{"id":45146,"date":"2026-04-06T07:20:26","date_gmt":"2026-04-05T23:20:26","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/06\/285-million-drift-hack-traced-to-six-month-dprk-social-engineering-operation\/"},"modified":"2026-04-06T07:20:26","modified_gmt":"2026-04-05T23:20:26","slug":"285-million-drift-hack-traced-to-six-month-dprk-social-engineering-operation","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/06\/285-million-drift-hack-traced-to-six-month-dprk-social-engineering-operation\/","title":{"rendered":"$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation"},"content":{"rendered":"<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh2eFUAGb2m5vs6mOwArunSX0lzBpR8Ag24yQhUtaYxrcHx2V46YcocY9oei-HH89QSB-HTxXta3bLH70_n6zMCRD949ttVsKlt4WnzSZ0rl1v4Suj3A7xftqjQSEXDq_cfLCIcMuENqoFeD9zBW0qZXr1owIEQEqzSNkaKfHFsGF35-lseSZbc0MGLRRWu\/s1600\/drift-hack.jpg\" style=\"display: block; padding: 1em 0; text-align: center; clear: left; float: left;\"><img decoding=\"async\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh2eFUAGb2m5vs6mOwArunSX0lzBpR8Ag24yQhUtaYxrcHx2V46YcocY9oei-HH89QSB-HTxXta3bLH70_n6zMCRD949ttVsKlt4WnzSZ0rl1v4Suj3A7xftqjQSEXDq_cfLCIcMuENqoFeD9zBW0qZXr1owIEQEqzSNkaKfHFsGF35-lseSZbc0MGLRRWu\/s1600\/drift-hack.jpg\" alt=\"$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation\"\/><\/a><\/div>\n<p>Drift&nbsp;has <a href=\"https:\/\/x.com\/DriftProtocol\/status\/2040611161121370409\">revealed<\/a> that the April 1, 2026, attack that led to&nbsp;the <a href=\"https:\/\/thehackernews.com\/2026\/04\/drift-loses-285-million-in-durable.html\">theft of $285&nbsp;million<\/a> was the culmination of a months-long targeted and meticulously planned social engineering operation undertaken by the Democratic People&#8217;s Republic of Korea (DPRK) that began in the fall of&nbsp;2025.<\/p>\n<p>The&nbsp;Solana-based decentralized exchange described it as &#8220;an attack six months in the making,&#8221; attributing it with medium confidence to a North Korean state-sponsored hacking group&nbsp;dubbed <strong>UNC4736<\/strong>, which is also tracked under the cyptonyms AppleJeus, Citrine Sleet, Golden Chollima, and Gleaming&nbsp;Pisces.<\/p>\n<p>The&nbsp;threat actor has&nbsp;a <a href=\"https:\/\/thehackernews.com\/2022\/12\/north-korean-hackers-spread-applejeus.html\">history<\/a> of targeting the cryptocurrency sector for financial theft since at least 2018. It&#8217;s best known for&nbsp;the <a href=\"https:\/\/thehackernews.com\/2023\/04\/lazarus-xtrader-hack-impacts-critical.html\">X_TRADER\/3CX supply chain&nbsp;breach<\/a> in 2023 and&nbsp;the <a href=\"https:\/\/thehackernews.com\/2024\/12\/doj-indicts-14-north-koreans-for-88m-it.html#radiant-capital-crypto-heist-linked-to-citrine-sleet\">$53 million&nbsp;hack<\/a> of decentralized finance (DeFi)&nbsp;platform <a href=\"https:\/\/www.halborn.com\/blog\/post\/explained-the-radiant-capital-hack-october-2024\">Radiant&nbsp;Capital<\/a> in October&nbsp;2024.<\/p>\n<p>&#8220;The basis for this connection is both on-chain (fund flows used to stage and test this operation trace back to the Radiant attackers) and operational (personas deployed across this campaign have identifiable overlaps with known DPRK-linked activity),&#8221; Drift said in a Sunday&nbsp;analysis.<\/p>\n<p>In&nbsp;an assessment <a href=\"https:\/\/thehackernews.com\/2026\/02\/dprk-operatives-impersonate.html#labyrinth-chollima-segments-into-specialized-operational-units\">published<\/a> in late January 2026, cybersecurity company CrowdStrike described Golden Chollima as an offshoot of Labyrinth Chollima that&#8217;s primarily geared towards cryptocurrency theft by targeting small fintech firms in the U.S., Canada, South Korea, India, and Western&nbsp;Europe.