DRIFT
RXD
DEFI
RDNT
1
The biggest DeFi exploit of the year started at a networking event with complimentary drinks — Drift Protocol disclosed on Apr. 5 that its Apr. 1 hack was the result of a six-month intelligence operation now linked with medium-high confidence to North Korean state-affiliated actors.
The infiltration began in fall 2025, when a group posing as a quantitative trading firm approached Drift contributors at a major crypto conference. Over the following months, they met team members face-to-face at multiple industry events across several countries.
They deposited more than $1M of their own capital into an Ecosystem Vault.
They asked detailed product questions across multiple working sessions, building what appeared to be a legitimate trading operation inside Drift's infrastructure.
Between December 2025 and March 2026, the group deepened its ties through vault integrations and continued in-person meetings at conferences. Contributors had no reason for suspicion — by the time of the exploit, the relationship was nearly half a year old and included verified professional backgrounds, substantive technical conversations, and a functioning on-chain presence.
When the attack hit on Apr. 1, the group's Telegram chats and malicious software were scrubbed clean. Forensic review identified two likely intrusion vectors: a malicious code repository shared under the pretense of deploying a vault frontend, and a TestFlight application presented as the group's wallet product.
A known vulnerability in VSCode and Cursor editors, actively flagged by the security community from December 2025 through February 2026, may have enabled silent code execution simply by opening a file.
All remaining protocol functions have been frozen and compromised wallets removed from the multisig. Mandiant has been engaged for the investigation, and attacker wallets have been flagged across exchanges and bridge operators.
Also Read:Bitcoin Decentralization Faces A Problem: Mining Power Tied To Just Three Nations
Investigations conducted by the SEALS 911 team assessed with medium-high confidence that the operation was carried out by the same threat actors behind the October 2024 Radiant Capital hack.
Mandiant previously attributed that attack to UNC4736, a North Korean state-affiliated group also tracked as AppleJeus or Citrine Sleet.
The connection rests on both on-chain evidence and operational patterns.
Fund flows used to stage and test the Drift operation trace back to the Radiant attackers, and personas deployed across the campaign overlap with known DPRK-linked activity. Notably, the individuals who appeared in person were not North Korean nationals — DPRK threat actors at this level are known to use third-party intermediaries for face-to-face engagement.
Read Next:XRP Ledger Hits Record 4.49M Transactions Amid Price Decline