Drift Protocol administrative takeover and $285 million loss via Security Council manipulation on Solana
Summary
Hide ▲
Show ▼
The April 1, 2026, $285 million Drift Protocol loss was part of a broader campaign by North Korea-linked Lazarus Group (TraderTraitor) targeting DeFi protocols. On April 18, 2026, the group executed a $290 million heist against KelpDAO by exploiting its cross-chain verification layer (DVN) via compromised RPC nodes, falsified data injection, and DDoS attacks, laundering funds through Tornado Cash. The attack paused KelpDAO’s rsETH contracts, froze Aave’s rsETH collateral usage, and was isolated to rsETH without broader contagion. Drift Protocol’s Security Council hijacking, attributed to UNC4736 (AppleJeus/Labyrinth Chollima), and KelpDAO’s DVN compromise both align with Lazarus Group’s pattern of sophisticated state-sponsored attacks on DeFi infrastructure.
Timeline
-
02.04.2026 22:03 4 articles · 19d ago
Drift Protocol Security Council hijack results in $285 million loss via pre-signed transactions on Solana
The investigation confirms the $285 million theft was enabled by a six-month in-person social engineering campaign, where threat actors posed as a quantitative trading firm and engaged Drift contributors directly at crypto conferences. Attackers compromised at least two contributors via a malicious code repository (exploiting a VSCode/Cursor vulnerability) and a fraudulent TestFlight wallet application, using the access to hijack Security Council multisig controls. The Telegram group used for coordinating with contributors was deleted immediately after the theft occurred. Drift attributes the attack with medium-high confidence to UNC4736 (AppleJeus/Labyrinth Chollima), a North Korea-linked actor previously associated with the 3CX supply-chain attack, the $50 million Radiant cryptocurrency theft in 2024, and Chrome zero-day exploitation. The in-person operatives were non-Korean intermediaries, while the campaign itself is assessed to be North Korean state-sponsored. Drift has flagged the attackers’ wallets across exchanges and bridge operators to prevent fund movement or withdrawal, and continues to freeze all protocol functions while coordinating with Elliptic, TRM Labs, and law enforcement to trace and recover stolen assets. This article further links the attack to the broader North Korean Lazarus Group (TraderTraitor) pattern of DeFi targeting, as detailed in the KelpDAO incident, reinforcing attribution to state-sponsored DPRK actors.
Show sources
- Drift loses $280 million as hackers seize Security Council powers — www.bleepingcomputer.com — 02.04.2026 22:03
- Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK — thehackernews.com — 03.04.2026 11:35
- Drift $280M crypto theft linked to 6-month in-person operation — www.bleepingcomputer.com — 06.04.2026 19:35
- KelpDAO suffers $290 million heist tied to Lazarus hackers — www.bleepingcomputer.com — 21.04.2026 01:23
Information Snippets
-
Drift Protocol, a Solana-based DeFi trading platform with 200,000 traders and $55 billion in cumulative trading volume, suffered a $280–$285 million loss due to an administrative takeover.
First reported: 02.04.2026 22:032 sources, 3 articlesShow sources
- Drift loses $280 million as hackers seize Security Council powers — www.bleepingcomputer.com — 02.04.2026 22:03
- Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK — thehackernews.com — 03.04.2026 11:35
- Drift $280M crypto theft linked to 6-month in-person operation — www.bleepingcomputer.com — 06.04.2026 19:35
-
The attacker used durable nonce accounts and pre-signed transactions to delay execution, meeting the 2/5 multisig threshold between March 23–30, 2026.
First reported: 02.04.2026 22:032 sources, 3 articlesShow sources
- Drift loses $280 million as hackers seize Security Council powers — www.bleepingcomputer.com — 02.04.2026 22:03
- Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK — thehackernews.com — 03.04.2026 11:35
- Drift $280M crypto theft linked to 6-month in-person operation — www.bleepingcomputer.com — 06.04.2026 19:35
-
On April 1, 2026, the attacker executed pre-signed malicious transactions immediately after a legitimate transaction, transferring admin control within minutes.
First reported: 02.04.2026 22:032 sources, 3 articlesShow sources
- Drift loses $280 million as hackers seize Security Council powers — www.bleepingcomputer.com — 02.04.2026 22:03
- Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK — thehackernews.com — 03.04.2026 11:35
- Drift $280M crypto theft linked to 6-month in-person operation — www.bleepingcomputer.com — 06.04.2026 19:35
-
Post-takeover, the attacker deployed a malicious asset, removed withdrawal limits, and drained funds from borrow/lend deposits, vault deposits, and trading funds.
