#DriftProtocolHacked


A $285 million state-sponsored intelligence operation disguised as a crypto conference handshake. The industry is reeling from one of the most sophisticated DeFi attacks ever recorded.

The Scale of the Breach

Drift Protocol, the largest perpetual futures exchange on Solana, was drained of approximately **$285 million on April 1, 2026**. The attack was not a smart contract vulnerability or a stolen key, but the culmination of a **six-month social engineering operation** orchestrated by **UNC4736 (Citrine Sleet/AppleJeus)** , a state-sponsored group linked to North Korea. Chainalysis has stated that if confirmed, North Korea-linked crypto heists would total at least $10.58 trillion won globally. The scale of the operation is staggering: the group established a fake quantitative trading firm identity, deposited over $1 million of their own real capital, and met Drift contributors in person at conferences across multiple countries before striking.

---

Anatomy of a State-Sponsored Attack

The attackers began their operation in the fall of 2025 at a major crypto conference, where they posed as representatives of a quantitative trading firm. What followed was a meticulous, patient campaign of trust-building that spanned roughly half a year.

· The Infiltration Phase: By December 2025 and January 2026, the group had onboarded an Ecosystem Vault on Drift, submitted strategy documentation, participated in multiple working sessions with contributors, and deposited over $1 million of their own capital. Drift described this behavior as entirely consistent with how legitimate trading firms typically integrate with the protocol.
· The Human Layer: Throughout February and March 2026, Drift contributors met members of the group face-to-face at several major industry conferences in different countries. By the time the attack was launched, these were not strangers but established working partners with a nearly six-month-old relationship.
· The Technical Vectors: Once trust was established, the group deployed a dual-pronged attack: one involved a malicious TestFlight application (Apple's pre-release app distribution platform that bypasses App Store review) presented as their wallet product; the other exploited a known vulnerability in VSCode and Cursor where simply opening a file or folder was enough to silently execute arbitrary code with no warning or prompt.

---

The Execution: A Solana Feature Turned Weapon

The attackers abused a legitimate Solana feature called "durable nonces," which allows transactions to be pre-signed and remain valid indefinitely. By tricking two of Drift's five-member Security Council multisig signers into approving what appeared to be routine transactions, the attackers obtained pre-signed approvals that sat dormant for more than a week. On April 1, they executed those pre-signed transactions, seizing protocol-level administrative powers in under one minute.

---

The Aftermath: Market Fallout and Community Backlash

The immediate impact was devastating:

· TVL Collapse: Drift's total value locked plunged from roughly $550 million to under $250 million in a single morning, a drop of over 53%.
· Token Crash: The DRIFT token dropped as much as 45% in the hours that followed, bottoming near $0.04–$0.05.
· Wider Ecosystem Impact: At least 20 other projects with exposure to Drift liquidity or strategies paused operations or assessed losses.
· Circle Under Fire: On-chain investigator ZachXBT criticized Circle for failing to freeze stolen USDC during the attack, as the attacker used Circle's own Cross-Chain Transfer Protocol (CCTP) to bridge approximately $232 million worth of USDC from Solana to Ethereum without intervention.

---

Legal and Security Implications

Crypto attorney Ariel Givner has stated that the incident may constitute "civil negligence," arguing that the Drift team failed to follow basic security procedures—including keeping signing keys on separate, air-gapped systems and conducting due diligence on developers met at industry conferences. Ads for potential class action lawsuits against Drift Protocol are already circulating. In response, the Solana Foundation and Asymmetric Research launched the STRIDE security program on April 6, 2026, providing formal verification and threat monitoring for Solana DeFi protocols.

---

A New Era of DeFi Threats

This attack represents a fundamental escalation in the threat landscape. It wasn't a code exploit—it was a structured intelligence operation requiring organizational backing, significant resources, and months of deliberate preparation. The attackers didn't just build fake LinkedIn profiles; they deployed intermediaries with fully constructed identities, verifiable employment histories, and professional networks capable of withstanding real due diligence. As one security researcher noted: "If attackers act like a real organization for six months, invest funds, and participate in the ecosystem, it is practically impossible to detect them with existing security systems".

#DeFiHack #NorthKoreaCrypto #DriftProtocol #CryptoSecurity
DRIFT4,65%
SOL-2,81%
USDC-0,02%
post-image
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin