Binance Square
#driftprotocol

driftprotocol

100,797 views
145 Discussing
Crypto Sanzi
·
--
Article
💻 Lazarus: $3B+ Crypto Hack Timeline🇰🇵North Korean-linked group Lazarus Group continues to dominate crypto exploits — total damage now exceeds $3B. Key attacks: 🔸 2017 — Bithumb ($7M, phishing) 🔸 2018 — Coincheck ($625M, malware) 🔸 2020 — KuCoin ($280M, stolen credentials) 🔸 2022 — Ronin Network ($625M, fake job offer) 🔸 2022 — Horizon Bridge ($100M, private key exploit) 🔸 2023 — Atomic Wallet / Alphapo / CoinsPaid / Stake / CoinEx ($292M total) 🔸 2024 — WazirX ($235M, multisig breach) 🔸 2025 — Bybit ($1.5B, multisig) 🔸 2026 — Drift Protocol ($285M, fake collateral) From phishing to multisig exploits — tactics evolve, but the result is the same. 🤷 Crypto security isn’t improving as fast as attackers are. #LazarusGroup #NorthKoreaHackers #DriftProtocol

💻 Lazarus: $3B+ Crypto Hack Timeline

🇰🇵North Korean-linked group Lazarus Group continues to dominate crypto exploits — total damage now exceeds $3B.

Key attacks:

🔸 2017 — Bithumb ($7M, phishing)
🔸 2018 — Coincheck ($625M, malware)
🔸 2020 — KuCoin ($280M, stolen credentials)
🔸 2022 — Ronin Network ($625M, fake job offer)
🔸 2022 — Horizon Bridge ($100M, private key exploit)
🔸 2023 — Atomic Wallet / Alphapo / CoinsPaid / Stake / CoinEx ($292M total)
🔸 2024 — WazirX ($235M, multisig breach)
🔸 2025 — Bybit ($1.5B, multisig)
🔸 2026 — Drift Protocol ($285M, fake collateral)

From phishing to multisig exploits — tactics evolve, but the result is the same. 🤷

Crypto security isn’t improving as fast as attackers are.

#LazarusGroup #NorthKoreaHackers #DriftProtocol
لارا الزهراني:
مكافأة مني لك تجدها مثبت في اول منشور ❤️
$DRIFT {future}(DRIFTUSDT) DRIFT/USDT has been showing a slight decline in the recent period, but is holding near key demand zones. The price is fluctuating around 0.0292, where a balance is being formed between buyers and sellers. The most likely scenario in the short term is a movement in a narrow range with potential short impulses. #DRIFT #DriftProtocol #TradingCommunity
$DRIFT

DRIFT/USDT has been showing a slight decline in the recent period, but is holding near key demand zones. The price is fluctuating around 0.0292, where a balance is being formed between buyers and sellers. The most likely scenario in the short term is a movement in a narrow range with potential short impulses.

#DRIFT #DriftProtocol #TradingCommunity
·
--
Bearish
$DRIFT is again dumping non stop right now. After the hack news, the team shared a clear update yesterday. Following that, we saw a pump and a proper liquidation hunt. But now it has started dropping again and is already down almost 35% from yesterday’s price. There is still a chance of more downside, so for now I’m avoiding any long positions on this. The next possible zone to watch is around $0.27 below. $DRIFT {future}(DRIFTUSDT) #drift #DriftProtocol #BinanceWalletLaunchesPredictionMarkets
$DRIFT is again dumping non stop right now.

After the hack news, the team shared a clear update yesterday. Following that, we saw a pump and a proper liquidation hunt. But now it has started dropping again and is already down almost 35% from yesterday’s price.

There is still a chance of more downside, so for now I’m avoiding any long positions on this. The next possible zone to watch is around $0.27 below.

$DRIFT
#drift #DriftProtocol #BinanceWalletLaunchesPredictionMarkets
$DRIFT Major Hack Incident Drift Protocol was hacked on April 1, 2026 Around $270M–$285M worth of crypto stolen Considered one of the largest DeFi hacks of 2026 Platform temporarily suspended deposits and withdrawals 📉 Price Crash DRIFT token price dropped 40%+ after the hack Investors started panic selling Market confidence is currently very low #DRIFT #DriftProtocol {future}(DRIFTUSDT)
$DRIFT Major Hack Incident
Drift Protocol was hacked on April 1, 2026
Around $270M–$285M worth of crypto stolen
Considered one of the largest DeFi hacks of 2026
Platform temporarily suspended deposits and withdrawals

