Drift: Hackers suspected to be from a North Korean organization, who spent six months making covert contact and ultimately gaining access.

PANews reported on April 5th that Drift released an updated investigation into the attack, indicating that the operation was carried out by the same threat actors as the Radiant Capital hack in October 2024, with highly similar on-chain fund flows and operational methods. Mandiant attributed the Radiant Capital hack to UNC4736, an organization linked to the North Korean government.

Furthermore, this attack was meticulously planned over six months. Starting in the fall of 2025, a group posing as a "quantitative trading company" proactively contacted Drift contributors at multiple international crypto conferences. They established a Telegram group and engaged in in-depth business discussions and strategy exchanges for six months, even launching an Ecosystem Vault on Drift with $1 million in real funds. After multiple face-to-face meetings to build trust, they shared links and tools, ultimately seemingly completing the intrusion through a malicious code repository and a beta wallet app (TestFlight). Following the attack, all related chat logs and malware were thoroughly removed.

The investigation is ongoing, and these findings are preliminary. All remaining protocol functionality has been frozen, and the compromised wallet has been removed from multi-signature authentication. The attacker's wallet has been flagged by exchanges and cross-chain bridge operators.

Previous reports indicated that Drift suffered losses exceeding $285 million in the attack.

Share to:

Author: PA一线

This content is for market information only and is not investment advice.

Follow PANews official accounts, navigate bull and bear markets together
PANews APP
香港财政司司长陈茂波盘点2026年Q1经济:IPO规模全球第一,募资规模超1030亿港元
PANews Newsflash