act-complete with in-person meetings, real capital being deployed, and months of warm and fuzzy trust-building. Truly, it was social engineering on steroids.

A Fake Trading Firm That Played the Long Game

It all started innocently enough, at a major crypto conference in the fall of 2025. A group, masquerading as a sophisticated quantitative trading firm, approached some unsuspecting Drift contributors. Little did they know, they were about to fall into the deep end of a well-crafted ruse.

Over the next several months, this well-dressed band of tricksters made appearances at crypto events across the globe. They held “working sessions,” maintained endless Telegram conversations about vault integrations, and kept the trust train rolling.

TLDR on @DriftProtocol hack👇🏻

> 6-month social engineering op
> fake quant firm met contributors at conferences
> built trust + telegram group over months
> onboarded $1M+ vault with real capital
> shared “tools” & repos during integration talks
> one dev cloned…

– Sona (∇, ∇) (@SheTalksCrypto) April 5, 2026

For up-to-the-minute gossip, follow us on X

By December 2025 to January 2026, these “quantitative traders” managed to onboard an Ecosystem Vault on Drift, with over $1 million in capital, while engaging in deep, meaningful product discussions. Ah, the art of deception.

Come March, these so-called traders were making face-to-face appearances, sipping lattes with Drift contributors, looking as harmless as a kitten in a cardigan.

“The most dangerous hackers don’t look like hackers,” remarked crypto developer Gautham, perhaps still wiping the sweat off his brow.

Even experts in Web security were thrown off guard, with researcher Tay admitting she initially expected some run-of-the-mill recruiter scam. Imagine her shock when she realized the depth of the operation. It wasn’t a simple “send us your resume” kind of thing.

I beg everyone in crypto to read this in full.

I expected this to be another case of social engineering, likely some recruiter/job offer shit.

I was very wrong.

And the depth of the operation and personas makes me think they already have multiple other teams on lock.

😳

– Tay 💖 (@tayvano_) April 5, 2026

How the Devices Were Compromised

And now, the plot thickens. Drift pinpointed three likely attack vectors:

  • One contributor, bless their soul, cloned a code repository that the group had so generously shared for a vault frontend.
  • A second unfortunate soul downloaded a TestFlight app that masqueraded as a wallet product. Sweet, sweet naivety.
  • For the repository vector, Drift pointed to a known vulnerability in VSCode and Cursor-discovered and flagged by security researchers back in 2025. But who’s keeping track of those, right?

This flaw allowed hackers to execute arbitrary code silently, the moment a file was opened in the editor-no need for the user to even lift a finger. An instant remote control, like magic, but much less fun.

After the April 1 drain, the attackers made sure to scrub all evidence-Telegram chats and malicious software. Drift quickly froze remaining protocol functions and removed compromised wallets from the multisig. It was like a magician pulling a disappearing act.

The SEALS 911 team is now confidently whispering that the same North Korean threat actors might have carried out the October 2024 Radiant Capital hack, linking them to UNC4736. How cozy.

The complexity and precision of this attack were beyond what most people could imagine.

North Korean hackers have clearly entered the next level of cybercrime.

Kim Jong-un woke up and chose violence.

—-

On October 16, Radiant Capital-a decentralized cross-chain lending…

– OneKey (@OneKeyHQ) December 12, 2024

The on-chain fund flows and operational overlaps? Well, they’re just as suspicious as a ninja in a dark alley.

Industry Calls for a Security Reset

Armani Ferrante, a Solana developer with a flair for drama, is calling on every crypto team to pause, audit their entire security stack, and reevaluate life choices.

“Every team in crypto should use this as an opportunity to slow down and focus on security. If possible, dedicate an entire team to it… you can’t grow if you’re hacked,” Ferrante warned, clutching his pearls.

Drift pointed out that the individuals who met in person weren’t exactly North Korean nationals. Nope, those pesky DPRK hackers have a knack for deploying third-party intermediaries to handle face-to-face business.

As of now, Mandiant, the forensic knights Drift enlisted, has yet to formally attribute the exploit. But rest assured, the investigation is ongoing, and the truth will out.

This incident serves as a dire warning for the crypto world: audit your access controls, treat every device that touches a multisig as a potential target, and-if you suspect you’ve been targeted-call SEAL 911 faster than you can say “lost funds.”

– Drift (@DriftProtocol) April 5, 2026

Read More

2026-04-05 15:10