{"id":45154,"date":"2026-04-07T02:19:56","date_gmt":"2026-04-06T18:19:56","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/07\/north-korean-hackers-pose-as-trading-firm-to-steal-285m-from-drift\/"},"modified":"2026-04-07T02:19:56","modified_gmt":"2026-04-06T18:19:56","slug":"north-korean-hackers-pose-as-trading-firm-to-steal-285m-from-drift","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/07\/north-korean-hackers-pose-as-trading-firm-to-steal-285m-from-drift\/","title":{"rendered":"North Korean Hackers Pose as Trading Firm to Steal $285M from Drift"},"content":{"rendered":"\n<p>Drift Protocol reveals that a <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/investigators-link-bybit-hack-north-korea-lazarus-group\/\" data-type=\"post\" data-id=\"126332\">North Korean state-linked group<\/a> spent six months posing as a trading firm to execute a $285 million hack. Read about how the attackers managed to compromise the protocol without raising suspicion.<\/p>\n<p>When Drift Protocol was drained of $285 million (approximately \u00a3225 million) on 1 April 2026, many assumed it was a sudden technical glitch. However, new details from the firm show the attack was actually a meticulously planned operation that began with a simple handshake around six months back.<\/p>\n<h3><strong>Building a Six-Month Fake Friendship<\/strong><\/h3>\n<p>The breach prep, reportedly, started in late 2025 when a group of individuals approached Drift staff at a \u201cmajor crypto conference,\u201d presenting themselves as a professional &#8220;quantitative trading firm&#8221; looking to work together, Drift&#8217;s investigation revealed. These were not anonymous hackers hiding behind screens; they met Drift team members face-to-face at conferences in several different countries.<\/p>\n<p>To build trust, the group went so far as to deposit $1 million of their own money into a Drift Ecosystem Vault between December 2025 and January 2026. This level of effort is rare, but it allowed the attackers to be seen as legitimate business partners rather than a threat.<\/p>\n<h3><strong>The Infiltration Methods<\/strong><\/h3>\n<p>While maintaining this professional relationship, the group quietly used <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/tag\/social-engineering\/?amp\" data-type=\"link\" data-id=\"https:\/\/hackread.com\/tag\/social-engineering\/?amp\">social engineering<\/a> to trick staff into compromising their own security. As per Drift\u2019s <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/x.com\/DriftProtocol\/status\/2040611161121370409\" data-type=\"link\" data-id=\"https:\/\/x.com\/DriftProtocol\/status\/2040611161121370409\">official update<\/a> on X.com, the hackers gained access likely through three specific attack vectors:<\/p>\n<p>First, one staff member was persuaded to download a mobile app via <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/hackers-facebook-cyber-espionage-attacks-meta\/\">TestFlight<\/a>, which is Apple\u2019s platform for testing new software, under the impression it was a new digital wallet product. In another instance, a contributor was induced to clone a malicious code repository (a collection of files) presented as a tool for building a website for the group\u2019s vault. Or, the hackers exploited a known vulnerability within <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/malicious-vs-code-extensions-trojan-fake-png-files\/\" data-type=\"link\" data-id=\"https:\/\/hackread.com\/malicious-vs-code-extensions-trojan-fake-png-files\/\">VSCode <\/a>and Cursor, which are common tools developers use to write code.<\/p>\n<p>Between late 2025 and early 2026, simply opening a folder provided by the group was enough to let the hackers silently execute arbitrary code and hijack a computer without any warning or prompt. After compromising these devices, the attackers gathered the <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/1inch-named-exclusive-swap-provider-at-launch-for-ledger-multisig\/\" data-type=\"link\" data-id=\"https:\/\/hackread.com\/1inch-named-exclusive-swap-provider-at-launch-for-ledger-multisig\/\">multisig<\/a> approvals needed to control the protocol. On April 1st, they used a method known as a durable nonce attack to bypass security and empty the vaults in under a minute.