top of page
perceptive_background_267k.jpg

$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation

Published:

5 april 2026 om 18:25:00

Alert date:

5 april 2026 om 20:00:56

Source:

thehackernews.com

Click to open the original link from this advisory

Data Breach & Exfiltration, Supply Chain & Dependencies, Ransomware & Malware

The Drift decentralized exchange suffered a $285 million theft on April 1, 2026, which was traced to a sophisticated six-month social engineering operation conducted by North Korea (DPRK). The attack began in fall 2025 and represents a meticulously planned, targeted campaign against the Solana-based platform. This incident highlights the advanced persistent threat capabilities of DPRK actors in conducting long-term social engineering operations against cryptocurrency platforms. The substantial financial loss and extended timeline demonstrate the sophistication of state-sponsored attacks on DeFi infrastructure.

Technical details

The attack was a six-month social engineering operation where attackers posed as a quantitative trading company and approached Drift contributors at cryptocurrency conferences. Two primary attack vectors were identified: 1) A malicious Microsoft Visual Studio Code project that weaponizes the 'tasks.json' file using 'runOn: folderOpen' option to automatically execute malicious code when opening the project in the IDE, and 2) A compromised wallet product distributed via Apple's TestFlight for beta testing. The attackers onboarded an Ecosystem Vault on Drift, depositing over $1 million to build credibility, and maintained months of substantive conversations about trading strategies. Evidence shows connections to previous attacks including fund flows tracing back to the Radiant attackers, and the use of fully constructed fake identities with employment histories and professional networks.

Mitigation steps:

Microsoft introduced new security controls in VS Code versions 1.109 and 1.110 to prevent unintended execution of tasks when opening a workspace. Organizations should be cautious of unsolicited contact from trading companies or recruiters, especially those requesting to clone repositories or test applications. Implement strict identity verification for new hires and be aware of North Korean IT worker infiltration schemes. Monitor for suspicious cryptocurrency transactions and verify the authenticity of professional contacts through multiple channels before engaging in business relationships.

Affected products:

Drift Protocol
Solana-based decentralized exchange
Microsoft Visual Studio Code
Apple TestFlight
Radiant Capital
X_TRADER/3CX
Axios npm package
Node.js projects
GitHub repositories

Related links:

https://x.com/DriftProtocol/status/2040611161121370409
https://thehackernews.com/2026/04/drift-loses-285-million-in-durable.html
https://thehackernews.com/2022/12/north-korean-hackers-spread-applejeus.html
https://thehackernews.com/2023/04/lazarus-xtrader-hack-impacts-critical.html
https://thehackernews.com/2024/12/doj-indicts-14-north-koreans-for-88m-it.html
https://www.halborn.com/blog/post/explained-the-radiant-capital-hack-october-2024
https://thehackernews.com/2026/02/dprk-operatives-impersonate.html
https://thehackernews.com/2026/03/north-korean-hackers-abuse-vs-code-auto.html
https://dti.domaintools.com/research/dprk-malware-modularity-diversity-and-functional-specialization
https://thehackernews.com/2025/12/kimsuky-spreads-docswap-android-malware.html
https://thehackernews.com/2026/02/lazarus-group-uses-medusa-ransomware-in.html
https://thehackernews.com/2025/07/us-sanctions-north-korean-andariel.html
https://thehackernews.com/2026/04/unc1069-social-engineering-of-axios.html
https://www.esentire.com/blog/north-korean-apt-malware-analysis-dev-popper-rat-and-omnistealer-everyday-im-shufflin
https://thehackernews.com/2024/04/bogus-npm-packages-used-to-trick.html
https://nisos.com/blog/dprk-it-worker-fraud-laptop-farm/
https://nisos.com/blog/dprk-remote-worker-fraud-interview/
https://nisos.com/blog/dprk-it-worker-fraud-insider-threat/
https://unit42.paloaltonetworks.com/north-korean-synthetic-identity-creation/
https://www.kelacyber.com/blog/espionage-exposed-inside-a-north-korean-remote-worker-network/
https://www.chainalysis.com/blog/ofac-targets-north-korean-it-workers-crypto-march-2026/
https://thehackernews.com/2026/03/ofac-sanctions-dprk-it-worker-network.html
https://flare.io/learn/resources/blog/iranian-recruits-inside-the-nkitw-operation

Related CVE's:

Related threat actors:

IOC's:

DEV#POPPER RAT JavaScript backdoor, OmniStealer information stealer, Malicious Python packages, Weaponized tasks.json files in VS Code projects, Fraudulent TestFlight wallet applications, Fund flows connected to Radiant Capital attackers

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page