📉 Price Crash
DRIFT token price dropped 40%+ after the hack
Investors started panic selling
Market confidence is currently very low
#DRIFT #DriftProtocol
·
--
Bullish
🚨 JUST IN: SOLANA STEPS UP SECURITY GAME The Solana Foundation just rolled out STRIDE & SIRN — a major leap toward a safer ecosystem. 🔐 24/7 threat monitoring 🧠 Formal verification for top protocols ⚡ Real-time crisis response This isn’t just an upgrade — it’s a signal that Solana is getting serious about long-term security and institutional-grade reliability. Bullish on stronger infrastructure = bullish on the future of $SOL 👀🔥 $SOL {future}(SOLUSDT) #DriftProtocol #solana
🚨 JUST IN: SOLANA STEPS UP SECURITY GAME
The Solana Foundation just rolled out STRIDE & SIRN — a major leap toward a safer ecosystem.
🔐 24/7 threat monitoring
🧠 Formal verification for top protocols
⚡ Real-time crisis response
This isn’t just an upgrade — it’s a signal that Solana is getting serious about long-term security and institutional-grade reliability.
Bullish on stronger infrastructure = bullish on the future of $SOL 👀🔥
$SOL
#DriftProtocol #solana
Article
They Shook Hands at Conferences, Deposited $1 Million, Then Stole $285 Million Inside the Drift HackThe story of how North Korean state hackers drained $285 million from Drift Protocol on April Fool's Day 2026 doesn't begin with a line of malicious code. It begins at a crypto conference sometime in the fall of 2025, with a handshake. That's the detail that makes this the most unsettling DeFi hack of the year and possibly the most sophisticated social engineering operation in crypto history. The attackers, attributed with medium-high confidence to a North Korean state group known as UNC4736 (also called AppleJeus or Citrine Sleet), didn't brute-force their way in. They spent six months building genuine human relationships inside Drift's team. The playbook was meticulous. Posing as a legitimate quantitative trading firm, they approached Drift contributors at multiple major industry conferences in different countries throughout late 2025 and early 2026. They were technically fluent. They asked smart questions about trading strategies and protocol architecture. They deposited over $1 million of their own money to establish credibility. A Telegram group was set up, meetings happened in person, and over months of substantive conversations, they became from Drift's perspective trusted working partners. Then came the quiet infection. Investigators identified two likely attack vectors: one contributor may have cloned a malicious code repository the group shared, disguised as a frontend tool for their vault. Another was reportedly tricked into downloading a wallet app through Apple's TestFlight a tool that, ironically, was also used to remove Bitchat from China this week. Simply opening a file in a VS Code folder was enough to silently execute code and give the attackers remote access. No warning. No prompt. Just a compromised device. On April 1, using pre-signed multisig transactions that had been sitting dormant for over a week, the attackers executed the drain in roughly 12 minutes. $285 million gone. Most of it was bridged to Ethereum within hours. The DRIFT token collapsed over 40%. The Telegram group and all associated malware were immediately scrubbed. The "trading firm" vanished. Security experts are blunt about what this means: DeFi's reliance on multisig governance, long considered a gold standard of security, may not be enough when the adversary is willing to spend six months and a million dollars becoming your colleague first. "Crypto teams are now facing adversaries that operate more like intelligence units than hackers," noted one blockchain security firm. It's an uncomfortable reality but one the industry needs to reckon with. #DriftProtocol #northkorea #DeFiHack #CryptoSecurity

They Shook Hands at Conferences, Deposited $1 Million, Then Stole $285 Million Inside the Drift Hack

