{"id":499,"date":"2026-04-05T19:19:03","date_gmt":"2026-04-05T19:19:03","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=499"},"modified":"2026-04-05T19:19:03","modified_gmt":"2026-04-05T19:19:03","slug":"285-million-drift-hack-traced-to-six-month-dprk-social-engineering-operation","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=499","title":{"rendered":"$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation"},"content":{"rendered":"<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh2eFUAGb2m5vs6mOwArunSX0lzBpR8Ag24yQhUtaYxrcHx2V46YcocY9oei-HH89QSB-HTxXta3bLH70_n6zMCRD949ttVsKlt4WnzSZ0rl1v4Suj3A7xftqjQSEXDq_cfLCIcMuENqoFeD9zBW0qZXr1owIEQEqzSNkaKfHFsGF35-lseSZbc0MGLRRWu\/s1700-e365\/drift-hack.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>Drift\u00a0has <a href=\"https:\/\/x.com\/DriftProtocol\/status\/2040611161121370409\">revealed<\/a> that the April 1, 2026, attack that led to\u00a0the theft of $285\u00a0million was the culmination of a months-long targeted and meticulously planned social engineering operation undertaken by the Democratic People&#8217;s Republic of Korea (DPRK) that began in the fall of\u00a02025.<\/p>\n<p>The\u00a0Solana-based decentralized exchange described it as \u00aban attack six months in the making,\u00bb attributing it with medium confidence to a North Korean state-sponsored hacking group\u00a0dubbed <strong>UNC4736<\/strong>, which is also tracked under the cyptonyms AppleJeus, Citrine Sleet, Golden Chollima, and Gleaming\u00a0Pisces.<\/p>\n<p>The\u00a0threat actor has\u00a0a history of targeting the cryptocurrency sector for financial theft since at least 2018. It&#8217;s best known for\u00a0the X_TRADER\/3CX supply chain\u00a0breach in 2023 and\u00a0the $53 million\u00a0hack of decentralized finance (DeFi)\u00a0platform <a href=\"https:\/\/www.halborn.com\/blog\/post\/explained-the-radiant-capital-hack-october-2024\">Radiant\u00a0Capital<\/a> in October\u00a02024.<\/p>\n<p>\u00abThe basis for this connection is both on-chain (fund flows used to stage and test this operation trace back to the Radiant attackers) and operational (personas deployed across this campaign have identifiable overlaps with known DPRK-linked activity),\u00bb Drift said in a Sunday\u00a0analysis.<\/p>\n<p>In\u00a0an assessment published in late January 2026, cybersecurity company CrowdStrike described Golden Chollima as an offshoot of Labyrinth Chollima that&#8217;s primarily geared towards cryptocurrency theft by targeting small fintech firms in the U.S., Canada, South Korea, India, and Western\u00a0Europe.<\/p>\n<p>\u00abThe adversary typically conducts smaller-value thefts at a more consistent operational tempo, suggesting responsibility for ensuring baseline revenue generation for the DPRK regime,\u00bb CrowdStrike said. \u00abDespite improving trade relations with Russia, the DPRK requires additional revenue to fund ambitious military plans that include constructing new destroyers, building nuclear-powered submarines, and launching additional reconnaissance satellites.\u00bb<\/p>\n<p>In\u00a0at least one incident observed in late 2024, UNC4736 delivered malicious Python packages through a fraudulent recruitment scheme to a European fintech company. Upon\u00a0gaining access, the threat actor moved laterally to the victim&#8217;s cloud environment to access IAM configurations and associated cloud resources, and ultimately diverted cryptocurrency assets to adversary-controlled\u00a0wallets.<\/p>\n<h3>How the Drift Attack Likely\u00a0Unfolded<\/h3>\n<p>Drift, which is working with law enforcement and forensic partners to piece together the sequence of events that led to the hack, said it was the target of a \u00abstructured intelligence operation\u00bb that required months of\u00a0planning.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/vpn-risk-report-inside-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWajeG0cdaapf1GKTZRUZUB7BzuYGegyw5k0eAorJXlmkFdYCCeLXXhXYJuXU9lWD33rV6rRnIyly3czoNfYifpxk1eGA5slItPmim3HkubXoQMgC4J7hdQPywxGbWq7Eqeff_o6s2Fq-WmSFd5guwdLn7IqpveMqULqtVnd-ndnljWYGj45EkMFB7m0qm\/s728-e100\/z-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>Starting in or about fall 2025, individuals posing as a quantitative trading company approached Drift contributors at a major cryptocurrency conference and international crypto conferences under the pretext of integrating the protocol. It\u00a0has since emerged that this was a deliberate approach, where members of this trading group approached and built rapport with specific Drift contributors at various major industry conferences that took place in several countries over a period of six\u00a0months.