Home OSINT News Signals
CYBER

‘Six Months in the Making’: Drift Protocol Says $285,000,000+ Hack Involved North Korean-Backed Impostors at Multiple Crypto Conferences

🕓 1 min read

EXCLUSIVE: NORTH KOREAN HACKERS INFILTRATE CRYPTO ELITE IN SIX-MONTH CON, STEAL $285 MILLION

This was not a faceless malware attack. This was a masterclass in human exploitation. The staggering $285 million data breach of the Solana-based Drift Protocol was the result of a six-month, in-person infiltration by North Korean-backed impostors who rubbed shoulders with developers at the world's most exclusive crypto conferences. This is cybersecurity warfare, executed with chilling patience.

According to an explosive new incident report, the April 1st hack began in Fall 2025. Actors posing as a quant trading firm approached Drift contributors at a major conference. They were technically fluent, had polished backgrounds, and spoke the language of DeFi. They weren't strangers in a phishing email; they were convincing peers. A Telegram group was formed, and for months, they discussed trading strategies and vault integrations, building undeniable credibility.

The impostors successfully onboarded a vault in December, depositing over $1 million of their own capital to appear legitimate. Through February and March 2026, they met Drift team members face-to-face again at multiple global events, sharing links to tools and projects. These links, now believed to have contained the critical zero-day vulnerability exploit, were the Trojan horse. The relationship was half a year old. Trust was the ultimate vulnerability.

Investigators state with "medium-high confidence" this was orchestrated by the same North Korean Lazarus Group behind the 2024 Radiant Capital hack. Crucially, Drift notes the individuals they met were not North Korean nationals. "DPRK threat actors at this level deploy third-party intermediaries," the report states, revealing a sophisticated proxy war targeting blockchain security at its human core.

This changes everything. Your protocol's code may be airtight, but can you vet the "colleague" you shared a coffee with in Lisbon or Singapore? This attack proves that the weakest link in crypto is no longer a smart contract bug, but the handshake at a conference after-party. It was a social engineering exploit funded by a nation-state.

We are entering a terrifying new era of ransomware diplomacy. Expect sanctioned regimes to dramatically increase these long-con, in-person operations, targeting the open culture of Web3. The next major breach won't start with a malicious contract—it will start with a friendly LinkedIn message before a keynote.

The crypto world just got a $285 million lesson in trust. And it can't afford another.

Telegram X LinkedIn
Back to News