The story of how North Korean state hackers drained $285 million from Drift Protocol on April Fool's Day 2026 doesn't begin with a line of malicious code. It begins at a crypto conference sometime in the fall of 2025, with a handshake.
That's the detail that makes this the most unsettling DeFi hack of the year and possibly the most sophisticated social engineering operation in crypto history. The attackers, attributed with medium-high confidence to a North Korean state group known as UNC4736 (also called AppleJeus or Citrine Sleet), didn't brute-force their way in. They spent six months building genuine human relationships inside Drift's team.
The playbook was meticulous. Posing as a legitimate quantitative trading firm, they approached Drift contributors at multiple major industry conferences in different countries throughout late 2025 and early 2026. They were technically fluent. They asked smart questions about trading strategies and protocol architecture. They deposited over $1 million of their own money to establish credibility. A Telegram group was set up, meetings happened in person, and over months of substantive conversations, they became from Drift's perspective trusted working partners.
Then came the quiet infection. Investigators identified two likely attack vectors: one contributor may have cloned a malicious code repository the group shared, disguised as a frontend tool for their vault. Another was reportedly tricked into downloading a wallet app through Apple's TestFlight a tool that, ironically, was also used to remove Bitchat from China this week. Simply opening a file in a VS Code folder was enough to silently execute code and give the attackers remote access. No warning. No prompt. Just a compromised device.
On April 1, using pre-signed multisig transactions that had been sitting dormant for over a week, the attackers executed the drain in roughly 12 minutes. $285 million gone. Most of it was bridged to Ethereum within hours. The DRIFT token collapsed over 40%. The Telegram group and all associated malware were immediately scrubbed. The "trading firm" vanished.
Security experts are blunt about what this means: DeFi's reliance on multisig governance, long considered a gold standard of security, may not be enough when the adversary is willing to spend six months and a million dollars becoming your colleague first. "Crypto teams are now facing adversaries that operate more like intelligence units than hackers," noted one blockchain security firm. It's an uncomfortable reality but one the industry needs to reckon with.
#DriftProtocol #northkorea #DeFiHack #CryptoSecurity
Solana Security 🔒 SOLANA NE $270M HACK KE BAAD SECURITY UPGRADE KIYA! Drift Protocol par $270 Million ka hack hua — investigators ne North Korean hackers ko link kiya! Is ke baad Solana Foundation ne emergency security overhaul announce kiya: (CoinDesk) 🛡️ New measures: 24/7 threat monitoring — $10M+ TVL protocols ke liye Dedicated incident response network launch Dedicated team of security firms ⚡ Even after the hack, SOL is holding at $79 — strong demand! #solana #DriftProtocol #Hacked #CryptoSecurity #BinanceSquare $SOL {spot}(SOLUSDT)
Solana Security
🔒 SOLANA NE $270M HACK KE BAAD SECURITY UPGRADE KIYA!
Drift Protocol par $270 Million ka hack hua — investigators ne North Korean hackers ko link kiya! Is ke baad Solana Foundation ne emergency security overhaul announce kiya: (CoinDesk)
🛡️ New measures:
24/7 threat monitoring — $10M+ TVL protocols ke liye
Dedicated incident response network launch
Dedicated team of security firms
⚡ Even after the hack, SOL is holding at $79 — strong demand!
#solana #DriftProtocol #Hacked #CryptoSecurity #BinanceSquare $SOL
#DriftInvestigationLinksRecentAttackToNorthKoreanHackers 🚨 Drift Investigation: North Korean Hackers Behind Recent Attack? Fresh findings from Drift’s internal investigation are raising serious concerns across the crypto space. 🔍 Early evidence suggests links between the recent exploit and sophisticated hacking groups believed to be tied to North Korea — the same actors often associated with high-profile DeFi breaches. • Advanced social engineering • Smart contract vulnerabilities exploitation • Laundering funds through complex on-chain routes ⚠️ This isn’t just another hack — it’s part of a larger, coordinated effort targeting crypto infrastructure globally. 📉 Security fears could shake short-term confidence, especially in DeFi platforms, while pushing projects to double down on audits and protection layers. 🧠 Security is no longer optional in crypto — it’s survival. Stay sharp. Stay secure. 🔐 #DriftProtocol #CryptoSecurity #LazarusGroup #BinanceSquare #cyberattacks
#DriftInvestigationLinksRecentAttackToNorthKoreanHackers

🚨 Drift Investigation: North Korean Hackers Behind Recent Attack?

Fresh findings from Drift’s internal investigation are raising serious concerns across the crypto space.

🔍 Early evidence suggests links between the recent exploit and sophisticated hacking groups believed to be tied to North Korea — the same actors often associated with high-profile DeFi breaches.

• Advanced social engineering
• Smart contract vulnerabilities exploitation
• Laundering funds through complex on-chain routes

⚠️ This isn’t just another hack — it’s part of a larger, coordinated effort targeting crypto infrastructure globally.

📉 Security fears could shake short-term confidence, especially in DeFi platforms, while pushing projects to double down on audits and protection layers.

🧠 Security is no longer optional in crypto — it’s survival.