<\/p>\n<p>\u00abThe individuals who appeared in person were not North Korean nationals,\u00bb Drift explained. \u00abDPRK threat actors operating at this level are known to deploy third-party intermediaries to conduct face-to-face relationship-building.\u00bb<\/p>\n<p>\u00abThey were technically fluent, had verifiable professional backgrounds, and were familiar with how Drift operated. A\u00a0Telegram group was established upon the first meeting, and what followed were months of substantive conversations around trading strategies and potential vault integrations. These\u00a0interactions are typical of how trading firms interact and onboard with\u00a0Drift.\u00bb<\/p>\n<p>Then, sometime between December 2025 and January 2026, the group onboarded an Ecosystem Vault on Drift, a step that required filling out a form with strategy details. As\u00a0part of this process, the individuals are said to have engaged with multiple contributors, asking them \u00abdetailed and informed product questions,\u00bb while depositing more than $1 million of their own\u00a0funds.<\/p>\n<p>This, Drift said, was a calculated move designed to build a functioning operational presence inside the Drift ecosystem, with integration conversations continuing with the contributors through February and March 2026. This\u00a0included sharing links for projects, tools, and applications that the company claimed to be developing.<\/p>\n<p>The\u00a0possibility that these interactions with the trading group may have acted as the initial infection pathway assumed significance in the wake of the April 1 hack. But\u00a0as Drift revealed, their Telegram chats and malicious software had been deleted right around the time the attack took\u00a0place.<\/p>\n<p>It&#8217;s suspected that there may be two primary attack vectors\u00a0&#8211;<\/p>\n<ul>\n<li>One contributor may have been compromised after cloning a code repository shared by the group as part of efforts to deploy a frontend for their vault.<\/li>\n<li>A second contributor was persuaded into downloading a wallet product via Apple&#8217;s TestFlight to beta test the app.<\/li>\n<\/ul>\n<p>The\u00a0repository-based intrusion vector is assessed to have involved a malicious Microsoft Visual Studio Code (VS Code) project that weaponizes the \u00abtasks.json\u00bb file to automatically trigger the execution of malicious code upon the project in the IDE by using the \u00abrunOn: folderOpen\u00bb\u00a0option.<\/p>\n<p>It&#8217;s worth noting that this technique has\u00a0been <a href=\"https:\/\/thehackernews.com\/2026\/03\/north-korean-hackers-abuse-vs-code-auto.html\">adopted by North Korean threat actors associated with the Contagious Interview campaign since December 2025, prompting Microsoft to introduce new security controls in VS Code versions 1.109\u00a0and 1.110\u00a0to prevent unintended execution of tasks when opening a workspace.<\/p>\n<p>\u00abThe investigation has shown so far that the profiles used in this third-party targeted operation had fully constructed identities including employment histories, public-facing credentials, and professional networks,\u00bb Drift said. \u00abThe people Drift contributors met in person appeared to have spent months building profiles, both personal and professional, that could withstand scrutiny during a business or counterparty relationship.\u00bb<\/p>\n<h3>North Korea&#8217;s Fragmented Malware\u00a0Ecosystem<\/h3>\n<p>The\u00a0disclosure comes as DomainTools Investigations (DTI) disclosed that DPRK&#8217;s cyber apparatus has evolved into a \u00abdeliberately fragmented\u00bb malware ecosystem that&#8217;s mission-driven, operationally resilient, and resistant to attribution efforts. This\u00a0shift is believed to be a response to law enforcement actions and intelligence disclosures about North Korean hacking campaigns.