Drift Protocol disclosed particulars about its April 1, 2026, exploit, outlining a coordinated assault constructed over six months. The decentralized change mentioned the breach adopted in-person conferences, technical engagement, and malicious software program distribution. The incident, which occurred on April 1, concerned compromised contributors and resulted in estimated losses close to $280 million.
Drift Protocol Traces Lengthy-Time period Social Engineering
In an X article, Drift Protocol mentioned the assault started round October 2025 at a serious crypto convention. In line with Drift Protocol, people posing as a quantitative buying and selling agency approached contributors in search of integration.
Nonetheless, the interplay didn’t cease there. The group continued participating contributors throughout a number of international business conferences over six months. They introduced verified skilled backgrounds and demonstrated technical fluency throughout repeated in-person conferences.
Additionally, they shaped a Telegram group after preliminary contact. Over time, they mentioned buying and selling methods and potential vault integrations with contributors. These discussions adopted customary onboarding patterns for buying and selling corporations interacting with Drift Protocol.
From December 2025 by January 2026, the group onboarded an ecosystem vault. They submitted technique particulars and deposited over $1 million into the protocol. In the meantime, they performed working classes and requested detailed product questions.
Compromise Linked to Shared Instruments and System Entry
As integration talks progressed into February and March 2026, belief deepened. Contributors met the group once more at business occasions, strengthening current relationships. Nonetheless, Drift Protocol later recognized these interactions because the seemingly intrusion vector.
In line with Drift Protocol, attackers shared malicious repositories and functions throughout collaboration. It is a full distinction to ZachXBT’s callout on Circle over the $280M exploit delay. One contributor reportedly cloned a code repository introduced as a frontend deployment instrument.
Supply: Arkham
One other contributor downloaded a TestFlight utility described as a pockets product. These actions doubtlessly uncovered gadgets to compromise. For the repository vector, Drift Protocol pointed to a identified vulnerability in VSCode and Cursor.
Throughout December 2025 by February 2026, opening information might result in silent code execution with out warnings. Following the exploit, Drift Protocol performed forensic evaluations throughout affected gadgets and accounts. Notably, attacker communication channels and malware had been wiped instantly after execution.
Attribution and Ongoing Investigation Efforts
Drift Protocol mentioned it froze all protocol features after detecting the exploit. It additionally eliminated compromised wallets from its multisig construction and flagged attacker wallets throughout exchanges and bridges. The agency engaged Mandiant to assist the investigation. In the meantime, SEALs 911 contributed evaluation pointing to a identified risk group.
With medium-high confidence, the decentralized change linked the assault to actors behind the October 2024 Radiant Capital hack. That operation was beforehand attributed to UNC4736, also referred to as AppleJeus or Citrine Sleet.
Drift Protocol clarified that people concerned in face-to-face conferences weren’t North Korean nationals. As an alternative, it famous that such operations usually use third-party intermediaries for in-person engagement.
In line with ZachXBT, the exercise displays identified DPRK-linked cyber operations usually grouped underneath the Lazarus umbrella. He defined that Lazarus refers to a cluster of hacking models, whereas DPRK signifies state affiliation behind these operations. He famous that such teams use layered identities, intermediaries, and long-term entry constructing earlier than executing assaults.

Supply: ZachXBT
ZachXBT added that on-chain fund flows tied to the exploit present overlaps with wallets linked to earlier DPRK-associated incidents, together with Radiant Capital. He additionally highlighted operational similarities, together with staged interactions, malware supply by trusted channels, and fast cleanup after execution.
Drift Protocol emphasised that every one multi-sig signers used chilly wallets in the course of the incident. It continues working with regulation enforcement and forensic companions to finish the investigation.
