{"id":45090,"date":"2026-04-03T14:23:23","date_gmt":"2026-04-03T06:23:23","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/03\/drift-loses-280-million-north-korean-hackers-seize-security-council-powers\/"},"modified":"2026-04-03T14:23:23","modified_gmt":"2026-04-03T06:23:23","slug":"drift-loses-280-million-north-korean-hackers-seize-security-council-powers","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/03\/drift-loses-280-million-north-korean-hackers-seize-security-council-powers\/","title":{"rendered":"Drift loses $280 million North Korean hackers seize Security Council powers"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2026\/03\/31\/cryptocurrency.jpg\" width=\"1600\" alt=\"Drift loses $280 million North Korean hackers seize Security Council powers\"><\/p>\n<p><em>Update: Revised story and title based on new information linking the attack with North Korean hackers.<\/em><\/p>\n<p>The Drift Protocol lost at least $280 million after a threat actor took control of its Security Council administrative powers in a planned, sophisticated operation.<\/p>\n<p>Blockchain intelligence firms <a href=\"https:\/\/www.elliptic.co\/blog\/drift-protocol-exploited-for-286-million-in-suspected-dprk-linked-attack\" target=\"_blank\" rel=\"nofollow noopener\">Elliptic<\/a> and <a href=\"https:\/\/www.trmlabs.com\/resources\/blog\/north-korean-hackers-attack-drift-protocol-in-285-million-heist\" target=\"_blank\" rel=\"nofollow noopener\">TRM Labs<\/a> linked the attacks to North Korean threat actors, based on multiple on-chain indicators consistent with DPRK&nbsp;tradecraft.<\/p>\n<p>These include&nbsp;Tornado Cash usage, CarbonVote deployment timing (09:30 Pyongyang time), cross-chain bridging patterns, and rapid large-scale laundering, consistent with the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fbi-confirms-lazarus-hackers-were-behind-15b-bybit-crypto-heist\/\" target=\"_blank\" rel=\"nofollow noopener\">Bybit hack<\/a>.<\/p>\n<p>The attacker leveraged&nbsp;durable nonce accounts and pre-signed transactions to delay execution and strike with accuracy at a chosen time, the platform explained.<\/p>\n<p>Drift underlines that the hacker did not exploit any flaws in its programs or smart contracts, and no seed phrases have been compromised.<\/p>\n<p>Drift Protocol is a DeFi trading platform built on the Solana blockchain that serves as a non-custodial exchange, giving users full control of their funds as they interact with on-chain markets.<\/p>\n<p>As of late 2024, the platform <a href=\"https:\/\/www.drift.trade\/updates\/drift-in-2024-a-year-in-review\" target=\"_blank\" rel=\"nofollow noopener\">claimed<\/a> to have 200,000 traders, supporting total trading volumes of more than $55 billion and a daily peak of $13 million.<\/p>\n<p>According to <a href=\"http:\/\/x.com\/DriftProtocol\/status\/2039564437795836039\" target=\"_blank\" rel=\"nofollow noopener\">Drift&#8217;s&nbsp;report<\/a>, the heist was prepared between March 23 and 30, with the attacker setting up durable nonce accounts and obtaining&nbsp;2\/5 multisig approvals from Security Council members to meet the required threshold.<\/p>\n<p>This enabled them to pre-sign malicious transactions that weren&rsquo;t executed immediately.<\/p>\n<p>On April 1st, the attacker performed a legitimate transaction&nbsp;and immediately executed the pre-signed malicious transactions, transferring admin control to themselves within minutes.<\/p>\n<p>Having gained admin control, they introduced a malicious asset, removed withdrawal limits, and eventually drained funds.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"435\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/March\/peckshield.jpg\" width=\"900\" alt=\"Drift loses $280 million North Korean hackers seize Security Council powers\"><figcaption><em>Source: PeckShield<\/em><\/figcaption><\/figure>\n<\/div>\n<p>Drift Protocol estimates the losses at about $280 million, while blockchain tracking account <a href=\"https:\/\/x.com\/PeckShieldAlert\/status\/2039546185120387169\" target=\"_blank\" rel=\"nofollow noopener\">PeckShieldAlert<\/a> has calculated them at $285 million.<\/p>\n<p>When unusual activity on the protocol was detected, Drift issued a public warning to users, stating that started an investigation and urging them not to deposit any funds until further notice.<\/p>\n<p style=\"text-align:center\"><a href=\"https:\/\/x.com\/DriftProtocol\/status\/2039404931778535427\" target=\"_blank\" rel=\"nofollow noopener\"><img loading=\"lazy\" decoding=\"async\" height=\"240\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/March\/tweet(1).png\" width=\"554\" alt=\"Drift loses $280 million North Korean hackers seize Security Council powers\"><\/a><\/p>\n<p>As a result of the attack, borrow\/lend deposits, vault deposits, and trading funds have been affected, and all protocol functions are now essentially frozen. Drift said DSOL is unaffected, and insurance fund assets are secured.<\/p>\n<p>The platform is now working with security firms, cryptocurrency exchanges, and law enforcement authorities to trace and freeze the stolen funds.<\/p>\n<p>Drift promised to publish a detailed post-mortem report in the coming days.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/drift-loses-280-million-north-korean-hackers-seize-security-council-powers\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.bleepstatic.com\/c\/p\/picus-whitepaper.jpg\" alt=\"Drift loses $280 million North Korean hackers seize Security Council powers\"><\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Automated Pentesting Covers Only 1 of 6 Surfaces.<\/a><\/h2>\n<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.<\/p>\n<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.<\/p>\n<p>           <button><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Get Your Copy Now<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/step-finance-says-compromised-execs-devices-led-to-40m-crypto-theft\/\">Step Finance says compromised execs&#8217; devices led to $40M crypto theft<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hacker-charged-with-stealing-53-million-from-uranium-crypto-exchange\/\">Hacker charged with stealing $53 million from Uranium crypto exchange<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-darksword-ios-exploit-used-in-infostealer-attack-on-iphones\/\">New DarkSword iOS exploit used in infostealer attack on iPhones<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/bitrefill-blames-north-korean-lazarus-group-for-cyberattack\/\">Bitrefill blames North Korean Lazarus group for cyberattack<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/nordstroms-email-system-abused-to-send-crypto-scams-to-customers\/\">Nordstrom&#8217;s email system abused to send crypto scams to customers<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Update: Revised story and title based on new informatio [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-45090","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45090","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45090"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45090\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45090"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45090"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45090"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}