Stay sharp. Stay secure. 🔐

#DriftProtocol #CryptoSecurity #LazarusGroup #BinanceSquare #cyberattacks
## 🚀 Breaking Down the $285M Drift Protocol Hack: The North Korean Connection 🇰🇵 The crypto world is buzzing with the latest investigation into the **$285 million Drift Protocol exploit**. Here’s what you need to know about the North Korean (DPRK) links and what it means for DeFi security. ### 🔍 The "Sleeper" Operation Security experts (including TRM Labs and Elliptic) have identified the fingerprints of state-sponsored hackers. This wasn't a quick smash-and-grab; it was a highly sophisticated **"sleeper" operation** that started months ago. * **Social Engineering:** Attackers reportedly posed as institutional traders for months to build trust with the core team. * **The "Durable Nonce" Exploit:** By tricking the Security Council into pre-signing transactions, they bypassed standard safeguards. * **Oracle Manipulation:** They used a fake asset (CVT) as collateral to drain **USDC** from the protocol. ### 💰 Where is the Money Now? Most of the stolen funds (~$232M) have already been bridged from **Solana to Ethereum**. We are now seeing the classic DPRK playbook: moving assets through privacy mixers to mask the trail. ### 💡 The Lesson for DeFi This attack proves that even "audited" protocols are vulnerable to long-term social engineering. As the **CLARITY Act** moves through the Senate, expect even tighter regulations on how DeFi protocols manage their "administrative keys." ### 📉 Market Reaction The market remains on edge, with $BTC hovering around **$68,974**. While recovery efforts are underway, the scale of this hack is a stark reminder to stay vigilant with your self-custody and protocol choices. **What do you think?** Should stablecoin issuers have the power to freeze funds faster, or does that go against the decentralization of crypto? Let’s discuss below! 👇 #BinanceSquare #DriftProtocol #CryptoSecurity #DeFi #Solana #BlockchainAnalysis
## 🚀 Breaking Down the $285M Drift Protocol Hack: The North Korean Connection 🇰🇵
The crypto world is buzzing with the latest investigation into the **$285 million Drift Protocol exploit**. Here’s what you need to know about the North Korean (DPRK) links and what it means for DeFi security.
### 🔍 The "Sleeper" Operation
Security experts (including TRM Labs and Elliptic) have identified the fingerprints of state-sponsored hackers. This wasn't a quick smash-and-grab; it was a highly sophisticated **"sleeper" operation** that started months ago.
* **Social Engineering:** Attackers reportedly posed as institutional traders for months to build trust with the core team.
* **The "Durable Nonce" Exploit:** By tricking the Security Council into pre-signing transactions, they bypassed standard safeguards.
* **Oracle Manipulation:** They used a fake asset (CVT) as collateral to drain **USDC** from the protocol.
### 💰 Where is the Money Now?
Most of the stolen funds (~$232M) have already been bridged from **Solana to Ethereum**. We are now seeing the classic DPRK playbook: moving assets through privacy mixers to mask the trail.
### 💡 The Lesson for DeFi
This attack proves that even "audited" protocols are vulnerable to long-term social engineering. As the **CLARITY Act** moves through the Senate, expect even tighter regulations on how DeFi protocols manage their "administrative keys."
### 📉 Market Reaction
The market remains on edge, with $BTC hovering around **$68,974**. While recovery efforts are underway, the scale of this hack is a stark reminder to stay vigilant with your self-custody and protocol choices.
**What do you think?** Should stablecoin issuers have the power to freeze funds faster, or does that go against the decentralization of crypto? Let’s discuss below! 👇
#BinanceSquare #DriftProtocol #CryptoSecurity #DeFi #Solana #BlockchainAnalysis
⚠️ Security Alert: Learning from the $285 Million Drift Exploit ⚠️ There is a lot of talk on Binance Square today about the recent $285 million exploit of the Drift Protocol. Staying safe is the #1 rule in crypto, so let’s look at what happened and how to protect yourself. What happened? It wasn't a mistake in the computer code. Instead, experts believe it was a "social engineering" attack. This means hackers tricked people into giving up access—possibly linked to organized professional hacking groups. Key Lessons for You: • "Negative Knowledge" is Power: Sometimes knowing what NOT to do is more important than knowing how to trade. Don't click unknown links or trust "official" messages without double-checking. • Hardware Security: If you hold high-value accounts, use hardware security keys (like YubiKeys) or cold storage. Standard passwords are often not enough anymore. • Stay Alert: Security is a 24/7 job. Always verify the source before moving funds or connecting your wallet. Let’s keep our community safe. Have you updated your security settings lately? 🛡️ #CryptoSecurity #StaySafe #DriftProtocol #BlockchainSecurity #TradingSafety
⚠️ Security Alert: Learning from the $285 Million Drift Exploit ⚠️

There is a lot of talk on Binance Square today about the recent $285 million exploit of the Drift Protocol. Staying safe is the #1 rule in crypto, so let’s look at what happened and how to protect yourself.

What happened?

It wasn't a mistake in the computer code. Instead, experts believe it was a "social engineering" attack. This means hackers tricked people into giving up access—possibly linked to organized professional hacking groups.
Key Lessons for You:

• "Negative Knowledge" is Power: Sometimes knowing what NOT to do is more important than knowing how to trade. Don't click unknown links or trust "official" messages without double-checking.

• Hardware Security: If you hold high-value accounts, use hardware security keys (like YubiKeys) or cold storage. Standard passwords are often not enough anymore.

• Stay Alert: Security is a 24/7 job. Always verify the source before moving funds or connecting your wallet.