<\/p>\n<h3><strong>The Link to North Korea<\/strong><\/h3>\n<p>While the individuals met in person were likely third-party intermediaries, security experts at Mandiant and the SEALS 911 team have linked the attack to the North Korean hacking group UNC4736 (aka AppleJeus or Citrine Sleet). According to their research, the fund flows used to stage this operation were traced back to a previous hack of <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.scworld.com\/brief\/north-korean-apt-blamed-for-radiant-capital-crypto-heist\" data-type=\"link\" data-id=\"https:\/\/www.scworld.com\/brief\/north-korean-apt-blamed-for-radiant-capital-crypto-heist\">Radiant Capital<\/a> in October 2024.<\/p>\n<div style='margin: 8px auto; text-align: center; display: block; clear: both;'> <script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-3675825324474978\"      crossorigin=\"anonymous\"><\/script>  <ins      style=\"display:inline-block;width:300px;height:250px\"      data-ad-client=\"ca-pub-3675825324474978\"      data-ad-slot=\"3421156210\"><\/ins> <script>      (adsbygoogle = window.adsbygoogle || []).push({}); <\/script><\/div>\n<p>Drift has since frozen all protocol functions and removed the compromised wallets from the system. The team thanked experts like @tayvano_, @tanuki42_, @pcaversaccio, and @bax1337 for their help in identifying the attackers. This incident is shocking because it shows that nowadays, even a face-to-face partnership cannot be trusted.<\/p>\n<h3>Drift\u2019s full response:<\/h3>\n<div  pk-flickity=\"init\" data-sg-page-dots=\"true\" data-sg-page-info=\"true\" data-sg-nav=\"true\">\n<figure><a href=\"https:\/\/hackread.com\/north-korean-hackers-trading-firm-drift-protocol\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-1\/\"><img loading=\"lazy\" decoding=\"async\" width=\"591\" height=\"791\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-1.png\" aria-describedby=\"gallery-1-143477\" data-gallery=\"slider\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-1.png 591w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-1-224x300.png 224w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-1-380x509.png 380w\" sizes=\"auto, (max-width: 591px) 100vw, 591px\" alt=\"North Korean Hackers Pose as Trading Firm to Steal $285M from Drift\" \/><\/a><figcaption> \t\t\t\t\t\tDrift&#8217;s full response (Screenshot via X) \t\t\t\t\t\t<\/figcaption><\/figure>\n<figure><a href=\"https:\/\/hackread.com\/north-korean-hackers-trading-firm-drift-protocol\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-2\/\"><img loading=\"lazy\" decoding=\"async\" width=\"577\" height=\"811\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-2.png\" aria-describedby=\"gallery-1-143478\" data-gallery=\"slider\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-2.png 577w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-2-213x300.png 213w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-2-380x534.png 380w\" sizes=\"auto, (max-width: 577px) 100vw, 577px\" alt=\"North Korean Hackers Pose as Trading Firm to Steal $285M from Drift\" \/><\/a><figcaption> \t\t\t\t\t\tDrift&#8217;s full response (Screenshot via X) \t\t\t\t\t\t<\/figcaption><\/figure>\n<figure><a href=\"https:\/\/hackread.com\/north-korean-hackers-trading-firm-drift-protocol\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-3\/\"><img loading=\"lazy\" decoding=\"async\" width=\"584\" height=\"555\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-3.png\" aria-describedby=\"gallery-1-143479\" data-gallery=\"slider\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-3.png 584w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-3-300x285.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-3-380x361.png 380w\" sizes=\"auto, (max-width: 584px) 100vw, 584px\" alt=\"North Korean Hackers Pose as Trading Firm to Steal $285M from Drift\" \/><\/a><figcaption> \t\t\t\t\t\tDrift&#8217;s full response (Screenshot via X) \t\t\t\t\t\t<\/figcaption><\/figure>\n<figure><a href=\"https:\/\/hackread.com\/north-korean-hackers-trading-firm-drift-protocol\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-4\/\"><img loading=\"lazy\" decoding=\"async\" width=\"584\" height=\"583\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-4.png\" aria-describedby=\"gallery-1-143480\" data-gallery=\"slider\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-4.png 584w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-4-300x300.