Security5 min readThe Hacker News

$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation

P
Redakcja Pixelift0 views
Share
$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation

Foto: The Hacker News

Losses totaling as much as $285 million are the result of a precisely planned attack on the Drift protocol, orchestrated by a North Korean hacking group. According to the latest report from Zscaler ThreatLabz, the breach was not the result of a code error, but rather a six-month Social Engineering operation. Posing as recruiters and IT experts, the hackers infiltrated the organization's structures, building employee trust to ultimately seize control of systems through manipulated Remote Access. Artificial intelligence proved to be the key catalyst for the attack, drastically shortening the so-called window of response—the time in which a human can identify a threat. AI allowed the attackers to generate perfect, personalized communications and automate processes, making traditional VPN security the weakest link in the infrastructure. For the global creative and technological community, this is a clear signal: in the age of AI, the greatest risk is no longer "leaky" software, but the authenticity of digital identity. This incident forces a shift away from classic passwords toward Zero Trust architecture, where every remote connection attempt is verified for behavioral anomalies in real time. Today, project security depends more on psychological vigilance than on the strength of a firewall.

When $285 million disappeared from the Drift protocol, a leading decentralized exchange based on the Solana network, on April 1, 2026, many market observers hoped it was merely a macabre April Fool's joke. However, the reality turned out to be much darker. According to the latest report published by the Drift team, the attack was not the result of a sudden code error or a zero-day vulnerability, but the effect of a precise, six-month social engineering operation carried out by hacking groups linked to the Democratic People's Republic of Korea (DPRK).

This strike defines a new era of cyber threats, where blockchain technology meets the unprecedented patience and cunning of state actors. According to disclosed data, the operation began as early as the fall of 2025, meaning the attackers infiltrated the structures and relationships surrounding the project for a full six months before the final drain of wallets. The scale of the theft places this incident among the top largest exploits in the history of the Solana ecosystem.

Six Months of Building False Trust

The mechanism of the attack on Drift shows that the weakest link in cryptographic systems remains the human being. DPRK hackers did not attempt to "break down the door" with brute computing power. Instead, for months, they built credible personas, infiltrating communication channels and establishing relationships with key developers and operational staff. It was a "long game" where every step was carefully planned to lull the security team's vigilance.

The use of social engineering on such a scale suggests that the attackers possessed deep knowledge of the exchange's internal processes. The report indicates that the operation, which started in the fall of 2025, involved gradually acquiring permissions and access to critical infrastructure. In the world of DeFi, where decentralization is meant to be a shield, centralized touchpoints—such as employee computers or administrative keys—became the primary targets of the attack.

Cybersecurity and network threats
Complex hacking operations require months of planning and precise execution.

The Role of AI and the Collapse of Traditional Barriers

Analyzing the context of this breach, it is impossible to ignore the conclusions from the Zscaler ThreatLabz 2026 VPN Risk Report. This report, developed in collaboration with Cybersecurity Insiders, sheds light on how modern tools are changing the landscape of the fight against cybercrime. A key takeaway is the fact that Artificial Intelligence (AI) has drastically shortened human response time to incidents, while simultaneously allowing attackers to automate processes that previously required massive amounts of manual labor.

In the case of Drift, AI may have played a key role in creating convincing phishing content and simulating natural interactions, allowing DPRK hackers to remain undetected for half a year. Remote access, which was once considered an operational standard, has become—according to Zscaler—the "fastest path to a security breach." Traditional VPN-based security proves insufficient against attackers who can hijack the identity of an authorized user.

  • Operation Start Date: Autumn 2025
  • Final Attack Date: April 1, 2026
  • Total Losses: $285 million
  • Main Perpetrator: Groups linked to the DPRK
  • Platform: Solana (Drift DEX)

Anatomy of a Digital Drain

Once the attackers obtained the necessary access, the process of siphoning funds was instantaneous. They exploited vulnerabilities in the liquidity management structure, allowing for a massive withdrawal of assets without immediately triggering the protocol's safety fuses. The fact that the attack occurred on April 1 was not accidental—the information chaos accompanying that day often delays the reaction of technical teams, which in this case gave the hackers valuable minutes to cover their tracks on the Solana network.

The use of social engineering techniques by the DPRK has become their trademark in the Web3 world. Instead of looking for errors in the mathematics of smart contracts, which are audited by external firms, the attackers focus on psychology. The attack on Drift is a textbook example of how patience in intelligence gathering translates into massive financial gains, which—as analysts suspect—serve to fund the regime's weapons programs.

Digital threat analysis
Modern security systems must evolve to meet AI-driven threats.

The Necessity of Redefining DeFi Security

This incident challenges the entire crypto industry. If a six-month infiltration can end in the loss of nearly $300 million, it means that current "security-by-design" standards must be expanded to include rigorous "security-by-human" procedures. Zscaler ThreatLabz rightly notes that AI has changed the rules of the game—the time a human could react to suspicious network behavior has been reduced to almost zero by automated attacking scripts.

For platforms like Drift, which operate on high-performance blockchains like Solana, this means the necessity of implementing anomaly detection systems based on behavioristics, rather than just rigid access rules. Remote access to critical infrastructure must be completely reconsidered, moving away from vulnerable VPNs toward a Zero Trust architecture that trusts no one—not even individuals who appeared to be trusted collaborators for six months.

"The attack on Drift was not a code error. It was a failure of trust that DPRK hackers exploited with surgical precision over 180 days."

The scale of losses amounting to $285 million will force the Solana ecosystem and other L1 networks to introduce more restrictive multi-signature (multi-sig) control mechanisms and "dead man's switch" systems that could automatically block transfers if unnatural withdrawal patterns are detected. The lesson from the DPRK operation is brutal: in the world of digital finance, the greatest threat is not a hacker with a terminal, but a "colleague" on a messaging app who built a project with you for six months, waiting for the right moment to press the button.

In the face of such sophisticated threats, the only effective strategy becomes a total abandonment of the trust paradigm in favor of continuous, automated verification of every action within the system. Decentralized finance must mature to the level of military security if it is to survive attacks backed by state resources and modern artificial intelligence.

Comments

Loading...