Let’s keep our community safe. Have you updated your security settings lately? 🛡️

#CryptoSecurity #StaySafe #DriftProtocol #BlockchainSecurity #TradingSafety
·
--
Bearish
#solana ($SOL {future}(SOLUSDT) The Solana Foundation (SOL) has launched two new initiatives to strengthen the security of decentralized finance (#DeFi! ): #STRIDE and #sirn . - Stride*: a security program that evaluates and monitors the security level of projects hosted on Solana, with the ability to intervene in case of an incident. The assessment is based on eight criteria, including program security, governance and access control, oracle risk and dependency, among others. - *SIRN*: a network of professional security companies created to provide immediate response to security incidents. These initiatives were launched after a major cyber attack on #DriftProtocol , a derivatives trading protocol based on Solana, which suffered losses of approximately US$ 280 million ¹.
#solana ($SOL
The Solana Foundation (SOL) has launched two new initiatives to strengthen the security of decentralized finance (#DeFi! ): #STRIDE and #sirn .

- Stride*: a security program that evaluates and monitors the security level of projects hosted on Solana, with the ability to intervene in case of an incident. The assessment is based on eight criteria, including program security, governance and access control, oracle risk and dependency, among others.
- *SIRN*: a network of professional security companies created to provide immediate response to security incidents.

These initiatives were launched after a major cyber attack on #DriftProtocol , a derivatives trading protocol based on Solana, which suffered losses of approximately US$ 280 million ¹.
DRIFT $DRIFT: TRUST WAS THE TARGET ⚠️ Attackers did not break the code; they broke the human layer, posing as a fund and earning trust for months before weaponizing a “harmless” signature to seize admin control and drain roughly $270M from the vault. Institutional desks should treat this as a liquidity shock and security reset for DeFi risk, with capital likely favoring venues and assets that carry stronger operational trust. Follow the money. Watch whale rotations out of vulnerable DeFi beta, defend liquidity on top-tier exchange majors, and wait for panic sells to exhaust before chasing any rebound. Not financial advice. Manage your risk. #DriftProtocol #CryptoHack #DeFiRisk #Solana #Crypto ⚡ {alpha}(CT_501DriFtupJYLTosbwoN8koMbEYSx54aFAVLddWsbksjwg7)
DRIFT $DRIFT: TRUST WAS THE TARGET ⚠️

Attackers did not break the code; they broke the human layer, posing as a fund and earning trust for months before weaponizing a “harmless” signature to seize admin control and drain roughly $270M from the vault. Institutional desks should treat this as a liquidity shock and security reset for DeFi risk, with capital likely favoring venues and assets that carry stronger operational trust.

Follow the money. Watch whale rotations out of vulnerable DeFi beta, defend liquidity on top-tier exchange majors, and wait for panic sells to exhaust before chasing any rebound.

Not financial advice. Manage your risk.

#DriftProtocol #CryptoHack #DeFiRisk #Solana #Crypto

DPRK TIE-IN EXPOSES $DRIFT WEAK LINK ⚡ Recent reporting links the Drift Protocol incident to North Korean hackers, underscoring how social engineering and human error can still breach even watched DeFi systems. Institutional desks should tighten access controls, raise counterparty scrutiny, and expect sharper demand for security due diligence across the sector. Not financial advice. Manage your risk. #DriftProtocol #CryptoNews #DeFi #CyberSecurity #Blockchain ✦ {alpha}(CT_501DriFtupJYLTosbwoN8koMbEYSx54aFAVLddWsbksjwg7)
DPRK TIE-IN EXPOSES $DRIFT WEAK LINK ⚡

Recent reporting links the Drift Protocol incident to North Korean hackers, underscoring how social engineering and human error can still breach even watched DeFi systems. Institutional desks should tighten access controls, raise counterparty scrutiny, and expect sharper demand for security due diligence across the sector.

Not financial advice. Manage your risk.

#DriftProtocol #CryptoNews #DeFi #CyberSecurity #Blockchain

FXRonin - F0 SQUARE:
Great to find your profile. I just added you. I will be sure to interact with your future posts every day. Hope to grow together. Sorry for the bother.
·
--
#DriftInvestigationLinksRecentAttackToNorthKoreanHackers Based on investigation results released around April 5, 2026, the Drift Protocol ($DRIFT) hack involved a $285 million theft linked to North Korean hackers. Key Details of the Investigation: Long-Term Infiltration: The attack was not a sudden exploit but a six-month, organized operation beginning in the fall of 2025. Social Engineering: Attackers posed as a quantitative trading firm and engaged with Drift team members at international conferences. Methodology: The hackers compromised devices via malicious code repository links and the TestFlight application. Final Attack: On April 1, 2026, the attackers utilized these compromises to drain vaults, resulting in $285 million stolen within 12 minutes. Attribution: The investigation indicates the attack was carried out by the same North Korean-related group responsible for the 2024 Radiant Capital theft. #DRIFT #DriftProtocol
#DriftInvestigationLinksRecentAttackToNorthKoreanHackers

Based on investigation results released around April 5, 2026, the Drift Protocol ($DRIFT) hack involved a $285 million theft linked to North Korean hackers.

