Skip to content
MagnaNet Network MagnaNet Network

  • Home
  • About Us
    • About Us
    • Advertising Policy
    • Cookie Policy
    • Affiliate Disclosure
    • Disclaimer
    • DMCA
    • Terms of Service
    • Privacy Policy
  • Contact Us
  • FAQ
  • Sitemap
MagnaNet Network
MagnaNet Network

Drift Protocol Suffers $285 Million Heist in Sophisticated Durable Nonce Attack, North Korean Hackers Suspected

Cahyo Dewo, April 4, 2026

In a significant blow to the decentralized finance (DeFi) sector, Solana-based decentralized exchange (DEX) Drift Protocol has confirmed a security incident on April 1, 2026, resulting in the draining of approximately $285 million in digital assets. The attack, described by the company as a "highly sophisticated operation," involved the exploitation of durable nonces and extensive social engineering to compromise the platform’s Security Council administrative powers. Blockchain intelligence firms Elliptic and TRM Labs have since pointed to strong on-chain indicators suggesting the involvement of North Korean state-sponsored hacking groups.

The Anatomy of a Sophisticated Attack

Drift Protocol, a prominent platform on the Solana blockchain known for its perpetuals trading and liquidity provisions, revealed the intricate nature of the breach through a series of public statements on X (formerly Twitter). According to their account, a malicious actor gained unauthorized access to the protocol’s core administrative functions, not by exploiting a vulnerability in Drift’s smart contracts or underlying programs, nor through compromised seed phrases. Instead, the breach was a multi-stage operation that leveraged sophisticated social engineering techniques combined with an innovative use of durable nonce accounts to pre-sign transactions.

Durable nonces, a feature designed to prevent transaction replay attacks by ensuring a transaction is only processed once, were weaponized in this instance. The attackers appear to have pre-signed multiple transactions that included delayed execution mechanisms. This allowed them to meticulously prepare their exploit over several weeks, setting the stage for a rapid and devastating exfiltration of funds. The initial preparations for this elaborate scheme were identified as early as March 23, 2026, indicating a methodical and patient approach by the threat actors.

The culmination of this preparation saw the attackers obtain sufficient multi-signature (multisig) approvals. Multisig wallets and approval mechanisms are standard security practices in DeFi, requiring multiple parties to authorize a transaction, thereby reducing the risk of a single point of failure. However, the attackers managed to circumvent this defense. Within minutes of gaining the necessary approvals, they executed a malicious administrative transfer, effectively seizing control of protocol-level permissions. This critical takeover enabled them to introduce a fictitious asset, which they dubbed "CarbonVote Token," into the protocol’s system.

TRM Labs’ analysis highlighted this critical step, explaining that the attackers seeded the CarbonVote Token with only a few thousand dollars in liquidity and engaged in wash trading to artificially inflate its perceived value. Crucially, Drift’s oracle system, responsible for providing external data feeds like asset prices to the blockchain, treated this manufactured token as legitimate collateral worth hundreds of millions of dollars. With control over administrative powers and a manipulated oracle, the attackers removed all pre-set withdrawal limits, allowing them to rapidly drain existing funds from the platform’s vaults.

A Lightning-Fast Exfiltration

Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK

The speed of the actual fund exfiltration was staggering. PIF Research Labs, in their investigation, reported that the assets were drained within a mere 10 seconds. "From first withdrawal (41.72M JLP at 16:06:09) to last primary withdrawal (2,200 wETH at 16:06:19)," their report stated, underscoring the efficiency and automation of the attack. "The major vaults were emptied in the time it takes to send a text." This rapid execution is a hallmark of highly organized and well-resourced cybercriminal operations, particularly those attributed to state-sponsored actors.

The stolen assets, totaling approximately $285 million, included a mix of wrapped Ether (wETH), Jupiter Liquidity Provider (JLP) tokens, and other digital currencies, reflecting the diverse holdings within Drift Protocol’s vaults. The immediate impact on Drift Protocol was severe, leading to a temporary halt in operations and a significant loss of user trust.

