05.04.2026 12:15
A recent breach of the Drift Protocol platform—resulting in a $285 million loss—stemmed not from a hasty phishing attempt but from a meticulously planned intelligence campaign attributed to North Korean state‑backed hackers. Researchers uncovered that the attackers spent six months cultivating relationships before pulling off the heist.
The operation began when a counterfeit quantitative‑trading firm made contact with crypto contributors at a major industry conference in late 2025. Over the ensuing months, these impostors appeared at multiple gatherings across several nations, led collaborative sessions, and nurtured rapport through extended Telegram chats about vault integrations. By December 2025 and January 2026, the group successfully onboarded an ecosystem vault, funneling more than $1 million of real capital into the platform.
During the integration phase, the conspirators exchanged code repositories and shared technical “tools,” giving the illusion of a legitimate partnership. By March, Drift contributors had met the actors in person on several occasions, cementing the façade of trust.
Crypto developer Gautham remarked that “the most dangerous hackers don’t look like hackers,” a sentiment echoed by security researcher Tay, who initially anticipated a routine recruiter scam but was instead confronted with a far deeper deception. The episode underscores how sophisticated social engineering can bypass traditional security expectations and serves as a stark reminder of the evolving threat landscape in the cryptocurrency space.