Key Details of the Investigation:
Long-Term Infiltration: The attack was not a sudden exploit but a six-month, organized operation beginning in the fall of 2025.
Social Engineering: Attackers posed as a quantitative trading firm and engaged with Drift team members at international conferences.
Methodology: The hackers compromised devices via malicious code repository links and the TestFlight application.
Final Attack: On April 1, 2026, the attackers utilized these compromises to drain vaults, resulting in $285 million stolen within 12 minutes.
Attribution: The investigation indicates the attack was carried out by the same North Korean-related group responsible for the 2024 Radiant Capital theft.
#DRIFT #DriftProtocol
·
--
Article
Drift Investigation Links Recent Attack to North Korean Hackers: The $285M Heist Explained#DriftInvestigationLinksRecentAttackToNorthKoreanHackers In a chilling revelation for the Decentralized Finance (DeFi) sector, Drift Protocol, the leading perpetual futures DEX on Solana, has released its final forensic report regarding the catastrophic breach that occurred on April 1, 2026. The investigation, conducted in collaboration with blockchain security titans TRM Labs and Chainalysis, points with "high confidence" toward state-sponsored cyber-adversaries from North Korea (DPRK). The Anatomy of the Exploit: A 6-Month "Long Game" The theft of $285 million was not a simple code exploit; it was the culmination of a sophisticated, multi-stage intelligence operation that began in late 2025. * Corporate Infiltration: The attackers posed as a legitimate high-frequency trading firm, engaging with Drift’s core contributors at global Web3 conferences to build rapport. * Social Engineering & Multisig Compromise: By building trust over months, the hackers tricked members of the "Protocol Security Council" into interacting with a malicious "administrative dashboard." This allowed the attackers to harvest pre-signed authorizations for critical administrative functions. * Oracle Manipulation: The hackers deployed a "ghost token" called CarbonVote (CVT). Through wash trading, they artificially inflated its market cap, deceiving the protocol’s oracles into recognizing it as high-value collateral. This allowed them to borrow and drain real assets, including USDC and JLP, against the worthless CVT. The North Korean Connection Security analysts identified several hallmarks of Lazarus Group (or its sub-units like UNC4736) in the attack’s execution: * On-Chain Fingerprints: Wallet clusters used to test the exploit were directly linked to funds from the 2024 Radiant Capital hack and the 2025 cross-chain bridge exploits attributed to the DPRK. * Automated Precision: The final drain of 5 separate liquidity vaults occurred in under 10 seconds, suggesting the use of a custom-built automated exploit kit characteristic of state-sponsored actors. * The Laundering Path: Within minutes of the hack, the funds were funneled through sophisticated cross-chain bridges into Ethereum, where they were fragmented into thousands of wallets to evade centralized exchange (CEX) blacklists. Impact on Solana and the DeFi Ecosystem This incident marks the largest DeFi hack of 2026 and the second-largest in Solana's history. The DRIFT token plummeted over 40% following the news. Beyond the financial loss, the attack highlights a terrifying shift in tactics: hackers are no longer just looking for bugs in the code; they are hunting the human layer of governance. Key Takeaways for the Community * Beyond the Audit: A "Triple-A" code audit cannot protect a protocol if the humans holding the keys are compromised via social engineering. * Collateral Risk: Protocols must implement stricter "circuit breakers" for new or low-liquidity assets being used as collateral. * Real-World Vigilance: The transition from digital phishing to in-person social engineering at conferences marks a dangerous new era for crypto founders. Drift Protocol has announced a bounty of $20 million for the return of the funds, though history suggests that once funds enter the DPRK's laundering pipeline, recovery becomes a monumental challenge. #DriftProtocol #DeFiSecurity #BinanceSquare #CryptoNews $BNB {spot}(BNBUSDT) $BTC {spot}(BTCUSDT) $USDC {spot}(USDCUSDT)

Drift Investigation Links Recent Attack to North Korean Hackers: The $285M Heist Explained

