Home NewsStory Drift Protocol Attack Was 6-Month Coordinated Op

Drift Protocol Attack Was 6-Month Coordinated Op

by Ouess
Drift Protocol attack

The Drift Protocol attack that drained roughly $280 million on April 1 was no simple exploit. According to the DEX’s preliminary investigation, it was a six-month-long, highly coordinated intelligence operation. The attackers had organizational backing, serious resources, and months of deliberate preparation.

How the Drift Protocol Attack Unfolded Over Six Months

It all started at a “major crypto conference” back in October 2025. A group posing as a quantitative trading firm approached Drift contributors. They claimed to want to integrate with the protocol. Over the next six months, they kept showing up at industry events, deliberately engaging specific Drift contributors in person.

Here’s the scary part: they were technically fluent. They had verifiable professional backgrounds. They knew exactly how Drift operated. After gaining trust and access, they used shared malicious links and tools to compromise contributors’ devices. Then, they executed the exploit and wiped their presence immediately after. Clean exit.

Link to Radiant Capital Hack – North Korea Fingerprints

Drift said with “medium-high confidence” that the Drift Protocol attack was carried out by the same actors behind the $58 million Radiant Capital hack in October 2024. In that incident, North Korea-aligned hackers sent malware via Telegram from someone posing as an ex-contractor.

Drift noted that the individuals who showed up in person “were not North Korean nationals.” But DPRK threat actors at this level are known to deploy third-party intermediaries for face-to-face relationship-building. So, the faces you meet may not be the real operators.

Drift is now working with law enforcement to build a complete picture. Meanwhile, the crypto industry gets another painful reminder: trust no one, not even in person.

My Thoughts

This changes how we think about DeFi security. Most hacks target smart contract bugs. This one targeted humans over half a year. The level of sophistication is alarming. Fake quant firms, in-person networking, months of relationship-building, that’s nation-state tradecraft. If North Korea is willing to spend six months to compromise one DEX, no protocol is safe. The Radiant Capital link confirms a pattern. The industry needs to rethink conference security, device hygiene, and social engineering defenses. For traders, this adds another layer of risk to Solana DeFi. Trust but verify? More like verify everything, trust nothing.

You may also like

Crypto Feed Logo Footer
Crypto Feed Logo

Crypto feed news

Our team of crypto enthusiasts and market mavens is on a mission to deliver the latest, juiciest, and most insightful updates from the ever-evolving world of cryptocurrencies.

@CryptoFeedNews 2023 All Right Reserved. Designed and Developed by TheDevThingz

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More

Privacy & Cookies Policy
Social Media Auto Publish Powered By : XYZScripts.com