<\/p>\n<p>&#8220;The adversary typically conducts smaller-value thefts at a more consistent operational tempo, suggesting responsibility for ensuring baseline revenue generation for the DPRK regime,&#8221; CrowdStrike said. &#8220;Despite improving trade relations with Russia, the DPRK requires additional revenue to fund ambitious military plans that include constructing new destroyers, building nuclear-powered submarines, and launching additional reconnaissance satellites.&#8221;<\/p>\n<p>In&nbsp;at least one incident observed in late 2024, UNC4736 delivered malicious Python packages through a fraudulent recruitment scheme to a European fintech company. Upon&nbsp;gaining access, the threat actor moved laterally to the victim&#8217;s cloud environment to access IAM configurations and associated cloud resources, and ultimately diverted cryptocurrency assets to adversary-controlled&nbsp;wallets.<\/p>\n<h3>How the Drift Attack Likely&nbsp;Unfolded<\/h3>\n<p>Drift, which is working with law enforcement and forensic partners to piece together the sequence of events that led to the hack, said it was the target of a &#8220;structured intelligence operation&#8221; that required months of&nbsp;planning.<\/p>\n<p>Starting in or about fall 2025, individuals posing as a quantitative trading company approached Drift contributors at a major cryptocurrency conference and international crypto conferences under the pretext of integrating the protocol. It&nbsp;has since emerged that this was a deliberate approach, where members of this trading group approached and built rapport with specific Drift contributors at various major industry conferences that took place in several countries over a period of six&nbsp;months.<\/p>\n<p>&#8220;The individuals who appeared in person were not North Korean nationals,&#8221; Drift explained. &#8220;DPRK threat actors operating at this level are known to deploy third-party intermediaries to conduct face-to-face relationship-building.&#8221;<\/p>\n<p> <a name=\"more\"><\/a> <\/p>\n<p>&#8220;They were technically fluent, had verifiable professional backgrounds, and were familiar with how Drift operated. A&nbsp;Telegram group was established upon the first meeting, and what followed were months of substantive conversations around trading strategies and potential vault integrations. These&nbsp;interactions are typical of how trading firms interact and onboard with&nbsp;Drift.&#8221;<\/p>\n<p>Then, sometime between December 2025 and January 2026, the group onboarded an Ecosystem Vault on Drift, a step that required filling out a form with strategy details. As&nbsp;part of this process, the individuals are said to have engaged with multiple contributors, asking them &#8220;detailed and informed product questions,&#8221; while depositing more than $1 million of their own&nbsp;funds.<\/p>\n<p>This, Drift said, was a calculated move designed to build a functioning operational presence inside the Drift ecosystem, with integration conversations continuing with the contributors through February and March 2026. This&nbsp;included sharing links for projects, tools, and applications that the company claimed to be developing.<\/p>\n<p>The&nbsp;possibility that these interactions with the trading group may have acted as the initial infection pathway assumed significance in the wake of the April 1 hack. But&nbsp;as Drift revealed, their Telegram chats and malicious software had been deleted right around the time the attack took&nbsp;place.<\/p>\n<p>It&#8217;s suspected that there may be two primary attack vectors&nbsp;&#8211;<\/p>\n<ul>\n<li>One contributor may have been compromised after cloning a code repository shared by the group as part of efforts to deploy a frontend for their vault.