First reported: 02.04.2026 22:032 sources, 3 articlesShow sources
- Drift loses $280 million as hackers seize Security Council powers — www.bleepingcomputer.com — 02.04.2026 22:03
- Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK — thehackernews.com — 03.04.2026 11:35
- Drift $280M crypto theft linked to 6-month in-person operation — www.bleepingcomputer.com — 06.04.2026 19:35
-
Drift Protocol confirmed no seed phrases or smart contract vulnerabilities were exploited; the attack targeted governance controls via Security Council multisig.
First reported: 02.04.2026 22:032 sources, 3 articlesShow sources
- Drift loses $280 million as hackers seize Security Council powers — www.bleepingcomputer.com — 02.04.2026 22:03
- Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK — thehackernews.com — 03.04.2026 11:35
- Drift $280M crypto theft linked to 6-month in-person operation — www.bleepingcomputer.com — 06.04.2026 19:35
-
Drift froze all protocol functions, issued a public warning to users, and is coordinating with security firms, exchanges, and law enforcement to trace and recover stolen funds.
First reported: 02.04.2026 22:032 sources, 2 articlesShow sources
- Drift loses $280 million as hackers seize Security Council powers — www.bleepingcomputer.com — 02.04.2026 22:03
- Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK — thehackernews.com — 03.04.2026 11:35
-
Drift stated the DSOL token and insurance fund assets remain unaffected, with a detailed post-mortem report planned for release in the coming days.
First reported: 02.04.2026 22:031 source, 1 articleShow sources
- Drift loses $280 million as hackers seize Security Council powers — www.bleepingcomputer.com — 02.04.2026 22:03
-
The attacker used a novel combination of durable nonce social engineering and zero-timelock Security Council migration to eliminate the last line of defense.
First reported: 03.04.2026 11:351 source, 1 articleShow sources
- Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK — thehackernews.com — 03.04.2026 11:35
-
The attacker introduced a fictitious asset named CarbonVote Token with minimal seeded liquidity and wash trading, which was treated as legitimate collateral worth hundreds of millions of dollars by Drift's oracles.
First reported: 03.04.2026 11:351 source, 1 articleShow sources
- Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK — thehackernews.com — 03.04.2026 11:35
-
On-chain indicators, laundering methodologies, and network-level patterns align with known tradecraft associated with North Korean threat actors (DPRK).
First reported: 03.04.2026 11:352 sources, 2 articlesShow sources
- Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK — thehackernews.com — 03.04.2026 11:35
- Drift $280M crypto theft linked to 6-month in-person operation — www.bleepingcomputer.com — 06.04.2026 19:35
-
The CarbonVote Token was deployed at 09:30 Pyongyang time, coinciding with DPRK operational patterns.
First reported: 03.04.2026 11:351 source, 1 articleShow sources
- Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK — thehackernews.com — 03.04.2026 11:35
-
According to blockchain intelligence firms Elliptic and TRM Labs, this incident may represent the eighteenth DPRK-linked crypto theft tracked in 2026, with over $300 million stolen to date this year.
First reported: 03.04.2026 11:351 source, 1 articleShow sources
- Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK — thehackernews.com — 03.04.2026 11:35
-
DPRK-linked actors are estimated to have stolen over $6.5 billion in cryptoassets in recent years, with a record $2 billion stolen in 2025.
First reported: 03.04.2026 11:351 source, 1 articleShow sources
- Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK — thehackernews.com — 03.04.2026 11:35
-
Prior DPRK social engineering campaigns such as DangerousPassword and Contagious Interview target cryptocurrency and Web3 sectors, with combined gains of $37.5 million in early 2026.
First reported: 03.04.2026 11:351 source, 1 articleShow sources
- Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK — thehackernews.com — 03.04.2026 11:35
-
The attack aligns with a broader DPRK supply chain compromise involving the Axios npm package, attributed to North Korean hacking group UNC1069 overlapping with BlueNoroff and other clusters.
First reported: 03.04.2026 11:352 sources, 2 articlesShow sources
- Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK — thehackernews.com — 03.04.2026 11:35
- Drift $280M crypto theft linked to 6-month in-person operation — www.bleepingcomputer.com — 06.04.2026 19:35
-
The threat actor infiltrated Drift Protocol’s ecosystem through a six-month in-person social engineering campaign at crypto conferences, posing as a quantitative trading firm and engaging contributors directly.
First reported: 06.04.2026 19:351 source, 1 articleShow sources
- Drift $280M crypto theft linked to 6-month in-person operation — www.bleepingcomputer.com — 06.04.2026 19:35
-
Attackers compromised at least two Drift contributors via a malicious code repository (exploiting a VSCode/Cursor vulnerability for silent code execution) and a fraudulent TestFlight wallet application.
First reported: 06.04.2026 19:351 source, 1 articleShow sources
- Drift $280M crypto theft linked to 6-month in-person operation — www.bleepingcomputer.com — 06.04.2026 19:35
-
The Telegram group used for engaging contributors was deleted immediately after the theft occurred.
