April 05, 2026
ChainGPT
Drift: $270M Heist Was Six‑Month North Korean Intelligence Operation Targeting Multisig
Drift says $270M heist was a six‑month North Korean intelligence operation
Drift Protocol says the $270 million drain of its vaults on April 1 was the culmination of a six‑month intelligence operation by a North Korea–linked group, according to a detailed incident update published by the team. The report lays out a slow, deliberate campaign of relationship‑building, in‑person meetings, technical infiltration and ultimately the theft of pre‑signed multisig transactions.
What happened — timeline at a glance
- Fall 2025: Attackers first made contact at a major crypto conference, posing as a quantitative trading firm looking to integrate with Drift. They presented verifiable professional backgrounds, technical fluency and a clear understanding of the protocol.
- Fall 2025–Spring 2026: A Telegram group and months of standard onboarding conversations followed, including discussions of trading strategies and vault integrations.
- Dec 2025–Jan 2026: The group onboarded an Ecosystem Vault, held multiple working sessions with Drift contributors, deposited more than $1 million of their own capital and established an operational presence inside the ecosystem.
- Feb–Mar 2026: Drift contributors met members of the group face‑to‑face at several industry conferences across different countries.
- April 1, 2026: Dormant, pre‑signed multisig transactions were executed, enabling a durable‑nonce style exploit that drained $270 million in under a minute.
How they breached defenses
Drift says the compromise used two main vectors:
1) A TestFlight app the attackers presented as a wallet product. TestFlight distributes pre‑release iOS apps and bypasses App Store review, making it an attractive channel for a convincing malicious client.
2) A repository compromise rooted in a widely‑flagged vulnerability in popular code editors (VSCode and Cursor). The flaw allowed silent arbitrary code execution merely by opening a file or folder in the editor — no prompts, warnings, or user action required.
Once devices used by trusted contributors were compromised, attackers were able to obtain the multisig approvals needed to execute the stored transactions. Those pre‑signed transactions had been sitting dormant for more than a week before the April 1 execution that emptied the vaults.
Attribution: UNC4736 (AppleJeus / Citrine Sleet)
Drift attributes the operation to UNC4736 — a group tracked under names such as AppleJeus and Citrine Sleet — based on on‑chain fund flows that trace back to the Radiant Capital attackers and operational overlaps with known DPRK‑linked personas. Drift notes the people who met contributors in person were not North Korean nationals; high‑level DPRK actors are known to use third‑party intermediaries with fully constructed identities and employment histories to pass due diligence.
Why this matters for DeFi security
Drift’s update raises uncomfortable questions for an industry that relies heavily on multisig governance:
- The attackers invested months and more than $1 million to build trust, meet teams in person, contribute real capital and sit dormant until execution — a model specifically designed to defeat superficial due diligence.
- The vector through everyday developer tools and a TestFlight app shows how small user vectors — device compromise, developer IDEs, pre‑release apps — can cascade into catastrophic protocol losses.
- Drift urges protocols to audit access controls, treat every device that can sign multisig approvals as a potential target, and re‑examine assumptions about what onboarding and on‑chain signals of legitimacy actually mean.
In short: if adversaries are willing to run costly, patient intelligence campaigns that blend real capital, in‑person contact and deep technical subterfuge, DeFi teams must assume trusted access equals a threat vector and harden both human and technical attack surfaces accordingly.
Read more AI-generated news on: undefined/news
Related News
Tesla Q1 Delivery Miss Drops Shares 5.4% — Crypto Traders Brace for Mu...
05 Apr 2026
Saylor: Bitcoin's Halving Cycle Is Dead — Institutional Capital, Not M...
05 Apr 2026
Satoshi’s Alleged "Birthday" Turns 51 — Bitcoin Community Notes April...
05 Apr 2026
Anthropic Launches AnthroPAC Amid Pentagon Clash and $5B Compute Build...
05 Apr 2026
Bitcoin Stalls at $66K as Untested Liquidity Below Raises Risk of Slow...
05 Apr 2026
Ant Group launches Anvita — a platform for AI agents to hold assets, t...
05 Apr 2026Most Read News
More News
Tesla Q1 Delivery Miss Drops Shares 5.4% — Crypto Traders Br...
Apr 05
Saylor: Bitcoin's Halving Cycle Is Dead — Institutional Capi...
Apr 05
Satoshi’s Alleged "Birthday" Turns 51 — Bitcoin Community No...
Apr 05
Anthropic Launches AnthroPAC Amid Pentagon Clash and $5B Com...
Apr 05
Bitcoin Stalls at $66K as Untested Liquidity Below Raises Ri...
Apr 05
Ant Group launches Anvita — a platform for AI agents to hold...
Apr 05
Bitcoin Holds Near $67K as 'Extreme Fear' Grips Market — ETF...
Apr 05
Bitcoin vs. Quantum: Keys Breakable in
Apr 05
XRP Could Dip to $0.83 Before Rallying to $8.30, Analyst Say...
Apr 05