#DriftInvestigationLinksRecentAttackToNorthKoreanHackers
In a chilling revelation for the Decentralized Finance (DeFi) sector, Drift Protocol, the leading perpetual futures DEX on Solana, has released its final forensic report regarding the catastrophic breach that occurred on April 1, 2026. The investigation, conducted in collaboration with blockchain security titans TRM Labs and Chainalysis, points with "high confidence" toward state-sponsored cyber-adversaries from North Korea (DPRK).
The Anatomy of the Exploit: A 6-Month "Long Game"
The theft of $285 million was not a simple code exploit; it was the culmination of a sophisticated, multi-stage intelligence operation that began in late 2025.
* Corporate Infiltration: The attackers posed as a legitimate high-frequency trading firm, engaging with Drift’s core contributors at global Web3 conferences to build rapport.
* Social Engineering & Multisig Compromise: By building trust over months, the hackers tricked members of the "Protocol Security Council" into interacting with a malicious "administrative dashboard." This allowed the attackers to harvest pre-signed authorizations for critical administrative functions.
* Oracle Manipulation: The hackers deployed a "ghost token" called CarbonVote (CVT). Through wash trading, they artificially inflated its market cap, deceiving the protocol’s oracles into recognizing it as high-value collateral. This allowed them to borrow and drain real assets, including USDC and JLP, against the worthless CVT.
The North Korean Connection
Security analysts identified several hallmarks of Lazarus Group (or its sub-units like UNC4736) in the attack’s execution:
* On-Chain Fingerprints: Wallet clusters used to test the exploit were directly linked to funds from the 2024 Radiant Capital hack and the 2025 cross-chain bridge exploits attributed to the DPRK.
* Automated Precision: The final drain of 5 separate liquidity vaults occurred in under 10 seconds, suggesting the use of a custom-built automated exploit kit characteristic of state-sponsored actors.
* The Laundering Path: Within minutes of the hack, the funds were funneled through sophisticated cross-chain bridges into Ethereum, where they were fragmented into thousands of wallets to evade centralized exchange (CEX) blacklists.
Impact on Solana and the DeFi Ecosystem
This incident marks the largest DeFi hack of 2026 and the second-largest in Solana's history. The DRIFT token plummeted over 40% following the news. Beyond the financial loss, the attack highlights a terrifying shift in tactics: hackers are no longer just looking for bugs in the code; they are hunting the human layer of governance.
Key Takeaways for the Community
* Beyond the Audit: A "Triple-A" code audit cannot protect a protocol if the humans holding the keys are compromised via social engineering.
* Collateral Risk: Protocols must implement stricter "circuit breakers" for new or low-liquidity assets being used as collateral.
* Real-World Vigilance: The transition from digital phishing to in-person social engineering at conferences marks a dangerous new era for crypto founders.
Drift Protocol has announced a bounty of $20 million for the return of the funds, though history suggests that once funds enter the DPRK's laundering pipeline, recovery becomes a monumental challenge.
#DriftProtocol #DeFiSecurity #BinanceSquare #CryptoNews
$BNB
$BTC
$USDC
🚨 Security Update: North Korean Hackers and the Drift Attack 🚨 New details have come out about the recent hack on Drift Protocol. Experts have found that the same group of hackers from North Korea (known as UNC4736) is likely behind it. This is the same group that attacked Radiant Capital back in 2024. Here is what happened: • The Loss: Platforms like Project 0 are starting to work again, but they lost about $1.9 million in the process. • How it affects users: People who lent their money are seeing small "write-downs" (meaning a small part of their balance is gone to cover the loss). This is about 1% for stablecoins like USDC or USDT and up to 6.6% for other tokens. • The Main Lesson: Security is still the biggest challenge for crypto. Even big platforms can face risks. 💡 Safety Tip: Never keep all your money in one place! It is always safer to spread your crypto across different apps and wallets. Stay safe out there! #DeFi #Security #DriftProtocol #CryptoSafety #BinanceSquare
🚨 Security Update: North Korean Hackers and the Drift Attack 🚨

New details have come out about the recent hack on Drift Protocol. Experts have found that the same group of hackers from North Korea (known as UNC4736) is likely behind it. This is the same group that attacked Radiant Capital back in 2024.

Here is what happened:

• The Loss: Platforms like Project 0 are starting to work again, but they lost about $1.9 million in the process.

• How it affects users: People who lent their money are seeing small "write-downs" (meaning a small part of their balance is gone to cover the loss). This is about 1% for stablecoins like USDC or USDT and up to 6.6% for other tokens.

• The Main Lesson: Security is still the biggest challenge for crypto. Even big platforms can face risks.

💡 Safety Tip:
Never keep all your money in one place! It is always safer to spread your crypto across different apps and wallets.

Stay safe out there!