First reported: 06.04.2026 19:351 source, 1 articleShow sources
- Drift $280M crypto theft linked to 6-month in-person operation — www.bleepingcomputer.com — 06.04.2026 19:35
-
Drift attributes the attack with medium-high confidence to UNC4736 (AppleJeus/Labyrinth Chollima), a North Korea-linked actor previously tied to 3CX supply-chain attacks, Radiant crypto theft, and Chrome zero-day exploitation.
First reported: 06.04.2026 19:351 source, 1 articleShow sources
- Drift $280M crypto theft linked to 6-month in-person operation — www.bleepingcomputer.com — 06.04.2026 19:35
-
The in-person operatives were non-Korean intermediaries, while the campaign itself is assessed to be North Korean state-sponsored.
First reported: 06.04.2026 19:351 source, 1 articleShow sources
- Drift $280M crypto theft linked to 6-month in-person operation — www.bleepingcomputer.com — 06.04.2026 19:35
-
Drift has flagged the attackers’ wallets across exchanges and bridge operators to prevent fund movement or withdrawal.
First reported: 06.04.2026 19:351 source, 1 articleShow sources
- Drift $280M crypto theft linked to 6-month in-person operation — www.bleepingcomputer.com — 06.04.2026 19:35
-
State-sponsored North Korean hackers (Lazarus Group/TraderTraitor) are likely responsible for a $290 million crypto-heist targeting KelpDAO, a liquid restaking DeFi project on Ethereum.
First reported: 21.04.2026 01:231 source, 1 articleShow sources
- KelpDAO suffers $290 million heist tied to Lazarus hackers — www.bleepingcomputer.com — 21.04.2026 01:23
-
The attack impacted lending protocols Compound, Euler, and Aave, with Aave freezing and blocking new deposits or borrowing using rsETH as collateral.
First reported: 21.04.2026 01:231 source, 1 articleShow sources
- KelpDAO suffers $290 million heist tied to Lazarus hackers — www.bleepingcomputer.com — 21.04.2026 01:23
-
KelpDAO detected suspicious cross-chain activity involving rsETH on April 18, 2026, forcing it to pause rsETH contracts across Ethereum mainnet and L2s.
First reported: 21.04.2026 01:231 source, 1 articleShow sources
- KelpDAO suffers $290 million heist tied to Lazarus hackers — www.bleepingcomputer.com — 21.04.2026 01:23
-
Approximately 116,500 rsETH tokens ($293 million) were stolen and laundered through Tornado Cash.
First reported: 21.04.2026 01:231 source, 1 articleShow sources
- KelpDAO suffers $290 million heist tied to Lazarus hackers — www.bleepingcomputer.com — 21.04.2026 01:23
-
The attack targeted the verification layer (DVN) used by LayerZero to validate cross-chain messages for rsETH, compromising some RPC nodes and feeding falsified blockchain data while DDoS-ing healthy nodes.
First reported: 21.04.2026 01:231 source, 1 articleShow sources
- KelpDAO suffers $290 million heist tied to Lazarus hackers — www.bleepingcomputer.com — 21.04.2026 01:23
-
LayerZero preliminarily attributes the attack to Lazarus Group (TraderTraitor) based on indicators of a highly sophisticated state actor.
First reported: 21.04.2026 01:231 source, 1 articleShow sources
- KelpDAO suffers $290 million heist tied to Lazarus hackers — www.bleepingcomputer.com — 21.04.2026 01:23
-
The incident was isolated to rsETH and did not result in broader contagion across other applications or assets.
First reported: 21.04.2026 01:231 source, 1 articleShow sources
- KelpDAO suffers $290 million heist tied to Lazarus hackers — www.bleepingcomputer.com — 21.04.2026 01:23
-
The $280 million Drift Protocol theft has also been linked to Lazarus Group, indicating a pattern of North Korean targeting of DeFi protocols.
First reported: 21.04.2026 01:231 source, 1 articleShow sources
- KelpDAO suffers $290 million heist tied to Lazarus hackers — www.bleepingcomputer.com — 21.04.2026 01:23
Similar Happenings
Unauthorized transfer of 50.903 Bitcoin from Bitcoin Depot corporate wallets
Attackers breached Bitcoin Depot’s corporate IT systems on March 23, 2026, and exfiltrated approximately 50.903 Bitcoin (valued at $3.665 million) from the company’s controlled wallets before access was blocked. The intrusion targeted Bitcoin Depot’s corporate environment and did not affect customer-facing platforms, systems, or data. The company activated incident response protocols, engaged external cybersecurity experts, and notified law enforcement and regulators, including the SEC.
