North Korean Intel Runs Six-Month Con to Hack $270 Million from Drift
Image: Yellow

North Korean Intel Runs Six-Month Con to Hack $270 Million from Drift

05 April, 2026.Crypto.7 sources

Key Takeaways

  • North Korea-linked actors conducted a six-month intelligence operation against Drift.
  • Attackers posed as a trading firm, met Drift contributors abroad, deposited $1M, waited six months.
  • Loss estimated between $270 and $286 million.

Elaborate Infiltration

Attackers posed as a quantitative trading firm, meeting contributors in person across multiple countries.

Image from @coindesk
@coindesk@coindesk

They deposited over $1 million of their own capital and integrated an Ecosystem Vault.

The exploit did not stem from a smart contract bug but from compromised administrative controls.

Complex Attack Vectors

Forensic analysis identified two likely intrusion vectors: a malicious code repository and a TestFlight application.

A known vulnerability in VSCode and Cursor editors may have enabled silent code execution.

Image from bloomingbit
bloomingbitbloomingbit

Drift immediately suspended all protocol functions.

Mandiant was engaged for investigation.

Aftermath and Recovery

The team began sending on-chain messages to wallets holding stolen crypto.

The attack was attributed with medium-high confidence to UNC4736.

Such long-con, identity-rich operations expose deep weaknesses in multisig-based security.

More on Crypto