North Korean Agents Infiltrated Drift Protocol for Six Months Before $270M Heist
Investigations reveal that North Korean state-sponsored hackers spent six months posing as a quantitative trading firm to execute a $270 million exploit on Drift Protocol.
- North Korean intelligence operatives reportedly spent six months impersonating a legitimate quantitative trading firm to gain the trust of Drift Protocol contributors.
- The attackers met team members in person at international conferences and deposited $1 million of their own capital to establish credibility before the exploit.
- Blockchain analytics firms Elliptic and TRM Labs have linked the theft of approximately $270 million to $286 million to the DPRK-affiliated Lazarus Group or related entities.
A sophisticated security breach of Drift Protocol, which resulted in the loss of at least $270 million, has been identified as a long-term intelligence operation orchestrated by North Korean state-sponsored hackers. According to post-mortem reports and forensic analysis from blockchain security firms, the attackers utilized a high-effort social engineering campaign that lasted over half a year, marking a significant escalation in the tactics used by the Democratic People’s Republic of Korea (DPRK) to target decentralized finance (DeFi) ecosystems.
Starting in late 2025, the operatives posed as a professional quant trading firm interested in integrating with the Solana-based perpetual futures exchange. To maintain the facade, the group used third-party intermediaries who were not North Korean nationals to physically approach Drift contributors at major global cryptocurrency conferences. Throughout February and March 2026, the attackers held multiple face-to-face working sessions with the development team, demonstrating technical fluency and professional backgrounds that shielded them from suspicion.
The attackers went as far as depositing $1 million of their own funds into an ecosystem vault between December 2025 and January 2026 to verify their status as high-value partners. This level of financial commitment and physical infiltration allowed the group to eventually compromise the protocol’s administrative multisig keys or manipulate contributors into signing malicious transactions disguised as routine maintenance.
“The report has revealed that the bad actors behind the historic hack physically stalked and socially engineered the developers in real life,” noted reports following the investigation. “This required alarming patience and resources.”
On April 1, 2026, the group executed the final stage of the plan. By manipulating price oracles for a fictitious asset used as collateral and leveraging their established administrative access to disable safety circuit breakers, the attackers drained the protocol’s liquidity vaults in less than a minute. The stolen assets, which included USDC, JLP, and Solana derivatives, were rapidly dispersed across thousands of wallets using automated laundering bots, a hallmark of Lazarus Group operations.
This incident is now the largest DeFi exploit of 2026 and the second-largest in the history of the Solana blockchain. Security experts warn that the shift from code-level exploits to the human and governance layers represents a terrifying new frontier for protocol security, where the primary vulnerability is no longer the smart contract, but the trust established between developers and peer organizations.
Disclaimer: This article is for informational purposes only and does not constitute advice of any kind. Readers should conduct their own research before making any decisions.
© Cryptopress. For informational purposes only, not offered as advice of any kind.
Latest Content
Lo Último
- Tether Leads $150 Million Recovery Initiative for Drift Protocol Following $270 Million Exploit
- Polkadot Leads Social Discourse Thanks to Hyperbridge
- Tom Lee’s BitMine Reports $3.8 Billion Quarterly Loss Following Ethereum Price Drop
- Bitcoin Faces $76K Resistance as Exchange Inflows Surge to Multi-Month Highs
- Bitcoin Scholars Fund Launches to Redirect $21M Federal Taxes to K-12 Bitcoin Education
Related
- Elliptic Links $286 Million Drift Protocol Exploit to North Korean State-Sponsored Hackers Blockchain analysis firm Elliptic has identified North Korean traits in the $286 million Drift Protocol hack, citing sophisticated cross-chain laundering....
- Drift Protocol Exploited for Over $200 Million in Largest Solana DeFi Hack of 2026 Solana-based perpetuals DEX Drift Protocol confirmed an active exploit on April 1, 2026, with on-chain data showing $200 million to $285 million drained. The team paused deposits and withdrawals, calling the incident 'not an April Fools joke' as the DRIFT...
- Drift Protocol Fallout Spreads to 20 Projects as Prime Numbers Fi Losses Top $10 Million The contagion from the Drift Protocol exploit has nearly doubled in scope, with 20 Solana-based projects now reporting exposure and total ecosystem losses reaching $285 million....
- Solana Airdrop Season: Your Comprehensive Guide to Capitalizing on Airdrops in the Solana Ecosystem Everything You Need to Know About the Solana Airdrop Season....