Targeted social engineering of Axios maintainer enables UNC1069 npm supply chain compromise via WAVESHAPER.V2 implant
A maintainer of the widely used Axios npm package was targeted in a highly tailored social engineering campaign attributed to North Korean threat actor UNC1069, resulting in the compromise of npm account credentials and the publication of two trojanized versions of Axios (1.14.1 and 0.30.4). Google Threat Intelligence Group (GTIG) attributed the attack to UNC1069 based on the use of WAVESHAPER.V2 and infrastructure overlaps with past activities. The malicious packages were available for roughly three hours and injected a plain-crypto-js dependency that installed a cross-platform RAT, enabling credential theft and downstream compromise. The campaign also targeted additional maintainers, including Pelle Wessman (Mocha framework) and Node.js core contributors, revealing a coordinated effort against high-impact maintainers. The intrusion began with reconnaissance-driven impersonation of a legitimate company founder, engagement via a cloned Slack workspace and Microsoft Teams call, and execution of a fake system update that deployed the RAT. Post-incident, the maintainer reset devices, rotated all credentials, adopted immutable releases, introduced OIDC-based publishing flows, and updated GitHub Actions workflows to mitigate future risks.
Exploiter charged for $53.3M Uranium Finance smart contract heist via code flaws and mixer laundering
A Maryland man, Jonathan Spalletta (aka "Cthulhon"), has been charged with orchestrating two smart contract heists against the Uranium Finance decentralized exchange (DEX) in April 2021, stealing approximately $53.3 million in cryptocurrency. The suspect surrendered to law enforcement and appeared in court, where prosecutors alleged he exploited code flaws in Uranium Finance's AMM contracts to drain the exchange's assets, forcing it into insolvency. Proceeds were laundered through Tornado Cash and partially spent on high-value collectibles before law enforcement recovered approximately $31 million in cryptocurrency and seized assets in February 2025. The first breach on April 8, 2021, involved manipulating the AmountWithBonus variable to issue unauthorized zero-token withdrawals, draining about $1.4 million, which he partially extorted back as a sham bug bounty. The second attack on April 28, 2021, exploited a single-character error in transaction-verification logic, allowing him to withdraw 90% of the DEX's assets across 26 liquidity pools while depositing negligible value.
Ongoing Ghost Cluster Targets npm and GitHub in Multi-Stage Credential and Crypto Wallet Theft Campaign
A coordinated campaign tracked as Ghost continues to target developers via malicious npm packages and GitHub repositories to deploy credential stealers and cryptocurrency wallet harvesters. The operation leverages social engineering and multi-stage infection chains, including fake installation wizards that request sudo/administrator privileges and deceptive npm logs simulating dependency downloads and progress indicators. Stolen data—including browser credentials, crypto wallets, SSH keys, and cloud tokens—is exfiltrated to Telegram channels and BSC smart contracts. The campaign employs a dual monetization model combining credential theft via Telegram channels with affiliate link redirections stored in a BSC smart contract. Malicious npm packages first appeared under the user 'mikilanjijo', with operations beginning as early as February 2026 and expanding to at least 11 packages such as react-performance-suite and react-query-core-utils. The final payload is a remote access trojan that downloads from Telegram channels, decrypts using externally retrieved keys, and executes locally using stolen sudo passwords to harvest credentials and deploy GhostLoader.
Supply chain compromise in Trivy scanner triggers CanisterWorm propagation across CI/CD pipelines
Supply chain compromise in Trivy scanner triggers CanisterWorm propagation across CI/CD pipelines, now expanding to encompass additional open-source ecosystems and attributed to multiple advanced threat actors. The TeamPCP threat group continues to monetize stolen supply chain secrets through partnerships with extortion groups including Lapsus$ and the Vect ransomware operation, with Wiz (Google Cloud) confirming collaboration and horizontal movement across cloud environments. Cisco’s internal development environment was breached using stolen Trivy-linked credentials via a malicious GitHub Action, resulting in the theft of over 300 repositories, including proprietary AI product code and data belonging to corporate customers such as banks, BPOs, and US government agencies. Attackers also abused stolen AWS keys across a subset of Cisco’s cloud accounts, with multiple threat actors observed participating in the breach. New developments include the compromise of the Axios NPM package, a top-10 JavaScript library with over 400 million monthly downloads, via malicious versions 0.27.5 and 0.28.0. The attack delivered a multi-platform RAT through a malicious dependency impersonating crypto-js, with operational sophistication including pre-staging, platform-specific payloads, and anti-forensic cleanup. Initial attribution suggested TeamPCP involvement, but Google attributed the incident to UNC1069, a suspected North Korean actor linked to Lazarus Group, indicating potential actor diversification or false-flag operations. The Axios compromise highlights escalating tradecraft in open-source supply chain attacks, distinct from opportunistic infections and suggesting a focus on access brokering or targeted espionage rather than indiscriminate data theft.