<\/li>\n<li>A second contributor was persuaded into downloading a wallet product via Apple&#8217;s TestFlight to beta test the app.<\/li>\n<\/ul>\n<p>The&nbsp;repository-based intrusion vector is assessed to have involved a malicious Microsoft Visual Studio Code (VS Code) project that weaponizes the &#8220;tasks.json&#8221; file to automatically trigger the execution of malicious code upon the project in the IDE by using the &#8220;runOn: folderOpen&#8221;&nbsp;option.<\/p>\n<p>It&#8217;s worth noting that this technique has&nbsp;been <a href=\"https:\/\/thehackernews.com\/2026\/03\/north-korean-hackers-abuse-vs-code-auto.html\">adopted<\/a> by North Korean threat actors associated with the Contagious Interview campaign since December 2025, prompting Microsoft to introduce new security controls in VS Code versions 1.109&nbsp;and 1.110&nbsp;to prevent unintended execution of tasks when opening a workspace.<\/p>\n<p>&#8220;The investigation has shown so far that the profiles used in this third-party targeted operation had fully constructed identities including employment histories, public-facing credentials, and professional networks,&#8221; Drift said. &#8220;The people Drift contributors met in person appeared to have spent months building profiles, both personal and professional, that could withstand scrutiny during a business or counterparty relationship.&#8221;<\/p>\n<h3>North Korea&#8217;s Fragmented Malware&nbsp;Ecosystem<\/h3>\n<p>The&nbsp;disclosure comes as DomainTools Investigations (DTI) disclosed that DPRK&#8217;s cyber apparatus has evolved into a &#8220;deliberately fragmented&#8221; malware ecosystem that&#8217;s mission-driven, operationally resilient, and resistant to attribution efforts. This&nbsp;shift is believed to be a response to law enforcement actions and intelligence disclosures about North Korean hacking campaigns.<\/p>\n<p>&#8220;Malware development and operations are increasingly compartmentalized, both technically and organizationally, ensuring that exposure in one mission area does not cascade across the entire program,&#8221;&nbsp;DTI <a href=\"https:\/\/dti.domaintools.com\/research\/dprk-malware-modularity-diversity-and-functional-specialization\">said<\/a>. &#8220;Crucially, this model also maximizes ambiguity. By&nbsp;separating tooling, infrastructure, and operational patterns along mission lines, the DPRK complicates attribution and slows defender decision-making.&#8221;<\/p>\n<p>To&nbsp;that end, DomainTools noted that DPRK&#8217;s espionage-oriented malware track is chiefly associated&nbsp;with <a href=\"https:\/\/thehackernews.com\/2025\/12\/kimsuky-spreads-docswap-android-malware.html\">Kimsuky<\/a>,&nbsp;while <a href=\"https:\/\/thehackernews.com\/2026\/02\/lazarus-group-uses-medusa-ransomware-in.html\">Lazarus&nbsp;Group<\/a> spearheads efforts to generate illicit revenue for the regime, transforming into a &#8220;central pillar&#8221; for sanctions evasion. The&nbsp;third track revolves around deploying ransomware and wiper malware for purposes of strategic signaling and drawing attention to its capabilities. This&nbsp;disruptive branch is associated&nbsp;with <a href=\"https:\/\/thehackernews.com\/2025\/07\/us-sanctions-north-korean-andariel.html\">Andariel<\/a>.<\/p>\n<h3>Social Engineering Behind Contagious Interview and IT Worker&nbsp;Fraud<\/h3>\n<p>Social&nbsp;engineering and deception continue to be the main catalyst for many of the intrusions that have been attributed to DPRK threat actors. This&nbsp;includes the recent supply chain compromise of the hugely popular npm&nbsp;package, <a href=\"https:\/\/thehackernews.com\/2026\/04\/unc1069-social-engineering-of-axios.html\">Axios<\/a>, as well as ongoing campaigns like Contagious Interview and IT worker&nbsp;fraud.