North Korea Behind $285M Drift Protocol Heist
Solana's Drift Protocol lost $285 million in 2026's largest DeFi hack. TRM Labs attributes the attack to North Korean actors who exploited oracle manipulation and pre-signed transactions.
Drift Protocol, a decentralized exchange on Solana, lost approximately $285 million on April 1 in what TRM Labs believes was a North Korean state-sponsored attack. The heist ranks as the largest DeFi exploit of 2026 and the second-largest in Solana's history behind the 2022 Wormhole bridge hack.
The attackers combined social engineering, oracle manipulation, and governance exploitation into a multi-week operation that culminated in 31 withdrawal transactions completed in just 12 minutes.
How the Attack Unfolded
TRM Labs documented the attack timeline:
- March 11: Attackers withdrew 10 ETH from Tornado Cash to begin staging
- March 12: Deployed infrastructure for CarbonVote Token (CVT), a fake asset used in the exploit
- March 23-30: Created "durable nonce" accounts containing pre-signed transactions
- March 27: Security Council migrated to a 2/5 multisig threshold with zero timelock
- April 1: Execution—31 withdrawals in approximately 12 minutes
- April 2: Drift confirmed the breach
The fake token component is particularly notable. Attackers minted 750 million CVT tokens, seeded a small liquidity pool on Raydium (approximately $500), then used wash trading to establish a price history near $1. Over time, Drift's oracles picked up this artificial signal and treated CVT as legitimate collateral worth hundreds of millions.
The Social Engineering Vector
Before the on-chain exploitation, attackers induced Security Council signers to pre-sign transactions that "appeared routine but carried hidden authorizations for critical admin actions," according to TRM Labs.
The governance exploitation was enabled by a zero-timelock migration to the Security Council, which eliminated any detection window. By the time anyone noticed something was wrong, the funds were already moving.
This pattern mirrors Lazarus Group operations we've covered previously, where patient reconnaissance and social engineering precede rapid financial extraction. The attackers demonstrated what TRM Labs called "staggering confidence" in their ability to move large sums quickly.
Impact and Response
Drift's total value locked plummeted from $550 million to under $300 million within an hour. The DRIFT token dropped over 40 percent during the incident, sending shockwaves across Solana's DeFi ecosystem.
Stolen assets—USDC, JLP, SOL, WBTC, and others—were bridged primarily to Ethereum within hours of extraction. Greyphish and similar monitoring tools flagged the unusual bridge activity, but by then the funds had already moved through multiple hops.
Blockchain investigator ZachXBT publicly criticized Circle for not freezing the stolen USDC quickly enough, noting that millions in stablecoins flowed freely through exchanges even after the hack was publicly known.
Why This Matters
This attack demonstrates the evolution of North Korean crypto theft operations. Rather than exploiting smart contract bugs directly, the attackers compromised the human and governance layers surrounding the protocol. Pre-signed transactions, manipulated oracles, and social engineering created an attack surface that purely technical audits wouldn't catch.
For DeFi protocols, the lessons are uncomfortable:
- Timelocks on governance changes aren't optional—zero-timelock migrations created the exploitation window
- Oracle manipulation through wash trading is a real threat—protocols need more sophisticated price validation
- Pre-signed transactions are a vector—multisig signers need to understand exactly what they're approving
The $285 million loss continues North Korea's streak of funding state operations through cryptocurrency theft. For more on protecting personal crypto assets, see our online safety guide.
Related Articles
Ledger Data Breach: Payment Processor Compromise Exposes Crypto Wallet Users
Cryptocurrency hardware wallet maker Ledger confirms customer data exposed after third-party payment processor Global-e suffers cloud system breach.
Jan 6, 2026Trust Wallet Chrome Extension Compromised, $7 Million Drained from Users
Attackers pushed malicious update v2.68 to Chrome Web Store using leaked API key. Hundreds affected as seed phrases harvested via embedded analytics library.
Dec 29, 2025Qilin Ransomware Hits German Left Party Amid Hybrid War Fears
Die Linke confirms Qilin stole internal data and employee info from party headquarters. Officials suggest attack may be politically motivated hybrid warfare.
Apr 3, 2026Hasbro Confirms Cyberattack, Warns of Weeks-Long Recovery
Toy giant Hasbro filed an SEC 8-K disclosing unauthorized network access discovered March 28. Systems remain offline with recovery expected to take weeks.
Apr 2, 2026