Suspected North Korean Link: A Familiar Modus Operandi

Almost immediately after the incident, leading blockchain intelligence firms Elliptic and TRM Labs independently published reports drawing strong parallels between the Drift Protocol heist and previous attacks attributed to North Korean state-sponsored groups. Several on-chain indicators and operational tactics strongly suggest their involvement:

  • Tornado Cash for Initial Staging: The use of Tornado Cash, a cryptocurrency mixer, for initial staging of funds is a consistent tactic employed by North Korean hackers to obscure the origins of their illicit assets.
  • Cross-Chain Bridging Patterns: The specific methods and routes used for cross-chain bridging to move stolen funds are consistent with patterns observed in prior North Korean-linked hacks. These patterns often involve complex routing through multiple blockchains and exchanges to complicate tracing efforts.
  • Speed and Scale of Laundering: The rapid and large-scale laundering of the stolen assets aligns with the operational capabilities and urgency typically demonstrated by North Korean threat actors, who are known for their efficiency in converting stolen crypto into fiat currency to fund state objectives.
  • Deployment Time of Malicious Asset: TRM Labs notably pointed out that the CarbonVote Token, the fictitious asset used in the exploit, was deployed at 09:30 Pyongyang time. While not definitive proof on its own, this geographical timestamp adds another piece to the puzzle, aligning with the operational hours of North Korean groups.
  • Bybit Exploit Similarities: Both firms highlighted the similarities to the massive Bybit exploit of February 2025, where an estimated $1.46 billion was stolen. That attack also demonstrated a high level of sophistication and a rapid exfiltration process, bearing a striking resemblance to the Drift incident.

Elliptic’s analysis went further, noting that if confirmed, the Drift Protocol incident would represent the eighteenth DPRK (Democratic People’s Republic of Korea) act they have tracked since the start of 2026, with over $300 million stolen by these groups year-to-date. This underscores a persistent and escalating campaign of cyber-enabled financial crime by North Korea.

The Role of Social Engineering and State-Sponsored Campaigns

TRM Labs emphasized that the "critical vulnerability was not a smart contract bug but a combination of social engineering multisig signers into pre-signing hidden authorizations and a zero-timelock Security Council migration that eliminated the protocol’s last line of defense." This assessment highlights a crucial aspect of North Korean cyber operations: their mastery of social engineering.

Social engineering remains the primary initial access pathway for these sophisticated attacks. North Korean threat actors leverage persuasive personas, elaborate decoys, and meticulously crafted phishing campaigns to target individuals with privileged access within cryptocurrency projects and Web3 organizations. They employ various campaigns, including those tracked as DangerousPassword (also known as CageyChameleon, CryptoMimic, and CryptoCore) and Contagious Interview. These campaigns often involve creating fake job offers, impersonating legitimate entities, or developing malicious software disguised as productivity tools to gain the trust of their targets.

Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK

As of late February 2026, the combined gains from the DangerousPassword and Contagious Interview campaigns alone totaled $37.5 million for the year, demonstrating the consistent effectiveness of these social engineering tactics. Elliptic noted that "The evolution of the DPRK’s social engineering techniques, combined with the increasing availability of AI to refine and perfect these methods, means the threat extends well beyond exchanges. Individual developers, project contributors and anyone with access to cryptoasset infrastructure is a potential target." The use of AI to create more convincing phishing emails, deepfake identities, and tailored social engineering narratives presents an alarming new frontier in these attacks.

Broader Implications and Related Threats

The Drift Protocol hack is not an isolated event but rather a continuation of North Korea’s sustained and well-resourced campaign of large-scale cryptoasset theft, which the U.S. government has explicitly linked to the funding of its illicit weapons programs. Elliptic estimates that DPRK-linked actors have stolen over $6.5 billion in cryptoassets in recent years, with a record $2 billion netted in 2025 alone. These funds are critical for bypassing international sanctions and financing the development of nuclear weapons and ballistic missile technologies.