<\/p>\n<p>Contagious Interview is the&nbsp;moniker <a href=\"https:\/\/thehackernews.com\/2026\/03\/north-korean-hackers-abuse-vs-code-auto.html\">assigned<\/a> to a long-running threat in which the adversary approaches prospective targets and tricks them into executing malicious code from a fake repository as part of an assessment. Some&nbsp;of these efforts have used weaponized Node.js&nbsp;projects hosted on GitHub&nbsp;to <a href=\"https:\/\/www.esentire.com\/blog\/north-korean-apt-malware-analysis-dev-popper-rat-and-omnistealer-everyday-im-shufflin\">deploy<\/a> a JavaScript backdoor&nbsp;called <a href=\"https:\/\/thehackernews.com\/2024\/04\/bogus-npm-packages-used-to-trick.html\">DEV#POPPER&nbsp;RAT<\/a> and an information stealer known as OmniStealer.<\/p>\n<p>On&nbsp;the other&nbsp;hand, <a href=\"https:\/\/nisos.com\/blog\/dprk-it-worker-fraud-laptop-farm\/\">DPRK IT worker&nbsp;fraud<\/a> refers&nbsp;to <a href=\"https:\/\/nisos.com\/blog\/dprk-remote-worker-fraud-interview\/\">coordinated&nbsp;efforts<\/a> by North Korean operatives&nbsp;to <a href=\"https:\/\/nisos.com\/blog\/dprk-it-worker-fraud-insider-threat\/\">land remote freelance and full-time&nbsp;roles<\/a> at Western companies using stolen identities, <a href=\"https:\/\/unit42.paloaltonetworks.com\/north-korean-synthetic-identity-creation\/\">AI-generated&nbsp;personas<\/a>, and falsified credentials. Once&nbsp;hired, they generate steady revenue and leverage the access to introduce malware and siphon proprietary and sensitive information. In&nbsp;some cases, the stolen data is used to extort money from businesses.<\/p>\n<p>The&nbsp;<a href=\"https:\/\/www.kelacyber.com\/blog\/espionage-exposed-inside-a-north-korean-remote-worker-network\/\">state-sponsored&nbsp;program<\/a> deploys thousands of technically skilled workers in countries like China and Russia, who connect to company-issued laptops hosted at laptop farms in the U.S. and&nbsp;elsewhere. The&nbsp;scheme also relies on a network of facilitators to receive work laptops, manage payroll, and handle logistics. These&nbsp;facilitators are recruited through shell companies.<\/p>\n<p>The&nbsp;process starts with recruiters who identify and screen potential candidates. Once&nbsp;accepted, the IT workers enter an onboarding phase, where facilitators assign identities and profiles, and guide them through resume updates, interview preparation, and initial job applications. The&nbsp;threat actors also work with collaborators to complete hiring requirements for full-time opportunities where strict identity verification policies are&nbsp;enforced.<\/p>\n<p>As&nbsp;noted by Chainalysis, cryptocurrency <a href=\"https:\/\/www.chainalysis.com\/blog\/ofac-targets-north-korean-it-workers-crypto-march-2026\/\">plays<\/a> a central role in funneling a majority of the wages generated by these IT worker schemes back to North Korea while evading international sanctions.<\/p>\n<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjGcq6fxbI0j9SYeKkt_aweiKFAe5rwgoDavyJdzxmsozBcGwdaU4SdltMtqnxND9su5bd3ncSkI3bwRXhOf906JSiQQGALhjYtp82YbdfQ8C-OZvhlnclz-nstc7osBhHlYopeZBCRK73DEHmn8XZistGH94zwOKYFY-XoScUzkbv65ychNOSwt2PiC72F\/s1600\/wallet.png\" style=\"display: block; padding: 1em 0; text-align: center; clear: left; float: left;\"><img decoding=\"async\" border=\"0\" data-original-height=\"850\" data-original-width=\"1254\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjGcq6fxbI0j9SYeKkt_aweiKFAe5rwgoDavyJdzxmsozBcGwdaU4SdltMtqnxND9su5bd3ncSkI3bwRXhOf906JSiQQGALhjYtp82YbdfQ8C-OZvhlnclz-nstc7osBhHlYopeZBCRK73DEHmn8XZistGH94zwOKYFY-XoScUzkbv65ychNOSwt2PiC72F\/s1600\/wallet.png\" alt=\"$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation\"\/><\/a><\/div>\n<p>&#8220;The cycle is constant and unending. North&nbsp;Korean IT workers understand that, sooner or later, they will either quit or be dismissed from any given role,&#8221; Flare and IBM&nbsp;X-Force <a href=\"https:\/\/thehackernews.com\/2026\/03\/ofac-sanctions-dprk-it-worker-network.html\">said<\/a> in a report last month. &#8220;As a result, they are continually shifting between jobs, identities, and accounts &#8211; never remaining in one position or using a single persona for very&nbsp;long.