#DeFi #Security #DriftProtocol #CryptoSafety #BinanceSquare
The most serious Defi hacking incident of 2026 has occurred‼️‼️ Drift Protocol announced on Twitter that the platform was hacked for 280 million USD, and this entire process was not due to a vulnerability in the project team or a contract error, but rather a six-month-long premeditation. Token $DRIFT dropped from a high of 2.4 USD all the way down to a low of 0.03 USD. After the hack, investors FTX/Alameda sold 6.94 million DRIFT for about 320,000 USD through Wintermute, creating a direct chain reaction... Let's review what happened: 1️⃣ The hacker disguised as a quantitative trading company in 2025 contacted the Drift team during a meeting and deposited 1 million USD at the end of 2025. They held multiple working meetings and offline meetings with the project team to build trust, conducting long-term social engineering infiltration. 2️⃣ The hacker began sharing code repositories and the TestFlight App, using malicious links in the code repository + TestFlight application to invade devices and obtain admin private keys, executing transfers and erasing traces thereafter. 3️⃣ On March 11, the hacker withdrew about 10 ETH from Tornado Cash as initial funds, signed a completely fictitious CarbonVote Token, and minted about 750 million tokens, injecting only about 500 USD in liquidity into Raydium. They created false price history through wash trading, leading Drift's oracle to mistakenly recognize CVT as valid collateral. 4️⃣ On March 23, multiple durable nonce accounts were created, two of which were related to members of the Drift Security Council's multi-signature. These pre-signed transactions appeared to be routine operations but concealed key authorizations that allowed subsequent delayed execution. 5️⃣ On March 25, Drift executed the planned migration of the Security Council multi-signature. The attacker quickly adapted to obtain enough signatures again under the new configuration, and the new multi-signature had no time lock set (timelock = 0 became the biggest loophole), allowing the attacker's main wallet to perform small tests. 6️⃣ On April 1, in less than 12 to 20 minutes, the attacker triggered 31 attacks using durable nonce pre-signed transactions, instantly obtaining admin rights of the Security Council, changing the admin key to lock the team out, and quickly exchanging funds through the Jupiter aggregator for USDC, then transferring large amounts of ETH to Ethereum via Wormhole / CCTP and other cross-chain transfers. ⭐️ This attack was not caused by a code bug, but rather by human + governance failure, social engineering + misleading pre-signing + zero-delay multi-signature, a deadly combination for this attack. #DriftProtocol
The most serious Defi hacking incident of 2026 has occurred‼️‼️

Drift Protocol announced on Twitter that the platform was hacked for 280 million USD, and this entire process was not due to a vulnerability in the project team or a contract error, but rather a six-month-long premeditation.

Token $DRIFT dropped from a high of 2.4 USD all the way down to a low of 0.03 USD. After the hack, investors FTX/Alameda sold 6.94 million DRIFT for about 320,000 USD through Wintermute, creating a direct chain reaction...

Let's review what happened:

1️⃣ The hacker disguised as a quantitative trading company in 2025 contacted the Drift team during a meeting and deposited 1 million USD at the end of 2025. They held multiple working meetings and offline meetings with the project team to build trust, conducting long-term social engineering infiltration.

2️⃣ The hacker began sharing code repositories and the TestFlight App, using malicious links in the code repository + TestFlight application to invade devices and obtain admin private keys, executing transfers and erasing traces thereafter.

3️⃣ On March 11, the hacker withdrew about 10 ETH from Tornado Cash as initial funds, signed a completely fictitious CarbonVote Token, and minted about 750 million tokens, injecting only about 500 USD in liquidity into Raydium. They created false price history through wash trading, leading Drift's oracle to mistakenly recognize CVT as valid collateral.

4️⃣ On March 23, multiple durable nonce accounts were created, two of which were related to members of the Drift Security Council's multi-signature. These pre-signed transactions appeared to be routine operations but concealed key authorizations that allowed subsequent delayed execution.

5️⃣ On March 25, Drift executed the planned migration of the Security Council multi-signature. The attacker quickly adapted to obtain enough signatures again under the new configuration, and the new multi-signature had no time lock set (timelock = 0 became the biggest loophole), allowing the attacker's main wallet to perform small tests.

6️⃣ On April 1, in less than 12 to 20 minutes, the attacker triggered 31 attacks using durable nonce pre-signed transactions, instantly obtaining admin rights of the Security Council, changing the admin key to lock the team out, and quickly exchanging funds through the Jupiter aggregator for USDC, then transferring large amounts of ETH to Ethereum via Wormhole / CCTP and other cross-chain transfers.

⭐️ This attack was not caused by a code bug, but rather by human + governance failure, social engineering + misleading pre-signing + zero-delay multi-signature, a deadly combination for this attack.

#DriftProtocol
Login to explore more contents
Join global crypto users on Binance Square
⚡️ Get latest and useful information about crypto.
💬 Trusted by the world’s largest crypto exchange.
👍 Discover real insights from verified creators.
Email / Phone number