Skip to main content

North Korean Agents Infiltrated Drift Protocol for Six Months Before $270M Heist

Investigations reveal that North Korean state-sponsored hackers spent six months posing as a quantitative trading firm to execute a $270 million exploit on Drift Protocol.

By CryptoPress
April 5, 2026

  • North Korean intelligence operatives reportedly spent six months impersonating a legitimate quantitative trading firm to gain the trust of Drift Protocol contributors.
  • The attackers met team members in person at international conferences and deposited $1 million of their own capital to establish credibility before the exploit.
  • Blockchain analytics firms Elliptic and TRM Labs have linked the theft of approximately $270 million to $286 million to the DPRK-affiliated Lazarus Group or related entities.

A sophisticated security breach of Drift Protocol, which resulted in the loss of at least $270 million, has been identified as a long-term intelligence operation orchestrated by North Korean state-sponsored hackers. According to post-mortem reports and forensic analysis from blockchain security firms, the attackers utilized a high-effort social engineering campaign that lasted over half a year, marking a significant escalation in the tactics used by the Democratic People’s Republic of Korea (DPRK) to target decentralized finance (DeFi) ecosystems.

Starting in late 2025, the operatives posed as a professional quant trading firm interested in integrating with the Solana-based perpetual futures exchange. To maintain the facade, the group used third-party intermediaries who were not North Korean nationals to physically approach Drift contributors at major global cryptocurrency conferences. Throughout February and March 2026, the attackers held multiple face-to-face working sessions with the development team, demonstrating technical fluency and professional backgrounds that shielded them from suspicion.

The attackers went as far as depositing $1 million of their own funds into an ecosystem vault between December 2025 and January 2026 to verify their status as high-value partners. This level of financial commitment and physical infiltration allowed the group to eventually compromise the protocol’s administrative multisig keys or manipulate contributors into signing malicious transactions disguised as routine maintenance.

“The report has revealed that the bad actors behind the historic hack physically stalked and socially engineered the developers in real life,” noted reports following the investigation. “This required alarming patience and resources.”

On April 1, 2026, the group executed the final stage of the plan. By manipulating price oracles for a fictitious asset used as collateral and leveraging their established administrative access to disable safety circuit breakers, the attackers drained the protocol’s liquidity vaults in less than a minute. The stolen assets, which included USDC, JLP, and Solana derivatives, were rapidly dispersed across thousands of wallets using automated laundering bots, a hallmark of Lazarus Group operations.

This incident is now the largest DeFi exploit of 2026 and the second-largest in the history of the Solana blockchain. Security experts warn that the shift from code-level exploits to the human and governance layers represents a terrifying new frontier for protocol security, where the primary vulnerability is no longer the smart contract, but the trust established between developers and peer organizations.

Disclaimer: This article is for informational purposes only and does not constitute advice of any kind. Readers should conduct their own research before making any decisions.

© Cryptopress. For informational purposes only, not offered as advice of any kind.

Tags: ,

Related

© Cryptopress. All rights reserved.