&#8221;<\/p>\n<p>New&nbsp;evidence unearthed by Flare has since revealed the campaign&#8217;s efforts to actively recruit individuals from Iran, Syria, Lebanon, and Saudi Arabia, with at least two Iranians receiving formal offer letters from U.S. employers. There&nbsp;have been more than 10 instances of Iranian nationals being recruited by the&nbsp;regime.<\/p>\n<p>Facilitators have also been found to use LinkedIn to hire separate people from Iran, Ireland, and India, who are then coached to land the jobs. These&nbsp;individuals, called callers or interviewers, get on the phone with American hiring managers, pass technical interviews, and impersonate the real or fake Western personas curated by them. When&nbsp;a caller fails an interview, the facilitator reviews the recording and provides&nbsp;feedback.<\/p>\n<p>&#8220;North Koreans are deliberately targeting U.S. defense contractors, cryptocurrency exchanges, and financial institutions,&#8221;&nbsp;Flare <a href=\"https:\/\/flare.io\/learn\/resources\/blog\/iranian-recruits-inside-the-nkitw-operation\">said<\/a>. &#8220;While the primary motivations appear to be financial, the deliberate targeting evidenced from their documents indicates that there may be other objectives at play as&nbsp;well.&#8221;<\/p>\n<p>&#8220;The DPRK is not simply deploying its own nationals under false identities. It&nbsp;is building a multinational recruitment pipeline, drawing skilled developers from Iran, Syria, Lebanon, and Saudi Arabia into an infrastructure designed to infiltrate U.S. defense contractors, cryptocurrency exchanges, financial institutions, and enterprises of every size. The&nbsp;recruits are real software engineers, paid in cryptocurrency, coached through interviews, and slotted into fabricated Western personas.&#8221;<\/p>\n<div><\/div>\n<div>Found this article interesting?  Follow us on <a href='https:\/\/news.google.com\/publications\/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ' rel='noopener' target='_blank'>Google News<\/a>, <a href='https:\/\/twitter.com\/thehackersnews' rel='noopener' target='_blank'>Twitter<\/a> and <a href='https:\/\/www.linkedin.com\/company\/thehackernews\/' rel='noopener' target='_blank'>LinkedIn<\/a> to read more exclusive content we post.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Drift&nbsp;has revealed that the April 1, 2026, attack that led to&nbsp;the theft of $285&nbsp;million was the culmination of a months-long targeted and meticulously planned social engineering operation undertaken by the Democratic People&#8217;s Republic of Korea (DPRK) that began in the fall of&nbsp;2025.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-45146","post","type-post","status-publish","format-standard","hentry","category-thehackernews"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45146","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45146"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45146\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45146"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45146"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45146"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}