CRITICAL: North Korea Just Pulled Off Another Quarter-Billion Dollar Crypto Heist
North Korean hackers drained $285 million from Solana-based Drift Protocol using social engineering to compromise multi-signature approvals. The attack involved no code exploits, just patient manipulation of human trust over several weeks.
If you needed a reminder that North Korean hackers treat cryptocurrency exchanges like their personal ATMs, here it is. Solana-based decentralized exchange Drift Protocol just confirmed that attackers drained approximately $285 million from their platform on April 1, 2026. And no, this was not an April Fools joke. The timing just makes it sting more.
What makes this particular heist fascinating, and genuinely terrifying, is that the attackers never exploited a vulnerability in Drift's smart contracts or programs. There was no coding flaw to point fingers at. No seed phrases were compromised. Instead, the threat actors pulled off something far more insidious. They spent weeks socially engineering their way into multi-signature approvals, convincing legitimate signers to authorize transactions they did not fully understand. When the day came to execute, they had everything pre-staged and ready to go.
The technical sophistication here deserves a closer look. The attackers leveraged what are called durable nonce accounts on Solana, a mechanism that allows transactions to be pre-signed and held for later execution. Think of it like writing a check and keeping it in your drawer until the perfect moment to cash it. The threat actors obtained these pre-signed authorizations over multiple weeks, then executed them all within minutes once they had accumulated enough multisig approvals to take control of Drift's Security Council administrative powers.
According to Drift's own timeline, preparations for this attack began as early as March 23, 2026. The attackers were patient, methodical, and clearly had done their homework on how Drift's governance structure worked. Once they gained control of protocol-level permissions, they did something clever. They created an entirely fictitious token called CarbonVote Token, seeded it with a few thousand dollars in fake liquidity, engaged in wash trading to make it look active, and then convinced Drift's oracles to treat this made-up asset as legitimate collateral worth hundreds of millions of dollars. From there, they introduced it as a malicious asset, removed all pre-set withdrawal limits, and drained existing funds before anyone could react.
Blockchain intelligence firms Elliptic and TRM Labs both published analyses linking this attack to North Korean threat actors. The evidence is circumstantial but compelling. The attackers used Tornado Cash for initial staging, which is standard operational security for laundering stolen crypto. The cross-chain bridging patterns and the sheer speed of post-hack laundering match tradecraft previously attributed to DPRK operations, including the massive $1.46 billion Bybit exploit from February 2025. TRM Labs even noted that the CarbonVote Token was deployed at 09:30 Pyongyang time, which is either a remarkable coincidence or a timestamp slip that points directly at North Korea.
The numbers here are staggering when you put them in context. If confirmed as a DPRK operation, this would represent the eighteenth such attack that Elliptic has tracked since January 2026. That means North Korean hackers have been averaging more than one major crypto heist per week this year, with total theft exceeding $300 million in just the first quarter. Going back further, DPRK-linked actors are believed to have stolen over $6.5 billion in cryptocurrency over recent years, with 2025 alone netting them a record $2 billion.
Why does this matter for organizations that have nothing to do with cryptocurrency? Because the attack methodology is what should keep you awake at night. The critical failure at Drift was not technological. It was human. Social engineering attacks against multisig signers convinced real people to authorize hidden transactions. A zero-timelock Security Council migration eliminated what should have been the protocol's last line of defense. The attackers manufactured trust, exploited process gaps, and turned Drift's own governance mechanisms against them.
This same playbook works against traditional enterprises. If your organization uses any kind of multi-person authorization for financial transactions, code deployments, or administrative access, you are a potential target. The attack does not require exploiting a CVE or breaking encryption. It requires convincing the right people that a malicious request is legitimate. North Korean threat actors have become exceptionally good at this, and the increasing availability of AI tools to craft persuasive messages only makes the problem worse.
The primary initial access pathway for these DPRK operations remains social engineering through campaigns that researchers track under names like DangerousPassword, CageyChameleon, and Contagious Interview. These campaigns use persuasive personas, fake job offers, and elaborate pretexts to target anyone with access to cryptocurrency infrastructure. Individual developers, project contributors, and even peripheral vendors are potential targets. The combined gains from these social engineering campaigns total $37.5 million in 2026 alone, and that figure does not include the major exchange heists like Drift or Bybit.
There is also a supply chain dimension to consider. The Drift heist happened to coincide with the disclosure of a supply chain compromise affecting the popular Axios npm package. Multiple security vendors including Google, Microsoft, CrowdStrike, and Sophos have attributed that attack to UNC1069, a North Korean hacking group that overlaps with several other tracked threat clusters including BlueNoroff and Sapphire Sleet. The forensic artifacts from the Axios compromise include identical metadata and command-and-control patterns to known DPRK malware. These are not isolated incidents. They represent a sustained, well-resourced campaign by a nation-state actor that has turned cryptocurrency theft into a reliable revenue stream for weapons programs.
What can organizations actually do about this? Start by assuming your people will be targeted. Security awareness training that focuses on recognizing social engineering attempts is essential, but it needs to go beyond the generic phishing simulations that most companies run. Train specifically on pretexting attacks, fake job offers, and requests that come through unexpected channels. Review any multi-person authorization workflows in your organization and ask whether someone could accumulate enough approvals through patient, long-term social engineering. If the answer is yes, you need additional controls.
Technical countermeasures matter too. Implement timelocks on critical administrative actions so that even if attackers obtain approvals, there is a window to detect and respond before execution. Monitor for unusual authorization patterns, especially when approvals come in rapid succession or from signers who normally do not interact. If you operate in the cryptocurrency space, treat any new token or asset with extreme suspicion until it has been thoroughly vetted.
The Drift heist is a reminder that the most sophisticated attacks often do not involve exploiting code at all. They exploit trust, process, and human nature. North Korea has built an entire industry around this, and they are not going to stop anytime soon. The $285 million they just took from Drift will fund weapons development, sanctions evasion, and more attacks. Every organization with anything worth stealing should be paying attention.
References
- Elliptic Analysis
https://www.elliptic.co/blog/drift-protocol-dprk-heist-analysis
- TRM Labs Report
https://www.trmlabs.com/post/drift-heist-north-korea
Concerned about this threat?
Our security team can assess your exposure and recommend immediate actions.
Protect Your Organization
Find vulnerabilities like this in your systems before attackers do.
24/7 monitoring to detect and respond to threats like these in real time.
Block phishing and malware delivery targeting your organization.
Map security controls to 26 frameworks including NIST, SOC 2, and HIPAA.