<\/p>\n<p>\u00abMalware development and operations are increasingly compartmentalized, both technically and organizationally, ensuring that exposure in one mission area does not cascade across the entire program,\u00bb\u00a0DTI <a href=\"https:\/\/dti.domaintools.com\/research\/dprk-malware-modularity-diversity-and-functional-specialization\">said<\/a>. \u00abCrucially, this model also maximizes ambiguity. By\u00a0separating tooling, infrastructure, and operational patterns along mission lines, the DPRK complicates attribution and slows defender decision-making.\u00bb<\/p>\n<p>To\u00a0that end, DomainTools noted that DPRK&#8217;s espionage-oriented malware track is chiefly associated\u00a0with Kimsuky,\u00a0while Lazarus\u00a0Group spearheads efforts to generate illicit revenue for the regime, transforming into a \u00abcentral pillar\u00bb for sanctions evasion. The\u00a0third track revolves around deploying ransomware and wiper malware for purposes of strategic signaling and drawing attention to its capabilities. This\u00a0disruptive branch is associated\u00a0with Andariel.<\/p>\n<h3>Social Engineering Behind Contagious Interview and IT Worker\u00a0Fraud<\/h3>\n<p>Social\u00a0engineering and deception continue to be the main catalyst for many of the intrusions that have been attributed to DPRK threat actors. This\u00a0includes the recent supply chain compromise of the hugely popular npm\u00a0package, Axios, as well as ongoing campaigns like Contagious Interview and IT worker\u00a0fraud.<\/p>\n<p>Contagious Interview is the\u00a0moniker assigned to a long-running threat in which the adversary approaches prospective targets and tricks them into executing malicious code from a fake repository as part of an assessment. Some\u00a0of these efforts have used weaponized Node.js\u00a0projects hosted on GitHub\u00a0to <a href=\"https:\/\/www.esentire.com\/blog\/north-korean-apt-malware-analysis-dev-popper-rat-and-omnistealer-everyday-im-shufflin\">deploy<\/a> a JavaScript backdoor\u00a0called DEV#POPPER\u00a0RAT and an information stealer known as OmniStealer.<\/p>\n<p>On\u00a0the other\u00a0hand, <a href=\"https:\/\/nisos.com\/blog\/dprk-it-worker-fraud-laptop-farm\/\">DPRK IT worker\u00a0fraud<\/a> refers\u00a0to <a href=\"https:\/\/nisos.com\/blog\/dprk-remote-worker-fraud-interview\/\">coordinated\u00a0efforts<\/a> by North Korean operatives\u00a0to <a href=\"https:\/\/nisos.com\/blog\/dprk-it-worker-fraud-insider-threat\/\">land remote freelance and full-time\u00a0roles<\/a> at Western companies using stolen identities, <a href=\"https:\/\/unit42.paloaltonetworks.com\/north-korean-synthetic-identity-creation\/\">AI-generated\u00a0personas<\/a>, and falsified credentials. Once\u00a0hired, they generate steady revenue and leverage the access to introduce malware and siphon proprietary and sensitive information. In\u00a0some cases, the stolen data is used to extort money from businesses.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/fast-response-not-fast-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A\/s728-e100\/tl-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>The\u00a0<a href=\"https:\/\/www.kelacyber.com\/blog\/espionage-exposed-inside-a-north-korean-remote-worker-network\/\">state-sponsored\u00a0program<\/a> deploys thousands of technically skilled workers in countries like China and Russia, who connect to company-issued laptops hosted at laptop farms in the U.S. and\u00a0elsewhere. The\u00a0scheme also relies on a network of facilitators to receive work laptops, manage payroll, and handle logistics. These\u00a0facilitators are recruited through shell companies.<\/p>\n<p>The\u00a0process starts with recruiters who identify and screen potential candidates. Once\u00a0accepted, the IT workers enter an onboarding phase, where facilitators assign identities and profiles, and guide them through resume updates, interview preparation, and initial job applications. The\u00a0threat actors also work with collaborators to complete hiring requirements for full-time opportunities where strict identity verification policies are\u00a0enforced.