Skip to content
Tech News
← Back to articles

Drift loses $280 million North Korean hackers seize Security Council powers

read original get Cybersecurity USB Data Block → more articles
Why This Matters

The recent attack on Drift Protocol highlights the growing sophistication of state-sponsored cyber threats targeting DeFi platforms, emphasizing the importance of enhanced security measures in blockchain ecosystems. This incident underscores the need for vigilance among consumers and developers alike, as malicious actors exploit complex operational vulnerabilities to drain funds without exploiting software flaws. As the industry evolves, strengthening security protocols and monitoring will be crucial to protect user assets and maintain trust in decentralized finance.

Key Takeaways

Update: Revised story and title based on new information linking the attack with North Korean hackers.

The Drift Protocol lost at least $280 million after a threat actor took control of its Security Council administrative powers in a planned, sophisticated operation.

Blockchain intelligence firms Elliptic and TRM Labs linked the attacks to North Korean threat actors, based on multiple on-chain indicators consistent with DPRK tradecraft.

These include Tornado Cash usage, CarbonVote deployment timing (09:30 Pyongyang time), cross-chain bridging patterns, and rapid large-scale laundering, consistent with the Bybit hack.

The attacker leveraged durable nonce accounts and pre-signed transactions to delay execution and strike with accuracy at a chosen time, the platform explained.

Drift underlines that the hacker did not exploit any flaws in its programs or smart contracts, and no seed phrases have been compromised.

Drift Protocol is a DeFi trading platform built on the Solana blockchain that serves as a non-custodial exchange, giving users full control of their funds as they interact with on-chain markets.

As of late 2024, the platform claimed to have 200,000 traders, supporting total trading volumes of more than $55 billion and a daily peak of $13 million.

According to Drift's report, the heist was prepared between March 23 and 30, with the attacker setting up durable nonce accounts and obtaining 2/5 multisig approvals from Security Council members to meet the required threshold.

This enabled them to pre-sign malicious transactions that weren’t executed immediately.

... continue reading