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-4-150x150.png 150w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-4-80x80.png 80w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-4-110x110.png 110w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-4-380x379.png 380w\" sizes=\"auto, (max-width: 584px) 100vw, 584px\" alt=\"North Korean Hackers Pose as Trading Firm to Steal $285M from Drift\" \/><\/a><figcaption> \t\t\t\t\t\tDrift&#8217;s full response (Screenshot via X) \t\t\t\t\t\t<\/figcaption><\/figure>\n<figure><a href=\"https:\/\/hackread.com\/north-korean-hackers-trading-firm-drift-protocol\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-5\/\"><img loading=\"lazy\" decoding=\"async\" width=\"581\" height=\"577\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-5.png\" aria-describedby=\"gallery-1-143481\" data-gallery=\"slider\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-5.png 581w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-5-300x298.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-5-150x150.png 150w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-5-80x80.png 80w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-5-110x110.png 110w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-5-380x377.png 380w\" sizes=\"auto, (max-width: 581px) 100vw, 581px\" alt=\"North Korean Hackers Pose as Trading Firm to Steal $285M from Drift\" \/><\/a><figcaption> \t\t\t\t\t\tDrift&#8217;s full response (Screenshot via X) \t\t\t\t\t\t<\/figcaption><\/figure>\n<figure><a href=\"https:\/\/hackread.com\/north-korean-hackers-trading-firm-drift-protocol\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-6\/\"><img loading=\"lazy\" decoding=\"async\" width=\"586\" height=\"722\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-6.png\" aria-describedby=\"gallery-1-143482\" data-gallery=\"slider\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-6.png 586w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-6-243x300.png 243w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/north-korean-group-unc4736-linked-to-285m-drift-protocol-theft-6-380x468.png 380w\" sizes=\"auto, (max-width: 586px) 100vw, 586px\" alt=\"North Korean Hackers Pose as Trading Firm to Steal $285M from Drift\" \/><\/a><figcaption> \t\t\t\t\t\tDrift&#8217;s full response (Screenshot via X) \t\t\t\t\t\t<\/figcaption><\/figure>\n<\/div>\n<p>The latest cyberattack attributed to North Korean hackers came just days after another North Korean-linked group, <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/unc1069-node-js-maintainer-fake-linkedin-slack-profile\/\" data-type=\"post\" data-id=\"143439\">UNC1069, was named<\/a> in a large-scale campaign using fake LinkedIn and Slack profiles to target Node.js maintainers.<\/p>\n<p>The increasing activity of North Korean government-backed hackers shows a well-planned and sophisticated strategy targeting the crypto, blockchain, and software development sectors. Therefore, companies need to train their employees not only to recognize phishing attempts but also to identify social engineering scams.<\/p>\n<div >\n<div>\n<div>\n<div>\n<h5> \t\t\t\t\t\t<a target=\"_blank\" rel=\"author\" href=\"https:\/\/hackread.com\/author\/deeba\/\"> \t\t\t\t\t\t\tDeeba Ahmed\t\t\t\t\t\t<\/a> \t\t\t\t\t<\/h5>\n<div> \t\t\t\t\t\t\t<a target=\"_blank\" rel=\"author\" href=\"https:\/\/hackread.com\/author\/deeba\/\"> \t\t\t\t\t\t\t\t<img src='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=80&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=160&#038;d=mm&#038;r=g 2x' height='80' width='80' alt=\"North Korean Hackers Pose as Trading Firm to Steal $285M from Drift\" \/>\t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t\t\t\t\t\t\tDeeba is a veteran cybersecurity reporter at Hackread.com with over a decade of experience covering cybercrime, vulnerabilities, and security events. Her expertise and in-depth analysis make her a key contributor to the platform\u2019s trusted coverage.\t\t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" target=\"\"> \t\t\tView Posts\t\t<\/a> \t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Drift Protocol reveals that a North Korean state-linked [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-45154","post","type-post","status-publish","format-standard","hentry","category-hackread"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45154","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45154"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45154\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45154"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45154"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45154"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}