This incident also coincides with another high-profile cyberattack attributed to North Korean hacking groups: the supply chain compromise of the popular Axios npm package. Multiple security vendors, including Google, Microsoft, CrowdStrike, and Sophos, have attributed this attack to UNC1069, a North Korean group that overlaps with other notorious entities such as BlueNoroff, CryptoCore, Nickel Gladstone, Sapphire Sleet, and Stardust Chollima. Sophos stated, "This state-sponsored group focuses on generating revenue for the North Korean regime. The artifacts include identical forensic metadata and command-and-control (C2) patterns, as well as connections to malware exclusively used by Nickel Gladstone. Based on these artifacts, it is highly likely that Nickel Gladstone is responsible for the Axios attacks." This connection underscores the multi-faceted nature of North Korea’s cyber warfare, targeting both direct crypto holdings and the broader software supply chain to achieve their financial objectives.

Ongoing Investigations and Recovery Efforts

Drift Protocol has confirmed that it is actively coordinating with multiple security firms to conduct a thorough post-mortem analysis and determine the full extent and precise mechanisms of the incident. Furthermore, the company is working with various blockchain bridges, centralized exchanges, and law enforcement agencies globally to trace the stolen assets and initiate efforts to freeze them wherever possible. The challenge in recovering these funds is significant, given the sophisticated laundering techniques employed by North Korean actors, but international cooperation remains a critical avenue for asset recovery.

This incident serves as a stark reminder of the persistent and evolving threats facing the decentralized finance ecosystem. It highlights the critical need for enhanced security protocols, robust oracle systems, multi-layered defense strategies, and continuous vigilance against advanced social engineering tactics, especially from state-sponsored adversaries. The DeFi community, developers, and users alike must adapt to this increasingly sophisticated threat landscape to safeguard the integrity and security of digital assets.

Cybersecurity & Digital Privacy attackCybercrimedriftdurablehackersHackingheistkoreanmillionnoncenorthPrivacyprotocolSecuritysophisticatedsufferssuspected

Post navigation

Previous post
Next post

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

Telesat Delays Lightspeed LEO Service Entry to 2028 While Expanding Military Spectrum Capabilities and Reporting 2025 Fiscal PerformanceThe Internet of Things Podcast Concludes After Eight Years, Charting a Course for the Future of Smart HomesThe Evolving Landscape of Telecommunications in Laos: A Comprehensive Analysis of Market Dynamics, Infrastructure Growth, and Future ProspectsOxide induced degradation in MoS2 field-effect transistors
The Dual Imperative: Why Production AI Applications Demand Both Vector and Relational Databases for Robust Data ManagementSamsung Expands One UI 8.5 Open Beta to a Swath of Flagship and Fan Edition Devices, Signifying Imminent Stable ReleaseSpace Capabilities Underpin Global Security Strategies as Space Functions as Critical InfrastructureThe Mass Adoption of WebAssembly Hinges on the Finalization of its Component Model
Neural Computers: A New Frontier in Unified Computation and Learned RuntimesAWS Introduces Account Regional Namespace for Amazon S3 General Purpose Buckets, Enhancing Naming Predictability and ManagementSamsung Unveils Galaxy A57 5G and A37 5G, Bolstering Mid-Range Dominance with Strategic Launch Offers.The Cloud Native Computing Foundation’s Kubernetes AI Conformance Program Aims to Standardize AI Workloads Across Diverse Cloud Environments

Categories

  • AI & Machine Learning
  • Blockchain & Web3
  • Cloud Computing & Edge Tech
  • Cybersecurity & Digital Privacy
  • Data Center & Server Infrastructure
  • Digital Transformation & Strategy
  • Enterprise Software & DevOps
  • Global Telecom News
  • Internet of Things & Automation
  • Network Infrastructure & 5G
  • Semiconductors & Hardware
  • Space & Satellite Tech
©2026 MagnaNet Network | WordPress Theme by SuperbThemes