<\/p>\n<p>As\u00a0noted by Chainalysis, cryptocurrency <a href=\"https:\/\/www.chainalysis.com\/blog\/ofac-targets-north-korean-it-workers-crypto-march-2026\/\">plays<\/a> a central role in funneling a majority of the wages generated by these IT worker schemes back to North Korea while evading international sanctions.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjGcq6fxbI0j9SYeKkt_aweiKFAe5rwgoDavyJdzxmsozBcGwdaU4SdltMtqnxND9su5bd3ncSkI3bwRXhOf906JSiQQGALhjYtp82YbdfQ8C-OZvhlnclz-nstc7osBhHlYopeZBCRK73DEHmn8XZistGH94zwOKYFY-XoScUzkbv65ychNOSwt2PiC72F\/s1700-e365\/wallet.png\" style=\"display: block;  text-align: center; clear: left; float: left;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjGcq6fxbI0j9SYeKkt_aweiKFAe5rwgoDavyJdzxmsozBcGwdaU4SdltMtqnxND9su5bd3ncSkI3bwRXhOf906JSiQQGALhjYtp82YbdfQ8C-OZvhlnclz-nstc7osBhHlYopeZBCRK73DEHmn8XZistGH94zwOKYFY-XoScUzkbv65ychNOSwt2PiC72F\/s1700-e365\/wallet.png\" alt=\"\" border=\"0\" data-original-height=\"850\" data-original-width=\"1254\"\/><\/a><\/div>\n<p>\u00abThe cycle is constant and unending. North\u00a0Korean IT workers understand that, sooner or later, they will either quit or be dismissed from any given role,\u00bb Flare and IBM\u00a0X-Force said in a report last month. \u00abAs a result, they are continually shifting between jobs, identities, and accounts \u2013 never remaining in one position or using a single persona for very\u00a0long.\u00bb<\/p>\n<p>New\u00a0evidence unearthed by Flare has since revealed the campaign&#8217;s efforts to actively recruit individuals from Iran, Syria, Lebanon, and Saudi Arabia, with at least two Iranians receiving formal offer letters from U.S. employers. There\u00a0have been more than 10 instances of Iranian nationals being recruited by the\u00a0regime.<\/p>\n<p>Facilitators have also been found to use LinkedIn to hire separate people from Iran, Ireland, and India, who are then coached to land the jobs. These\u00a0individuals, called callers or interviewers, get on the phone with American hiring managers, pass technical interviews, and impersonate the real or fake Western personas curated by them. When\u00a0a caller fails an interview, the facilitator reviews the recording and provides\u00a0feedback.<\/p>\n<p>\u00abNorth Koreans are deliberately targeting U.S. defense contractors, cryptocurrency exchanges, and financial institutions,\u00bb\u00a0Flare <a href=\"https:\/\/flare.io\/learn\/resources\/blog\/iranian-recruits-inside-the-nkitw-operation\">said<\/a>. \u00abWhile the primary motivations appear to be financial, the deliberate targeting evidenced from their documents indicates that there may be other objectives at play as\u00a0well.\u00bb<\/p>\n<p>\u00abThe DPRK is not simply deploying its own nationals under false identities. It\u00a0is building a multinational recruitment pipeline, drawing skilled developers from Iran, Syria, Lebanon, and Saudi Arabia into an infrastructure designed to infiltrate U.S. defense contractors, cryptocurrency exchanges, financial institutions, and enterprises of every size. The\u00a0recruits are real software engineers, paid in cryptocurrency, coached through interviews, and slotted into fabricated Western personas.\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Drift\u00a0has revealed that the April 1, 2026, attack that led to\u00a0the theft of $285\u00a0million was the culmination of a months-long targeted and meticulously planned social engineering operation undertaken by the&hellip;<\/p>\n","protected":false},"author":1,"featured_media":500,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[745,1053,1058,637,108,287,1080,1057,1079],"class_list":["post-499","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-dprk","tag-drift","tag-engineering","tag-hack","tag-million","tag-operation","tag-sixmonth","tag-social","tag-traced"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/499","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=499"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/499\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/500"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=499"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=499"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=499"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}