This is social engineering (and a true dedication to crime) taken to another level.
Turns out Drift Protocol disclosed that its US$280 million (AU$406 million) April 1 exploit was the culmination of a six-month social engineering operation, during which North Korean-linked attackers posed as a legitimate trading firm and systematically gained access to developer environments before pre-authorising the transactions that drained the platform.
As Crypto News Australia reported, the protocol suspended operations immediately after the attack and shortly after its total value locked (TVL) fell from approximately US$550 million (AU$800 million) to under US$250 million (AU$375 million) within hours.
Related: Bitcoin ETFs Snap Outflow Streak with $1.3B Inflows in March
According to the post, the attackers began the infiltration roughly in November, building trust through appearances at crypto industry conferences, Telegram outreach, and fake protocol integration proposals.
The objective was access to developer machines, not smart contract vulnerabilities. Once inside developer environments, the group planted malicious tools that allowed them to pre-sign transactions using Solana’s durable nonce feature.
The attackers used Durable nonces to obtain two of the five multisig approvals required from Drift’s Security Council (the threshold needed to authorise administrative changes) without those approvals being immediately actionable.
When triggered, the malicious transactions disabled the protocol’s circuit breaker safety systems and handed administrative control to the attacker, who drained the JLP Delta Neutral vault, the SOL Super Staking vault, and the BTC Super Staking vault within approximately 10 to 12 minutes.
They were technically fluent, had verifiable professional backgrounds, and were familiar with how Drift operated. A Telegram group was established upon the first meeting, and what followed were months of substantive conversations around trading strategies and potential vault integrations. These interactions are typical of how trading firms interact and onboard with Drift.
Drift Protocol
Blockchain analytics firm Elliptic confirmed the attack bore “multiple indicators” consistent with DPRK tradecraft, including on-chain behaviour patterns and laundering methodologies matching prior North Korean operations.
Related: Bitcoin Treasury Sell-Off Sparks Fears of Crypto Contagion
The post Drift Protocol Hack Revealed as Months-Long Social Engineering Operation appeared first on Crypto News Australia.


